Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In addition, Trusted Forwarding Factor (TFF)… More >

  • Open Access

    ARTICLE

    Prediction of Link Failure in MANET-IoT Using Fuzzy Linear Regression

    R. Mahalakshmi1,*, V. Prasanna Srinivasan2, S. Aghalya3, D. Muthukumaran4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1627-1637, 2023, DOI:10.32604/iasc.2023.032709

    Abstract A Mobile Ad-hoc NETwork (MANET) contains numerous mobile nodes, and it forms a structure-less network associated with wireless links. But, the node movement is the key feature of MANETs; hence, the quick action of the nodes guides a link failure. This link failure creates more data packet drops that can cause a long time delay. As a result, measuring accurate link failure time is the key factor in the MANET. This paper presents a Fuzzy Linear Regression Method to measure Link Failure (FLRLF) and provide an optimal route in the MANET-Internet of Things (IoT). This work aims to predict link… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1905-1921, 2023, DOI:10.32604/cmc.2023.032157

    Abstract In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However, MANET’s lack of infrastructure, unpredictable topology, and restricted resources, as well as the lack of a previously permitted trust relationship among connected nodes, contribute to the attack detection burden. A novel detection approach is presented in this paper to classify passive and active black-hole attacks. The proposed approach is based on the dipper throated optimization (DTO) algorithm, which… More >

  • Open Access

    ARTICLE

    Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

    S. Maheswari, R. Vijayabhasker*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3677-3692, 2023, DOI:10.32604/iasc.2023.031422

    Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work. Initially, the QoS-based trust estimation is proposed by using a Fuzzy logic scheme. The trust… More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism (HTRM). In addition,… More >

  • Open Access

    ARTICLE

    Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET

    J. Shanthini1, P. Punitha2,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2619-2636, 2023, DOI:10.32604/csse.2023.027330

    Abstract In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating… More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce exceptional outcomes. This study proposes… More >

  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit an investigation on asymmetric links… More >

  • Open Access

    ARTICLE

    Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET

    S. Padmapriya1, R. Shankar2, R. Thiagarajan1,*, N. Partheeban3, A. Daniel3, S. Arun4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 491-505, 2023, DOI:10.32604/iasc.2023.027719

    Abstract The Mobile Ad-hoc Network (MANET) is a dynamic topology that provides a variety of executions in various disciplines. The most sticky topic in organizational fields was MANET protection. MANET is helpless against various threats that affect its usability and accessibility. The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organization's execution and reliability by dropping all approaching packages via the noxious node. The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target… More >

Displaying 1-10 on page 1 of 12. Per Page