EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Detecting forged acknowledgements in MANETs

N Kang, EM Shakshuki… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Over the past few years, with the trend of mobile computing, Mobile Ad hoc Network
(MANET) has become one of the most important wireless communication mechanisms …

Multitier energy system review on secure intrusion detection system in MANETs

PP Rajendra - 2017 2nd IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Wireless communication networks is the most found networks in the recent years for the
reason that it does not rely on any conventional infrastructure. Also, for all the users the …

BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks

AM Ahmed, X Kong, L Liu, F Xia, S Abolfazli, Z Sanaei… - Ad Hoc Networks, 2017 - Elsevier
Existing data management protocols for socially-aware networks assume that users are
cooperative when participating in operations such as data forwarding. However, selfishness …

[PDF][PDF] Black Hole along with Other Attacks in MANETs: A Survey.

FH Tseng, HP Chiang… - Journal of …, 2018 - s3.ap-northeast-2.amazonaws.com
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had
accomplished a survey of black hole attacks in MANETs. However network technology is …

[PDF][PDF] Design of dynamic source routing with the aid of fuzzy logic for cross layered mobile ad hoc networks

T Saravanan, NS Nithya - International Journal of Engineering and …, 2019 - researchgate.net
The conventional dynamic source routing (DSR) standard chooses the path in need of
minimal hop counts for communicating the information from the source to the target …

An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET

AO Alkhamisi, SM Buhari… - … Journal of Grid and …, 2020 - inderscienceonline.com
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …

Preserving the benefits of Open Government Data by measuring and improving their quality: an empirical study

M Torchiano, A Vetrò, F Iuliano - 2017 IEEE 41st Annual …, 2017 - ieeexplore.ieee.org
Context: Open Government Data (OGD) represent an invaluable resource for enabling
active citizenship. A significant example is represented by the mandatory data that Italian …

Implementation of A3ACKs intrusion detection system under various mobility speeds

A Basabaa, T Sheltami, E Shakshuki - Procedia Computer Science, 2014 - Elsevier
Wireless networking is an emerging technology that allows users to access information and
services anywhere regardless of their geographic location. Mobile Ad hoc Network …

Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm

K Thamizhmaran, M Anitha… - International Journal of …, 2017 - inderscienceonline.com
Mobile ad-hoc networks (MANETs) do not have a fixed infrastructure. Every single node in
the MANET works as both receiver and transmitter. Each node directly communicates with …