Classical and bio-inspired mobility in sensor networks for IoT applications

R Hamidouche, Z Aliouat, AM Gueroui, AAA Ari… - Journal of Network and …, 2018 - Elsevier
With the emergence of Internet of Things (IoT) technology, a huge number of sensor based
applications are going to be deployed. Thus, due to their valuable contribution, these …

Intelligent optimization of wireless sensor networks through bio-inspired computing: survey and future directions

S Jabbar, R Iram, AA Minhas, I Shafi… - International …, 2013 - journals.sagepub.com
This survey article is a comprehensive discussion on Intelligent Optimization of Wireless
Sensor Networks through Bio-Inspired Computing. The marvelous perfection of biological …

A survey of ant colony optimization based routing protocols for mobile ad hoc networks

H Zhang, X Wang, P Memarmoshrefi, D Hogrefe - IEEE access, 2017 - ieeexplore.ieee.org
Developing highly efficient routing protocols for Mobile Ad hoc NETworks (MANETs) is a
challenging task. In order to fulfill multiple routing requirements, such as low packet delay …

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

S Sen, JA Clark - Computer Networks, 2011 - Elsevier
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their
dynamic nature, the lack of central points, and their highly resource-constrained nodes. In …

Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks

PV Krishna, V Saritha, G Vedha, A Bhiwal, AS Chawla - IET communications, 2012 - IET
Mobile ad hoc networks (MANETs) are dynamically changing and self-configuring networks.
Owing to their widespread use for many applications, multipath routing in MANETs has been …

Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption

S Umang, BVR Reddy, MN Hoda - IET communications, 2010 - IET
An ad hoc network is the assortment of cooperative wireless nodes without existence of any
access point or infrastructure. Many ad hoc network routing protocols have been proposed …

[PDF][PDF] A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

P Sharma, N Sharma, R Singh - International Journal of Computer …, 2012 - academia.edu
Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great
strength to be applied in critical situations like battlefields and commercial applications such …

Ddos attack and defense scheme in wireless ad hoc networks

SA Arunmozhi, Y Venkataramani - arXiv preprint arXiv:1106.1287, 2011 - arxiv.org
The wireless ad hoc networks are highly vulnerable to distributed denial of service (DDoS)
attacks because of its unique characteristics such as open network architecture, shared …

Hybrid IDS using SVM classifier for detecting DoS attack in MANET application

V Justin, N Marathe, N Dongre - … Conference on I-SMAC (IoT in …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks have become a very popular research topic. By providing
communications in the absence of a fixed infrastructure MANETs are becoming vulnerable …

[PDF][PDF] Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review.

A Habboush - Comput. Inf. Sci., 2019 - pdfs.semanticscholar.org
Application of mobile ad hoc networks (MANETs) has gained significant popularity among
researchers in the field of data communication networks. However, a MANET operating in a …