To see the other types of publications on this topic, follow the link: Security in MANET.

Journal articles on the topic 'Security in MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security in MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Murugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) are susceptible to various security threats due to their decentralized and dynamic nature. Among these threats, Distributed Denial of Service (DDoS) and sibling attacks pose significant challenges to the integrity and availability of network services. This paper presents a novel approach for securing MANETs against DDoS and sibling attacks through a robust Intrusion Prevention System (IPS) integrated with a secured routing mechanism. The proposed methodology leverages residual transfer learning to adapt a pre-trained model for intrusion detection to the MANET en
APA, Harvard, Vancouver, ISO, and other styles
2

Nabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.

Full text
Abstract:
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.  
APA, Harvard, Vancouver, ISO, and other styles
3

A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.

Full text
Abstract:
Mobile Ad hoc Networks are widely used in defense applications where traditional wireless network is difficult to implement as the network is formed by autonomous and decentralized wireless nodes. Privacy and Security in MANET are the most important disquiet for basic functionality of the network. Security is the major challenge in MANETs because of its characteristics like resource constraints, open medium, lack of fixed infrastructure, dynamism of topology and no clear security mechanism. As the topology is dynamic, routing process is very difficult. So MANET often suffers from routing attac
APA, Harvard, Vancouver, ISO, and other styles
4

Dhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.

Full text
Abstract:
MANET (mobile ad hoc network) is a collection of mobile nodes that interact without the need for a fixed physical foundation. MANETs have grown in popularity as a result of characteristics like dynamic topology, quick setup, multi-hop data transfer, and so on. MANETs are well-suited to various real-time applications, including environmental monitoring, disaster management, and covert and military operations, because of their distinguishing characteristics. MANETs may also be used in conjunction with new technologies like cloud computing, IoT, and machine learning algorithms to help realize the
APA, Harvard, Vancouver, ISO, and other styles
5

L. Esteban, Allen Paul. "Anomaly Recognition in Wireless Ad-hoc Network by using Ant Colony Optimization and Deep Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (2023): 395–403. http://dx.doi.org/10.17762/ijritcc.v11i5.6692.

Full text
Abstract:
As a result of lower initial investment, greater portability, and lower operational expenses, wireless networks are rapidly replacing their wired counterparts. The new technology that is on the rise is the Mobile Ad-Hoc Network (MANET), which operates without a fixed network infrastructure, can change its topology on the fly, and requires no centralised administration to manage its individual nodes. As a result, MANETs must focus on network efficiency and safety. It is crucial in MANET to pay attention to outliers that may affect QoS settings. Nonetheless, despite the numerous studies devoted
APA, Harvard, Vancouver, ISO, and other styles
6

Dr., Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." International Journal of Advance and Applied Research 10, no. 3 (2023): 107–12. https://doi.org/10.5281/zenodo.7583280.

Full text
Abstract:
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.

Full text
Abstract:
With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key man
APA, Harvard, Vancouver, ISO, and other styles
8

RAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.

Full text
Abstract:
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a s
APA, Harvard, Vancouver, ISO, and other styles
9

Vikas and Dr. Shashiraj Teotia. "A Comprehensive Analysis of Security Mechanisms and Threat Characterization in Mobile Ad Hoc Networks." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 5 (2025): 732–37. https://doi.org/10.51583/ijltemas.2025.140500079.

Full text
Abstract:
Abstract: Mobile Ad Hoc Networks (MANETs) represent a critical advancement in wireless communication, enabling dynamic, infrastructure-less networking suitable for various applications, including military, disaster recovery, and remote sensing. However, their decentralized architecture, dynamic topology, and constrained resources expose them to a wide range of security challenges. This research paper presents a comprehensive evaluation of existing security mechanisms designed to protect MANETs, encompassing cryptographic protocols, intrusion detection systems, secure routing techniques, and tr
APA, Harvard, Vancouver, ISO, and other styles
10

