[PDF][PDF] Mobile Ad Hoc Network in Disaster Area Network Scenario: A Review on Routing Protocols.

ZA Younis, AM Abdulazeez… - … Journal of Online & …, 2021 - researchgate.net
Disasters could cause communication systems to partially or completely down. In such a
case, relief operations need a rapidly deployed communication system to save lives …

[HTML][HTML] Systematic review on modification to the ad-hoc on-demand distance vector routing discovery mechanics

I Alameri, J Komarkova, T Al-Hadhrami, A Lotfi - PeerJ Computer Science, 2022 - peerj.com
Mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) are used in a
variety of research areas, including the military, industry, healthcare, agriculture, the Internet …

CUWSN: energy efficient routing protocol selection for cluster based underwater wireless sensor network

K Bhattacharjya, S Alam, D De - Microsystem Technologies, 2019 - Springer
Energy efficient routing protocol selection for Cluster based Underwater Wireless Sensor
Network (CUWSN) is aimed to support monitoring and controlling underwater scenarios in …

EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT

P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …

EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs

T Delkesh, MA Jabraeil Jamali - Journal of Ambient Intelligence and …, 2019 - Springer
Detecting and removing black hole attacks are considered to be one major routing security
issue in mobile ad hoc networks (MANETs). Malicious nodes existing on the delivery route of …

[PDF][PDF] Simulation based comparison of routing protocols in wireless multihop adhoc networks

AH Wheeb, MT Naser - International Journal of Electrical and …, 2021 - academia.edu
Routing protocols are responsible for providing reliable communication between the source
and destination nodes. The performance of these protocols in the ad hoc network family is …

[HTML][HTML] Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things

A Hasan, MA Khan, B Shabir, A Munir, AW Malik… - Applied Sciences, 2022 - mdpi.com
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to
their resource-constrained nature. Extensive research efforts have been dedicated to …

Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (vehicular ad-hoc network)

A Fiade, AY Triadi, A Sulhi, SU Masruroh… - … conference on cyber …, 2020 - ieeexplore.ieee.org
Wireless technology is widely used today and is growing rapidly. One of the wireless
technologies is VANET where the network can communicate with vehicles (V2V) which can …

STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET

MBM Kamel, I Alameri… - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes
connecting directly without a top-down network architecture or central controller. Absence of …

[HTML][HTML] pCSSL: A stochastic extension to MARTE/CCSL for modeling uncertainty in cyber physical systems

D Du, P Huang, K Jiang, F Mallet - Science of Computer Programming, 2018 - Elsevier
Abstract Cyber-Physical Systems (CPSs) are networks of heterogeneous embedded
systems immersed within a physical environment, thus combining discrete and continuous …