Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have
the ability to communicate with each other without having fixed network infrastructure or any …

Consensus routing and environmental discrete trust based secure AODV in MANETs

RR Chandan - International Journal of Computer Networks & …, 2020 - papers.ssrn.com
Abstract The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-
less communication, and it provides numerous applications in different areas. The MANET is …

A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET

U Gopal, K Subramanian - Turkish Journal of Electrical …, 2017 - journals.tubitak.gov.tr
In this paper, a secure cross-layer--based routing technique (SCLARDI) for a mobile ad hoc
network (MANET) is proposed. This technique makes use of ad hoc on-demand routing …

[PDF][PDF] Implement and Analysis the Impacts of Multiple Attacks & Connections in AODV Routing Protocol on MANETs.

M Suthar, AK Vyas - Journal of Optoelectronics Laser, 2022 - iqac.gtu.ac.in
Mobile Ad hoc network does not have fixed infrastructure and nodes randomly move in the
network [1]. Due to the dynamic topology and lack of a central coordinator of the network so …

Adaptive security for multilevel adhoc networks—A survey

T Mahboob, S Fatima, Z Atta - 2016 1st International …, 2016 - ieeexplore.ieee.org
An adhoc network does not depend on any fixed structure or mechanism, unlike other types
of networks. These have been widely in use for commercial purposes due to their unique …

[引用][C] Sécurité des réseaux Ad hoc

M AZZA - 2017