Dhende, Sandeep, and Suresh Shirbahadurkar. "MACO-DHKE Based Secure Data Transmission in MANETs." International journal of electrical and computer engineering systems 13, no. 4 (2022): 245–52. http://dx.doi.org/10.32985/ijeces.13.4.1.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are the self-sufficient nodes with their unique characteristics, such as open wireless mediums and self-motivated topology, which suffers from security weaknesses. Due to the complexity of the MANET security architecture, it is difficult to detect and prevent security issues in the wired networks. Hence, this paper proposes a secure and QoS-aware data transmission in the MANET that improves the efficiency of the transmission. The optimal route, which is the shortest possible path, is chosen using the modified ant colony optimization algorithm (MACO algorithm) an
APA, Harvard, Vancouver, ISO, and other styles
11

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the securi
APA, Harvard, Vancouver, ISO, and other styles
12

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
13

Khan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.

Full text
Abstract:
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited battery power, mobility, dynamic topology, open media, and so on. Numerous MANET-related a
APA, Harvard, Vancouver, ISO, and other styles
14

Srividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
15

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Full text
Abstract:
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
APA, Harvard, Vancouver, ISO, and other styles
16

Ancy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.

Full text
Abstract:
MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANE
APA, Harvard, Vancouver, ISO, and other styles
17

Jain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.

Full text
Abstract:
Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show perfo
APA, Harvard, Vancouver, ISO, and other styles
18

MOHANRAJ, E., K. DURAISWAMY, and K. PRASANTH. "SECURE QoS-BASED ROUTING USING HIERARCHICAL KEY RANKING MODEL IN MANET." Journal of Circuits, Systems and Computers 23, no. 09 (2014): 1450128. http://dx.doi.org/10.1142/s021812661450128x.

Full text
Abstract:
Quality of service (QoS) and security have been considered as two competent units to govern and administer end-to-end traffic across network. A mobile ad hoc network (MANET) is a type of wireless communication, every node can act as a router or base station. Secure QoS-based routing is an important problem in MANET. A hierarchical key ranking (HKR) model is presented here for secure group communications in MANETs. To enhance the security, one-to-one random mapping is performed using hash-based message authentication code (HashMAC). Due to the dynamic nature and topological changes in MANET, gr
APA, Harvard, Vancouver, ISO, and other styles
19

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-rec
APA, Harvard, Vancouver, ISO, and other styles
20

Patel, Rajan, and Pariza Kamboj. "A Survey on Contemporary MANET Security: Approaches for Securing the MANET." International Journal of Engineering and Technology 9, no. 1 (2017): 98–112. http://dx.doi.org/10.21817/ijet/2017/v9i1/170901413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.

Full text
Abstract:
An ordinary, self-orbiting communication network with the ability to manage mobile nodes is called a mobile ad-hoc network (MANET). The vulnerability of the MANET to various threats and attacks is addressed by numerous proposed protocols. The malicious node takes advantage of these weaknesses to launch attacks, such as wormhole attacks, particularly when nodes are mobile and the network's topology is unstable. The termite method for detecting wormhole attacks in MANETs is presented in this research. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
22

Shankar, K., and Mohamed Elhoseny. "Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES." JUCS - Journal of Universal Computer Science 25, no. (10) (2019): 1221–39. https://doi.org/10.3217/jucs-025-10-1221.

Full text
Abstract:
In wireless communication, Mobile Ad Hoc Network (MANET) consists of a number of mobile nodes which are communicated with each other without any base station. One of the security attacks in MANETs is Packet forwarding misbehaviour attack; this makes MANETs weak by showing message loss behavior. For securing message transmission in MANET, the work proposes Energy Efficient Clustering Protocol (EECP) with Radial Basis Function (RBF) based CH is elected for formed Clusters. Moreover, here some Network measures are considered to detect the malicious nodes and CH model that is speed, mobility, trus
APA, Harvard, Vancouver, ISO, and other styles
23

Farooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.

Full text
Abstract:
Abstract: A mobile ad hoc network is made up of portable wireless nodes (MANET). The communication between these mobile nodes is not managed centralized. A self-organizing, self-configuring network known as MANET allows mobile nodes to roam around at whim. The mobile nodes can act as a router by receiving and sending packets. Due to the significance of routing in MANET, this thesis also evaluates several routing systems' efficacy. We compared the three routing protocols AODV, DSR, OLSR, and DSDV. Throughput, network load, and latency are the three metrics used to gauge how well-performing diff
APA, Harvard, Vancouver, ISO, and other styles
24

Kadhum, Aseel Nadhum. "Improved Digital Security Applications for Smart Card." Feb-Mar 2024, no. 42 (February 1, 2024): 11–18. http://dx.doi.org/10.55529/ijrise.42.11.18.

