A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

S Gurung, S Chauhan - Wireless Networks, 2020 - Springer
Abstract Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network
in which the mobile nodes operate in a distributed manner and collaborate with each other …

A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network

S Gurung, S Chauhan - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless networking field
in which the movables nodes operates in distributed manner and collaborates with each …

An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network

G Rajeshkumar, KR Valluvan - Wireless Personal Communications, 2017 - Springer
Today modern and innovative applications for health care environment based on Wireless
Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor …

A hybrid efficient distributed clustering algorithm based intrusion detection system to enhance security in MANET

CR Rathish, K Karpagavadivu, P Sindhuja… - … Technology and Control, 2021 - itc.ktu.lt
MANET plays a key role in the contemporary improvements in technology and services that
dynamically builds up the network connection bringing about a variation in network …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

Remote sensing-based statistical approach for defining drained lake basins in a continuous Permafrost region, North Slope of Alaska

H Bergstedt, BM Jones, K Hinkel, L Farquharson… - Remote Sensing, 2021 - mdpi.com
Lake formation and drainage are pervasive phenomena in permafrost regions. Drained lake
basins (DLBs) are often the most common landforms in lowland permafrost regions in the …

Fine-grained analysis of packet loss in MANETs

MS Khan, D Midi, MI Khan, E Bertino - IEEE Access, 2017 - ieeexplore.ieee.org
Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider
packet loss an indicator of possible attacks by malicious nodes. There may be several …

Opportunistic mobile networks

S Misra, BK Saha, S Pal - eBook,[Online]. Available: http://www. springer …, 2016 - Springer
As children, many of us were glued to the science fiction stories in comic books or television
shows. Arguably, computer-generated imagery (CGI) in the recent sci-fi shows or movies …

Implementation of A3ACKs intrusion detection system under various mobility speeds

A Basabaa, T Sheltami, E Shakshuki - Procedia Computer Science, 2014 - Elsevier
Wireless networking is an emerging technology that allows users to access information and
services anywhere regardless of their geographic location. Mobile Ad hoc Network …

Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm

K Thamizhmaran, M Anitha… - International Journal of …, 2017 - inderscienceonline.com
Mobile ad-hoc networks (MANETs) do not have a fixed infrastructure. Every single node in
the MANET works as both receiver and transmitter. Each node directly communicates with …