Hybrid cryptography for malicious behavior detection and prevention system for MANETs

SS Jathe, V Dhamdhere - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Wireless network is used very rapidly and widely. Being mobile used in many
fields.(MANET) Mobile ad hoc network is a standout amongst the most essential uses of …

A study on various attacks and detection methodologies in software defined networks

S Singh, SKV Jayakumar - Wireless Personal Communications, 2020 - Springer
Abstract The Software Defined Networks (SDN) is widely used in many industrial and
enterprise networking applications due to its flexibility and gaining popularity. It offers …

Secure route discovery in AODV in presence of blackhole attack

J Kumar, M Kulkarni, D Gupta, S Indu - CSI transactions on ICT, 2015 - Springer
In recent years, there has been tremendous increase in mobile adhoc networks applications
ranging from military and rescue operations to collaborative and distributed computing …

Amalgamation of Transfer Learning and Explainable AI for Internet of Medical Things

R Murugan, M Paliwal… - Recent Advances in …, 2024 - ingentaconnect.com
The Internet of Medical Things (IoMT), a growing field, involves the interconnection of
medical devices and data sources. It connects smart devices with data and optimizes patient …

CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs

C Atheeq, MMA Rabbani - Recent Advances in Computer …, 2021 - ingentaconnect.com
Background: The evolution of wireless network from wired network presents a worldwide
pattern in the previous couple of decades. All the mobile nodes in MANET act as router as …

RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks

M Anbarasan, S Prakash, A Antonidoss… - Multimedia Tools and …, 2020 - Springer
Abstract MANET (Mobile Adhoc Networks) possess the open system condition, absence of
central server, mobile nodes that make helpless to security assault while conventional …

A comparative analysis of machine deep learning algorithms for intrusion detection in wsn

S Deshpande, J Gujarathi, P Chandre… - Security Issues and …, 2021 - Springer
The rapid growth of the Internet and information technologies and also the diminution of the
price of hardware components like wireless sensors leads to the fast growth in Wireless …

[PDF][PDF] Improved AODV routing protocol for mitigating effects of grayhole attack in VANET using genetic algorithm

G Kaur, MS Rani, TC Aseri - Int. J. Comput. Sci. Eng. Technol., 2015 - ijcset.net
Recent advancement in technology related to wireless communication has given rise to
VANET. VANET is the application of MANET that relies on vehicles for network functionality …

Comprehensive study of various DoS attacks and defense approaches in MANETs

RH Jhaveri, AD Patel… - … Conference on Emerging …, 2012 - ieeexplore.ieee.org
A Mobile Ad-hoc Network (MANET) is an independent and self-configurable network without
any fixed infrastructure. Compared to traditional network, MANETs have unique …

基于元学习与强化学习的跨域自组织网络流量测量优化方法

宋健, 聂来森, 陶醉 - 水下无人系统学报, 2024 - sxwrxtxb.xml-journal.net
跨域自组织网络是一种将不同介质上的节点进行自组织, 网络拓扑自适应的网络.
在跨域通信网络中, 直接测量技术可获得准确的端到端网络流量信息. 但跨域网络中部分节点的 …