5 Hits in 2.7 sec

DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and Verification

Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun
2019 IEEE Access  
Routing security plays an important role in the mobile ad hoc networks (MANETs). Despite many attempts to improve its security, the routing mechanism of MANETs remains vulnerable to attacks.  ...  INDEX TERMS Wireless network security, anomalies detection, distributed verification. 35302 2169-3536  ...  DESCRIPTION OF DAPV In this section, we present the details of our anomalies diagnosing mechanism with provenance and reasoning. A.  ... 
doi:10.1109/access.2019.2903150 fatcat:qnekutpwgvck5ni62xqlwslwrq

A Recurrent Reward Based Learning Technique for Secure Neighbor Selection in Mobile AD-HOC Networks

K. Sakthidasan Sankaran, N. Vasudevan, K.R. Devabalaji, Thanikanti Sudhakar Babu, Hassan Haes Alhelou, T Yuvaraj
2021 IEEE Access  
[10] introduced diagnosing anomalies with provenance and verification (DAPV method) for improving the routing efficiency of MANETs.  ...  DAPV is legitimate in detecting direct and indirect routing adversaries. For this purpose, DAPV utilizes peer logs and Merkle based hash trees for secure neighbor detection and authentication.  ...  His research interests are optimal allocation of compensating devices in the distribution networks using optimization algorithms.  ... 
doi:10.1109/access.2021.3055422 fatcat:rmunw4mutfedjgqz54vzwilbrq

Energy Preserving Secured Route Selection Algorithm Based on Hybrid Metaheuristic Algorithms for MANET

Kokila Surampatti, Bharathiar University, Brindha Lakshmanan, Queen Mary's college
2019 International Journal of Intelligent Engineering and Systems  
MANET is severely energy constrained, due to the capricious mobility rate and the deployed hostile environment. The most energy consuming activity of mobile sensors is the process of routing.  ...  The proposed work shows better performance than the comparative approaches with increased energy efficiency and thereby network lifetime.  ...  In [17] , a MANET routing scheme is proposed by Diagnosing the Anomalies with Provenance and Verification (DAPV).  ... 
doi:10.22266/ijies2019.1231.12 fatcat:f2grepsw5rb7jlt6m6rhowy6dm

A Novel Integrated Scheme for Detection and Mitigation of Route Diversion Attack in MANET

H C Ramaprasad, S. C. Lingareddy
2021 International Journal of Advanced Computer Science and Applications  
Anomalies in MANETs Routing With Provenance and Verification," [30] K. S. Sankaran, N. Vasudevan, K. R. Devabalaji, T. S. Babu, H. H.  ...  Fish Attack in MANET," IEEE Access, vol. 6, pp. 56954-56965, 2018, [15] T. Li, J. Ma, Q. Pei, H. Song, Y. Shen and C. Sun, "DAPV: Diagnosing doi: 10.1109/ACCESS.2018.2868544.  ... 
doi:10.14569/ijacsa.2021.0121143 fatcat:hifeiouzh5bjdec7fe53gtdldq

Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET

Haridas .S, Dr.A. Rama Prasath
2021 Indian Journal of Computer Science and Engineering  
Secure Priority based Routing is presented by Particle Swarm Optimization (PSO) method. In this step, bi-fitness optimizer is used.  ...  The simulation is conducted by using NS3.26 network simulator that computes the performance in terms of QoS metrics.  ...  In [Li, T. et al.,2019] author proposes a new model namely diagnosing anomalies with provenance and verification in routing under MANET environment. It is shortly referred as DAPV.  ... 
doi:10.21817/indjcse/2021/v12i5/211205158 fatcat:sao647dpyfhkzkqkjjd7orlmbq