Academic literature on the topic 'Passive attacks in MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Passive attacks in MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Passive attacks in MANET"

1

Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) face significant challenges in maintaining connectivity and security due to their dynamic and decentralized nature. Passive attacks, such as eavesdropping and traffic analysis, pose a critical threat to MANET. This study proposes a novel algorithm, Radial ResNet, tailored for the classification of passive attacks in MANETs. The algorithm integrates radial basis function networks with residual networks (ResNet) to enhance classification accuracy and efficiency. Experimental results demonstrate the effectiveness of Radial ResNet, achieving an average classificatio
APA, Harvard, Vancouver, ISO, and other styles
2

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Full text
Abstract:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
APA, Harvard, Vancouver, ISO, and other styles
3

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission atte
APA, Harvard, Vancouver, ISO, and other styles
5

M S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.

Full text
Abstract:
In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector rou
APA, Harvard, Vancouver, ISO, and other styles
7

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Full text
Abstract:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp
APA, Harvard, Vancouver, ISO, and other styles
8

A., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.

Full text
Abstract:
MANET is a self-organized and decentralized wireless network, which is widely used in military applications, game parties, conferencing, etc. Due to its dynamic topology MANET is highly exposed to wide variety of attackers. Selfish misbehavior in channel allocation is a type of passive attack that affects the data link layer which will harm the network severely. As selfish misbehavior is a passive attack it is very difficult to detect. In this paper, Selfish Misbehavior Detection (SMD) algorithm is proposed that detects the selfish misbehavior during channel utilization. The mechanism uses clu
APA, Harvard, Vancouver, ISO, and other styles
9

Raut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.

Full text
Abstract:
An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination.
APA, Harvard, Vancouver, ISO, and other styles
10

Prasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.

Full text
Abstract:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Passive attacks in MANET"

1

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
3

Schellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Full text
Abstract:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
APA, Harvard, Vancouver, ISO, and other styles
5

Djervbrant, Karl-Johan, and Andreas Häggström. "A Study on Fingerprinting of Locally Assigned MAC-Addresses." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39749.

Full text
Abstract:
The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. The accuracy of counted devices was however not accurate enough for a commercial use and this is where this candidate Thesis will continue research on how to improve the accuracy. It introduces the fundamental problem on how one cannot directly count transmitted MAC-Addresses to count present devices, since the manufacturers implement features against this such as MAC-Addre
APA, Harvard, Vancouver, ISO, and other styles
6

Gomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.

Full text
Abstract:
Les applications grand public comme la téléphonie mobile ou les cartes bancaires manipulent des données confidentielles. A ce titre, les circuits qui les composent font de plus en plus l'objet d'attaques qui présentent des menaces pour la sécurité des données. Les concepteurs de systèmes sur puce (SoC) doivent donc proposer des solutions sécurisées, tout en limitant le coût et la complexité globale des applications. L’analyse des attaques existantes sur les circuits numériques nous a orienté vers celles se basant sur la tension d'alimentation, dans des nœuds technologiques avancés.Dans un prem
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
APA, Harvard, Vancouver, ISO, and other styles
8

Wright, Matthew K. "Passive logging attacks against anonymous communications systems." 2005. https://scholarworks.umass.edu/dissertations/AAI3179934.

Full text
Abstract:
Anonymous communications protocols have been designed to resist attacks that work in a short period of time. However, people typically use the Internet in regular, consistent ways over long periods of time, and consequently they are vulnerable to losing their privacy over the lifetime of those communications. Our work has focused on long-term attacks against anonymous communications systems. The predecessor attack is an example of this kind of attack; the attacker logs the connections of a user over time, eventually linking the connections to the user's machine. In this thesis, we give a proof
APA, Harvard, Vancouver, ISO, and other styles
9

Alnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.

Full text
Abstract:
The flexibility of Mobile Ad hoc networks (MANET) and its characteristics introduce new security risks. One possible attack is the Black Hole attack which received recent attention. In the Black Hole attack, a malicious node uses the routing protocol to declare itself as having the shortest path to the node whose packets it wants to intercept. It is needed to understand this risk with a view to extract preventive and corrective protections against it. We introduce an approach that could stop this attack from happening in such a network by using an algorithm which controls the communications be
APA, Harvard, Vancouver, ISO, and other styles
10

Chu-Ting, Teng, and 鄧竹庭. "It is a coincidental arrangement! Feint and response in planned passive attacks in Taekwondo sparring." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36tbj3.

