EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Efficient dual-cooperative bait detection scheme for collaborative attackers on mobile ad-hoc networks

OI Khalaf, F Ajesh, AA Hamad, GN Nguyen… - IEEE Access, 2020 - ieeexplore.ieee.org
Security and correspondence happening between network central point will be an instance
for principal issues in Mobile Ad-hoc Networks (MANETs). Due to some ideas created by the …

Survey on UAANET routing protocols and network security challenges

JA Maxa, MSB Mahmoud, N Larrieu - Ad Hoc & Sensor Wireless …, 2017 - enac.hal.science
UAV Ad hoc Networks (UAANETs) is a subset of the well-known mobile ad hoc network
(MANET) paradigm. It refers to the deployment of a swarm of small Unmanned Aerial …

FCM technique for efficient intrusion detection system for wireless networks in cloud environment

M Chen, N Wang, H Zhou, Y Chen - Computers & Electrical Engineering, 2018 - Elsevier
With the emergence of ad-hoc networks, the communication methods in the field of wireless
have greatly developed. A great deal of research has been conducted, especially in mobile …

[PDF][PDF] Design of dynamic source routing with the aid of fuzzy logic for cross layered mobile ad hoc networks

T Saravanan, NS Nithya - International Journal of Engineering and …, 2019 - researchgate.net
The conventional dynamic source routing (DSR) standard chooses the path in need of
minimal hop counts for communicating the information from the source to the target …

Implementation of A3ACKs intrusion detection system under various mobility speeds

A Basabaa, T Sheltami, E Shakshuki - Procedia Computer Science, 2014 - Elsevier
Wireless networking is an emerging technology that allows users to access information and
services anywhere regardless of their geographic location. Mobile Ad hoc Network …

A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs

T Sheltami, A Basabaa, E Shakshuki - Journal of ambient intelligence and …, 2014 - Springer
In the past, traditional wired networks have been migrated to wireless networks. In addition,
the mobility and scalability in wireless networks made them suitable for many applications …

Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs

PR Dumne, A Manjaramkar - 2016 5th International …, 2016 - ieeexplore.ieee.org
In MANET, node changes its location so it adopt property like infrastructure-less. A group of
mobile nodes which are agree and capable to establish relations, using without any fixed …

[PDF][PDF] An Enhanced Scheme to Pinpoint Malicious Behavior of Nodes In Manet's

N Malathi, M Sivaram - 2015 - academia.edu
Mobile Ad hoc Network (MANET) has been pervasive in many applications, including some
procedures such as security in critical applications has been a major threats in MANETs …

Hybrid cryptography for malicious behavior detection and prevention system for MANETs

SS Jathe, V Dhamdhere - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Wireless network is used very rapidly and widely. Being mobile used in many
fields.(MANET) Mobile ad hoc network is a standout amongst the most essential uses of …