Full text
Abstract:
With the rapid expansion of wireless networks and mobile computing applications, the quality of service (QoS) of mobile ad hoc networks (MANETs) has garnered growing attention. Ensuring QoS in a MANET system requires careful consideration of security issues. Attacks on a QoS distortion system without the protection of a security mechanism might result in subpar QoS performance, interference with resource use, or even failure of QoS provisioning. Traditional security measures cannot be applied because to the characteristics of MANET, which include limited processing and communication power and
APA, Harvard, Vancouver, ISO, and other styles
25

Gottron, Christian, André König, and Ralf Steinmetz. "A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches." Future Internet 2, no. 4 (2010): 505–32. http://dx.doi.org/10.3390/fi2040505.

Full text
Abstract:
Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we
APA, Harvard, Vancouver, ISO, and other styles
26

Bronikovskii, E. A., та V. I. Nikonov. "АСTUAL SECURITY ASPECTS IN MANET'S". Dynamics of Systems, Mechanisms and Machines 8, № 4 (2020): 113–19. http://dx.doi.org/10.25206/2310-9793-8-4-113-119.

Full text
Abstract:
Мобильные самоорганизующиеся сети (MANET) привлекают к себе все больший интерес, благодаря своим преимуществам перед другими проводными и беспроводными видами сетей: быстрое и легкое развертывание сети, отсутствие необходимости в сетевых устройствах по причине выполнения мобильными узлами их функций. Целями статьи являлись обзор и классификация актуальных угроз информационной безопасности MANET, изучение и анализ исследований, предлагающих различные методы защиты от рассмотренных в работе угроз. Статья ориентирована на людей, только приступающих к изучению принципов работы беспроводных децентр
APA, Harvard, Vancouver, ISO, and other styles
27

Biswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.

Full text
Abstract:
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET  is  particularly  vulnerable  to  security attacks  in  comparison  to  wired  network  or infrastructure-based  wireless  network  due  to  its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and   transmi
APA, Harvard, Vancouver, ISO, and other styles
28

M. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.

Full text
Abstract:
In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data
APA, Harvard, Vancouver, ISO, and other styles
29

Harpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.

Full text
Abstract:
In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to han
APA, Harvard, Vancouver, ISO, and other styles
30

N, Chaitanya Kumar, Basit Abdul, Singh Priyadarshi, and Ch. Venkaiah V. "Lightweight Cryptography for Distributed PKI Based MANETS." International Journal ofComputer Networks & Communications (IJCNC) 10, no. 2 (2018): 69–83. https://doi.org/10.5281/zenodo.1226445.

Full text
Abstract:
Abstract. Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private key. The traditional PK
APA, Harvard, Vancouver, ISO, and other styles
31

Swain, Jhum, Binod Kumar Pattanayak, and Bibudhendu Pati. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks." International Journal of Information Security and Privacy 12, no. 2 (2018): 38–45. http://dx.doi.org/10.4018/ijisp.2018040103.

Full text
Abstract:
A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysi
APA, Harvard, Vancouver, ISO, and other styles
32

Sirajuddin, Mohammad, Ch Rupa, Surbhi Bhatia, R. N. Thakur, and Arwa Mashat. "Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–8. http://dx.doi.org/10.1155/2022/9134036.

Full text
Abstract:
The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for information exchange in various domains. MANET is a group of versatile nodes that communicates with each other without relying on a fixed physical framework. One of the prominent features of MANET is its versatile topology. Because of this striking feature, MANETs are employed in various domains like defense and combat operations, disaster management, healthcare, and environmental monitoring. In this paper, we enlighten the sign
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Pengkun, Momiao Zhou, and Zhizhong Ding. "A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks." Sensors 21, no. 7 (2021): 2355. http://dx.doi.org/10.3390/s21072355.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics. Obviously, it is important to implement a low-cost and efficient mechanism of anti-invasion, anti-eavesdropping and anti-attack in MANETs, especially for military scenarios. The purpose of intruding or attacking a MANET is usually different from that of wired Internet networks whose security mechanism has been widely explored and implemented. For MANETs, moving target defense (MTD) is a suitable mech
APA, Harvard, Vancouver, ISO, and other styles
34

Rajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.