Full text
Abstract:
碩士<br>國立臺灣師範大學<br>運動科學研究所<br>102<br>In Taekwondo sparring, active and passive attacks are continuously running every moment. Though the frequency of active attacks was increased after the rules change, so was the rate of point loss in active attacks. However, the rate of point loss in passive attack was relatively reduced. Among the various tactics of passive attack, the planned passive attacks that induced the attacks of the opponents with a feint were more successful than the responding passive attacks. Therefore, the purpose of the study was to examine the relation between the effective pla
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Passive attacks in MANET"

1

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sandler, Todd. Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/wentk/9780190845841.001.0001.

Full text
Abstract:
The causes and consequences of terrorism are matters of considerable debate and great interest. Spectacular events are recognized by their dates, including the 9/11 attacks in New York and Washington and the 7/7 London bombings. Many other attacks, including those in non-Western countries, receive far less attention even though they may be more frequent and cumulatively cause more casualties. In Terrorism: What Everyone Needs to KnowRG, leading economist Todd Sandler provides a broad overview of a persistently topical topic. The general issues he examines include what terrorism is, its causes,
APA, Harvard, Vancouver, ISO, and other styles
3

Prusin, Alexander. “Serbia Is Quiet,” 1942–1944. University of Illinois Press, 2018. http://dx.doi.org/10.5406/illinois/9780252041068.003.0008.

Full text
Abstract:
Examines the situation in Serbia in 1942-1944. After the defeat in the fall-winter 1941, the depleted Partisan forces in Serbia confined their actions to small-scale attacks and sabotage acts, while the Chetniks remained largely passive. It appeared, therefore, that small German contingents assisted by the Bulgarian and collaborationist forces would be able to keep the country in check. However, the Partisans gradually re-organized their depleted units into a large and effective force and ultimately emerged victorious. At the same time, the efforts to maintain a precarious balance between coll
APA, Harvard, Vancouver, ISO, and other styles
4

Leng, Thomas. Fellowship and Freedom. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198794479.001.0001.

Full text
Abstract:
This is the first modern study of the Fellowship of Merchant Adventurers—sixteenth-century England’s premier trading company—in its final century of existence as a privileged organization. Over this period the company’s main trade, the export of cloth to northwest Europe, was overshadowed by rising traffic with the wider world, whilst its privileges were continually criticized in an era of political revolution. But the company and its membership were not passive victims of these changes; rather, they were active participants in the commercial and political dramas of the century. Using thousand
APA, Harvard, Vancouver, ISO, and other styles
5

Bartley, Abel A. Keeping the Faith. Greenwood Publishing Group, Inc., 2000. http://dx.doi.org/10.5040/9798400675553.

Full text
Abstract:
An examination of the political and economic power of a large African American community in a segregated southern city; this study attacks the myth that blacks were passive victims of the southern Jim Crow system and reveals instead that in Jacksonville, Florida, blacks used political and economic pressure to improve their situation and force politicians to make moderate adjustments in the Jim Crow system. Bartley tells the compelling story of how African Americans first gained, then lost, then regained political representation in Jacksonville. Between the end of the Civil War and the consolid
APA, Harvard, Vancouver, ISO, and other styles
6

Ortbals, Candice, and Lori Poloni-Staudinger. How Gender Intersects With Political Violence and Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.308.

Full text
Abstract:
Gender influences political violence, which includes, for example, terrorism, genocide, and war. Gender uncovers how women, men, and nonbinary persons act according to feminine, masculine, or fluid expectations of men and women. A gendered interpretation of political violence recognizes that politics and states project masculine power and privilege, with the result that men occupy the dominant social position in politics and women and marginalized men are subordinate. As such, men (associated with masculinity) are typically understood as perpetrators of political violence with power and agency
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Passive attacks in MANET"

1

Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Bypassing Passive Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

MacFarland, Douglas C., Craig A. Shue, and Andrew J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation." In Passive and Active Measurement. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15509-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Enneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hendriks, Luuk, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, and Aiko Pras. "On the Potential of IPv6 Open Resolvers for DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54328-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nosyk, Yevheniya, Maciej Korczyński, and Andrzej Duda. "Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98785-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kopp, Daniel, Christoph Dietzel, and Oliver Hohlfeld. "DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks." In Passive and Active Measurement. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72582-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Passive attacks in MANET"

1

Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

A, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Noureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Passive attacks in MANET"

1

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Full text
Abstract:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the netwo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!