Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence
Smart grids (SG) emerged as a response to the need to modernize the electricity grid. The
current security tools are almost perfect when it comes to identifying and preventing known …
current security tools are almost perfect when it comes to identifying and preventing known …
Data collection for attack detection and security measurement in mobile ad hoc networks: A survey
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
A survey on parameters affecting Manet Performance
AM Eltahlawy, HK Aslan, EG Abdallah, MS Elsayed… - Electronics, 2023 - mdpi.com
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can
share information through wireless links without dedicated hardware that handles the …
share information through wireless links without dedicated hardware that handles the …
A detection and prevention system against collaborative attacks in mobile ad hoc networks
Abstract Mobile Ad hoc Networks (MANETs) are vulnerable to various kinds of threats due to
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …
Analysis of detection features for wormhole attacks in MANETs
Abstract Mobile Ad hoc Networks (MANETs) work without any fixed infrastructure and each
node in the network behaves as a router in order to transmit data towards the destination …
node in the network behaves as a router in order to transmit data towards the destination …
[HTML][HTML] Detection of sequence number attacks using enhanced AODV protocol in MANETs
Abstract A Mobile Adhoc NETwork (MANET) operates without dedicated routing hardware,
relying instead on dynamic wireless connections among nodes that can join or leave the …
relying instead on dynamic wireless connections among nodes that can join or leave the …
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks
Wireless sensor networks (WSNs) will play a major role in future technologies in the
development of the cyber-physical society. Studies show that WSNs are vulnerable to …
development of the cyber-physical society. Studies show that WSNs are vulnerable to …
Detection and Prevention of Blackhole node
F Taranum, A Sarvat, N Ali… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Mobile Adhoc networks (MANETs) comprises of mobile devices or nodes that are connected
wirelessly and have no infrastructure. Detecting malicious activities in MANETs is a …
wirelessly and have no infrastructure. Detecting malicious activities in MANETs is a …
[PDF][PDF] Design and Development of Hybrid Routing Protocol Algorithm with Attack Detection & Protection Mechanism for Mobile Ad-hoc Network Application
MK Suthar, AK Vyas - Gujarat …, 2022 - gtusitecirculars.s3.amazonaws.com
In mobile ad-hoc networks (MANETs), mobile nodes move randomly, operate in a distributed
manner, and communicate between the source to destination nodes through the …
manner, and communicate between the source to destination nodes through the …
Analysis and prevention of wormhole attack using trust and reputation management scheme in MANET
S Parbin, L Mahor - … on Applied and Theoretical Computing and …, 2016 - ieeexplore.ieee.org
MANETs operates without fixed framework and all nodes in network perform like a router in
sequence to forward information next receiver. Since the pivotal point rein lack, MANETs are …
sequence to forward information next receiver. Since the pivotal point rein lack, MANETs are …