Full text
Abstract:
The procession in the area of internet due to wireless networking technologies gives rise to multiple new applications. In the past few decades, we have found many advance developments in wireless networks. With these developments and large number of applications that are being provided by MANETs, we still face some challenges that have to be overcome. The baseless and active nature of these networks demand new set of networking schemes that should be implemented to provide effective peer-to-peer communication. MANETs hire traditional TCP/IP structure to provide this peer-to-peer communication
APA, Harvard, Vancouver, ISO, and other styles
35

Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.

Full text
Abstract:
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the
APA, Harvard, Vancouver, ISO, and other styles
36

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols ar
APA, Harvard, Vancouver, ISO, and other styles
37

Punya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.

Full text
Abstract:
Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first and then some protection mechanisms against those attacks are discussed. Comparisons
APA, Harvard, Vancouver, ISO, and other styles
38

Abdourahime, GAYE, and KONATE Karim. "The Nash'S Balance in the Theory of Games for A Secure Model Mechanism in Routing Protocol of Manet." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 1–12. https://doi.org/10.5281/zenodo.3351937.

Full text
Abstract:
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a p
APA, Harvard, Vancouver, ISO, and other styles
39

Prasanna, D. S. John Deva, Dr D. John Aravindhar, and Dr P. Sivasankar. "Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud - MANET." Webology 18, SI01 (2021): 88–106. http://dx.doi.org/10.14704/web/v18si01/web18025.

Full text
Abstract:
Cloud MANET is a latest technique in which individual smart devices joins the Cloud MANET and can communicate in a distributed fashion. This is advantageous, as the Smart device does not need any infrastructural establishments. These nodes communicate together. Several MANETS formed in manner can be connected to cloud and can avail cloud services in real time. In this paper we attempt to establish a virtual backbone of Cloud MANET nodes using the concept Connected Dominating Sets, we also introduced a lightweight security scheme in order to avoid blackhole and greyhole attacks. The algorithm u
APA, Harvard, Vancouver, ISO, and other styles
40

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
APA, Harvard, Vancouver, ISO, and other styles
41

Rakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.

Full text
Abstract:
The Mobile ad hoc networks (MANET) have become most significant and are being used widely in many applications. Generally, these applications require low cost, low energy and low data nodes that communicating over multiple hop to cover a large geographical area. In internet protocol version (IPv6) based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through auto configuration so the chances of energy consumption and security of network become high. This paper presents a survey of different routing protocols of IPv6 based MANET to minimize the
APA, Harvard, Vancouver, ISO, and other styles
42

Adjih, Cedric, Pascale Minet, Paul Muhlethaler,, Emmanuel Baccelli, and Thierry Plesse. "Quality of service support, security and OSPF interconnection in a MANET using OLSR." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 70–76. http://dx.doi.org/10.26636/jtit.2008.2.874.

Full text
Abstract:
The MANET networks are of prime interest for military networks. One of the proeminent routing protocols for MANET is OLSR, and indeed, OLSR has been used in many evaluations and experiments of MANETs. As OLSR is on its way to standardization, there are still a number of extensions that are useful and sometimes necessary for practical use of OLSR networks: such extensions are quality of service support, security, and OSPF interconnection. In this paper, we present the architecture, design, specifications and implementations that we made to integrate these features in a military test-bed. This t
APA, Harvard, Vancouver, ISO, and other styles
43

M. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.

