A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and Verification
2019
IEEE Access
Routing security plays an important role in the mobile ad hoc networks (MANETs). Despite many attempts to improve its security, the routing mechanism of MANETs remains vulnerable to attacks. ...
INDEX TERMS Wireless network security, anomalies detection, distributed verification. 35302 2169-3536 ...
DESCRIPTION OF DAPV In this section, we present the details of our anomalies diagnosing mechanism with provenance and reasoning.
A. ...
doi:10.1109/access.2019.2903150
fatcat:qnekutpwgvck5ni62xqlwslwrq
A Recurrent Reward Based Learning Technique for Secure Neighbor Selection in Mobile AD-HOC Networks
2021
IEEE Access
[10] introduced diagnosing anomalies with provenance and verification (DAPV method) for improving the routing efficiency of MANETs. ...
DAPV is legitimate in detecting direct and indirect routing adversaries. For this purpose, DAPV utilizes peer logs and Merkle based hash trees for secure neighbor detection and authentication. ...
His research interests are optimal allocation of compensating devices in the distribution networks using optimization algorithms. ...
doi:10.1109/access.2021.3055422
fatcat:rmunw4mutfedjgqz54vzwilbrq
Energy Preserving Secured Route Selection Algorithm Based on Hybrid Metaheuristic Algorithms for MANET
2019
International Journal of Intelligent Engineering and Systems
MANET is severely energy constrained, due to the capricious mobility rate and the deployed hostile environment. The most energy consuming activity of mobile sensors is the process of routing. ...
The proposed work shows better performance than the comparative approaches with increased energy efficiency and thereby network lifetime. ...
In [17] , a MANET routing scheme is proposed by Diagnosing the Anomalies with Provenance and Verification (DAPV). ...
doi:10.22266/ijies2019.1231.12
fatcat:f2grepsw5rb7jlt6m6rhowy6dm
A Novel Integrated Scheme for Detection and Mitigation of Route Diversion Attack in MANET
2021
International Journal of Advanced Computer Science and Applications
Anomalies in MANETs Routing With Provenance and Verification," [30] K. S. Sankaran, N. Vasudevan, K. R. Devabalaji, T. S. Babu, H. H. ...
Fish Attack in MANET," IEEE Access, vol. 6, pp. 56954-56965, 2018,
[15] T. Li, J. Ma, Q. Pei, H. Song, Y. Shen and C. Sun, "DAPV: Diagnosing doi: 10.1109/ACCESS.2018.2868544. ...
doi:10.14569/ijacsa.2021.0121143
fatcat:hifeiouzh5bjdec7fe53gtdldq
Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET
2021
Indian Journal of Computer Science and Engineering
Secure Priority based Routing is presented by Particle Swarm Optimization (PSO) method. In this step, bi-fitness optimizer is used. ...
The simulation is conducted by using NS3.26 network simulator that computes the performance in terms of QoS metrics. ...
In [Li, T. et al.,2019] author proposes a new model namely diagnosing anomalies with provenance and verification in routing under MANET environment. It is shortly referred as DAPV. ...
doi:10.21817/indjcse/2021/v12i5/211205158
fatcat:sao647dpyfhkzkqkjjd7orlmbq