Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

[PDF][PDF] Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET.

V Srinivasan - Ingénierie des Systèmes d Inf., 2021 - researchgate.net
Mobile Ad-Hoc Networks (MANETs) due to their reconfigurable nature are being integrated
into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable …

Advanced anomaly intrusion detection technique for host based system using system call patterns

SA Maske, TJ Parvat - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Computer security has become a significant concern in numerous organizations. There are
lots of ways to handle this concerns including anomaly Intrusion Detection System on the …

A survey of ids techniques in manets using machine-learning

MS Hussain, KUR Khan - … of the Third International Conference on …, 2020 - Springer
The mobile ad hoc networks (MANETs) had move towards the wireless networking
technology. Due to its dynamic nature MANETs face the challenges towards critical attacks …

[图书][B] Threats, countermeasures, and research trends for BLE-based IoT devices

AA Pammi - 2017 - search.proquest.com
Abstract The Internet of Things has conjured up a storm in the technology world by providing
novel methods to connect, exchange, aggregate, and monitor data across a system of inter …

A review on intrusion detection system in mobile ad-hoc network

AK Saxena, S Sinha, P Shukla - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) is the most useful network in present and it is used in
many application. In the MANET prevention concept is not sufficient from the security point of …

Enhanced and secure acknowledgement IDS in mobile ad hoc network by hybrid cryptography technique

AK Saxena, P Shukla, SK Sinha - Data, Engineering and Applications …, 2019 - Springer
MANAT is uniquely named framework which is not completely established, so they rely upon
their neighbors to hand-off message. The node can move freely around the network. Unlike …

FSM based Intrusion Detection of Packet Dropping Attack using Trustworthy Watchdog Nodes

RR Chandan, PK Mishra - Recent Advances in Computer …, 2021 - ingentaconnect.com
Introduction: The proposed TWIST model aims to achieve a secure MANET by detecting and
mitigating packet dropping attack using a finite state machine based IDS model.• To …

Collaborative approach for a MANET intrusion detection system using multilateration

JMA Carvalho, PCG Costa - 2016 11th International …, 2016 - ieeexplore.ieee.org
The use of Mobile ad hoc networking is a growing trend that encompasses a wide spectrum
of application domains, including health care, defense, crisis management and others. In …

CMIDS: collaborative MANET intrusion detection system

JMA Carvalho, PCG Costa - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobile ad hoc networking may be used to accomplish different tasks at several applications
fields with a variety of purposes as healthy care, defense, crisis management and others …