Full text
Abstract:
The security loopholes present in the wireless network especially MANET makes it vulnerable and weak. Most of the users are much concerned about the very security of the network and hesitate to participate actively in the transactions. Very powerful and strange attacks are pinpointed by many research scholars in the past. The Sybil attack is one of the most detrimental attacks imparted on MANETS where plethora of authentic nodes are faked and forged to enable illegal entry into a network to disrupt the very security of the MANET. The Sybil attack acts and simulates like an existing node presen
APA, Harvard, Vancouver, ISO, and other styles
44

A., Yashwanth Reddy, Rakesh Chowdary M., and Krishna A. "AUTHENTICATED ANONYMOUS SECURE ROUTING STRATEGY FOR HIGH SPEED NETWORKS." International Journal of Applied and Advanced Scientific Research 2, no. 2 (2017): 196–201. https://doi.org/10.5281/zenodo.1034459.

Full text
Abstract:
MANETs operates in different propagation and network operating conditions. For security purpose MANET operates on many security protocols, power/energy-efficient protocol. Many of an existing routing protocol for security enhancement is based on location based routing and some gets attack from the attacker and also provide delay in packet transmission. In this paper proposal routing protocol method is Trust model Authenticated Anonymous Secure Routing (TAASR). Group Signature and Onion Routing with the trust model increases the efficiency of routing in MANET. Group signature in this secure rou
APA, Harvard, Vancouver, ISO, and other styles
45

Rakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "AN ARTIFICIAL INTELLIGENCE BASED LIGHT WEIGHT CRYPTOGRAPHIC ADDRESS GENERATION (LW-CGA) USING OPTIMIZATION FOR IPv6 BASED MANETs." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 251–61. https://doi.org/10.5281/zenodo.1345600.

Full text
Abstract:
Due to rising application requests and also for dependable data transfer, security concern is one the important research areas in the field of mobile ad hoc networks (MANET). As we know that MANET is formed by a number of mobile nodes and each node communicate with each other using their energy capabilities. To solve the security and routing protocol in IPv6 based MANET, the Secure Neighbor Discovery (SeND) routing protocol will be designed with concept of artificial intelligence techniques to overcome the security threats during auto-configuration has proven to face security and technical iss
APA, Harvard, Vancouver, ISO, and other styles
46

Tongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) have become indispensable in modern military operations; they provide decentralized, adaptive, and resilient communication frameworks in dynamic battlefield environments. This paper presents a comprehensive review of MANET innovations, challenges, and research gaps, focusing on advancements in security mechanisms, energy efficiency, routing optimization, interoperability, and AI-driven management systems. MANETs enhance military communication by enabling self-forming and self-healing networks, improving situational awareness, tactical coordination, and mission s
APA, Harvard, Vancouver, ISO, and other styles
47

Drishya, Sr, and Vaidehi Vijayakumar. "A REVIEW ON SECURITY ENHANCEMENT THROUGH ANONYMOUS ROUTING IN MANET." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 166. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19629.

Full text
Abstract:
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network at anytime. MANET also has less resources and limited security. MANET is vulnerable to attacks because of its lack of centralized infrastructure. Security in MANET can be achieved by Anonymous routing which hide source, destinationand route information to provide. This paper provides a review on efficient anonymous routing protocols used in MANET and also compares the security in terms of identity, location and route anonymity. An anonymous routing protocol that conceals the essential details an
APA, Harvard, Vancouver, ISO, and other styles
48

Ashish, kumar khare1 Dr. R. C. Jain2 and Dr. J. L. Rana3. "A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET." Informatics Engineering, an International Journal (IEIJ), 03, sep (2015): 01–10. https://doi.org/10.5121/ieij.2015.3301.

Full text
Abstract:
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maint
APA, Harvard, Vancouver, ISO, and other styles
49

S, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.

Full text
Abstract:
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for communication. In this network, nodes are self-organized and can act as router. They are battery operated and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible application of Block chain in many sectors including MANETs. This paper surveys the existing researches done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for improving security while routing packets from one node to another. Some researchers have proposed trust model
APA, Harvard, Vancouver, ISO, and other styles
50

Sangheethaa, S. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems (IJANS) 13, no. 3 (2023): 7. https://doi.org/10.5281/zenodo.8170599.

Full text
Abstract:
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for communication. In this network, nodes are self-organized and can act as router. They are battery operated and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible application of Block chain in many sectors including MANETs. This paper surveys the existing researches done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for improving security while routing packets from one node to another. Some researchers have proposed trust model
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!