EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT

P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …

Security challenges in mobile ad hoc networks: A survey

A Dorri, SR Kamel, E Kheirkhah - arXiv preprint arXiv:1503.03233, 2015 - arxiv.org
MANET is a kind of Ad hoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …

[PDF][PDF] An Overview of security issues in Mobile Ad hoc Networks

VM Agrawal, H Chauhan - International Journal of Computer …, 2015 - academia.edu
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with
dynamic topologies and no centralized authority. Each node participating in the network acts …

Empirical analysis of energy-efficient hybrid protocol under black hole attack in MANETs

P Singh, M Khari - Research in Intelligent and Computing in Engineering …, 2021 - Springer
Self-organizing networks such as mobile ad hoc networks (MANETs) are less secured
networks which are more vulnerable to different kinds of attacks. The most common attack of …

Mobile Adhoc Networks Security Challenges: A Survey

S Kausar Fatima, S Gauhar Fatima… - … Journal of Advanced …, 2019 - papers.ssrn.com
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct
features like dynamic topology, hop-by-hop communications and easy and quick setup …

[PDF][PDF] A Study on security challenges in mobile ad hoc network

SB Priya, C Theebendra - … of research in computer applications and …, 2016 - academia.edu
MANET is a kind of AdHoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …

A study on hierarchical structure and blockchain-based node authentication mechanism in manet

H Yang - Convergence Security Journal, 2019 - koreascience.kr
MANET has many security vulnerabilities because it consists of only mobile nodes using
wireless. In particular, it is a very important factor determining network performance that …

[PDF][PDF] International Journal of Computer Engineering & Technology (ijcet)

S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …

[PDF][PDF] SECURITY CONSIDERATIONS IN A MARINE COMMUNICATION NETWORK FOR FISHERMEN

DB Nair, D Raj, S Rao - 2015 - researchgate.net
With the recent advancements in and popularity of wireless networks, the security based
issues are also increasing considerably. In this paper, we look at the data security and …

[PDF][PDF] A Survey on Comparison of Various Protocols and Key Management Issues in Manet

SNM Raj₁, S Neeraja₂, NT Rao, D Bhattacharyya - 2019 - gvpress.com
Remote Network incorporates a bigger favorable position in the present correspondence
application like ecological, movement, military and wellbeing perception. To understand …