Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults. Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

[1]  Binod Kumar Pattanayak,et al.  Prevention of Replay Attack Using Intrusion Detection System Framework , 2019 .

[2]  Mamata Rath Spectrum Access Issues and Security in Cognitive Radio Network , 2019, Int. J. Organ. Collect. Intell..

[3]  Raja Datta,et al.  A Secure Addressing Scheme for Large-Scale Managed MANETs , 2015, IEEE Transactions on Network and Service Management.

[4]  Jodie Wetherall,et al.  SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[5]  Mohammad S. Obaidat,et al.  FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.

[6]  Binod Kumar Pattanayak,et al.  MAQ: A Mobile Agent Based Quality of Service Platform for MANETs , 2017, Int. J. Bus. Data Commun. Netw..

[7]  Mamata Rath,et al.  Resource provision and QoS support with added security for client side applications in cloud computing , 2019 .

[8]  Gaurav Sharma,et al.  An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks , 2017, Scalable Comput. Pract. Exp..

[9]  Priyanka Patil,et al.  Improved ALERT protocol in MANET with strategies to prevent DOS & MITM attacks , 2016, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).

[10]  Brij B. Gupta,et al.  Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel , 2016 .

[11]  Takahiro Hara,et al.  Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs , 2016, IEEE Access.

[12]  Govindaraju Radhamani,et al.  Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks , 2015, Journal of Communications and Networks.

[13]  Michelle S. Wangham,et al.  Reliable data dissemination protocol for VANET traffic safety applications , 2017, Ad Hoc Networks.

[14]  G. Rajkumar,et al.  Enhanced performance of AODV with power boosted alternate path , 2013, 2013 International Conference on Computer Communication and Informatics.

[15]  Jeong Hyun Yi,et al.  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[16]  Madasamy Kaliappan,et al.  Development of a secure routing protocol using game theory model in mobile ad hoc networks , 2015, Journal of Communications and Networks.

[17]  Praveen Joshi Security issues in routing protocols in MANETs at network layer , 2011, WCIT.

[18]  Binod Kumar Pattanayak,et al.  Monitoring of QoS in MANET Based Real Time Applications , 2017 .

[19]  Ajay Kaul,et al.  Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..

[20]  Takahiro Hara,et al.  ${k}$ Nearest Neighbor Search for Location-Dependent Sensor Data in MANETs , 2015, IEEE Access.

[21]  Gene Tsudik,et al.  Privacy-Preserving Location-Based On-Demand Routing in MANETs , 2011, IEEE Journal on Selected Areas in Communications.

[22]  Binod Kumar Pattanayak,et al.  Cross layer based QoS platform for multimedia transmission in MANET , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[23]  Mamata Rath,et al.  Study and Analysis of Smart Applications in Smart City Context , 2017, 2017 International Conference on Information Technology (ICIT).

[24]  Elisa Bertino,et al.  Fine-Grained Analysis of Packet Loss in MANETs , 2017, IEEE Access.

[25]  R. Madhanmohan,et al.  Power controlled routing in wireless ad hoc networks using cross layer approach , 2012 .

[26]  Jalel Ben-Othman,et al.  GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs , 2017, IEEE Transactions on Mobile Computing.

[27]  Binod Kumar Pattanayak,et al.  Energy Competent Routing Protocol Design in MANET with Real Time Application Provision , 2015, Int. J. Bus. Data Commun. Netw..

[28]  Gulshan Shrivastava,et al.  Network forensics: Methodical literature review , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[29]  Mamata Rath,et al.  Security Issues in Mobile Devices and Mobile Adhoc Networks , 2018 .

[30]  W. P. M. H. Heemels,et al.  Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.

[31]  Sanjay Kumar Sharma,et al.  Improved energy efficient secure multipath AODV routing protocol for MANET , 2014, 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).

[32]  Mamata Rath Technical and Operational Utility of Ubiquitous Devices with Challenging Issues in Emerging Ubiquitous Computing , 2018 .

[33]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[34]  Mamata Rath,et al.  QTM: A QoS Task Monitoring System for Mobile Ad hoc Networks , 2019 .

[35]  Sami Muhaidat,et al.  Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET , 2016, Veh. Commun..

[36]  Mamata Rath,et al.  Communication Improvement and Traffic Control Based on V2I in Smart City Framework , 2018 .

[37]  Mamata Rath Effective Routing in Mobile Ad-hoc Networks With Power and End-to-End Delay Optimization: Well Matched With Modern Digital IoT Technology , 2018 .

[38]  Sushruta Mishra,et al.  Advanced-Level Security in Network and Real-Time Applications Using Machine Learning Approaches , 2019, Machine Learning and Cognitive Science Applications in Cyber Security.

[39]  Syed Asad Hussain,et al.  A game theory based trust model for Vehicular Ad hoc Networks (VANETs) , 2017, Comput. Networks.

[40]  Mamata Rath Security in IoT and Big Data With Technical Challenges , 2019 .

[41]  P PatilV. Efficient AODV Routing Protocol for MANET with enhanced packet delivery ratio and minimized end to end delay , 2012 .

[42]  Binod Kumar Pattanayak,et al.  SCICS: A Soft Computing Based Intelligent Communication System in VANET , 2017 .

[43]  Mamata Rath,et al.  MAQ system development in mobile ad-hoc networks using mobile agents , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[44]  Binod Kumar Pattanayak,et al.  Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET , 2019, Int. J. Inf. Secur. Priv..

[45]  Binod Kumar Pattanayak,et al.  Inter-layer communication based QoS platform for real time multimedia applications in MANET , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[46]  Vijender Kumar Solanki,et al.  Contribution of IoT and Big Data in Modern Health Care Applications in Smart City , 2019 .

[47]  Mamata Rath,et al.  A Methodical Analysis of Application of Emerging Ubiquitous Computing Technology With Fog Computing and IoT in Diversified Fields and Challenges of Cloud Computing , 2018, Int. J. Inf. Commun. Technol. Hum. Dev..

[48]  B. B. Gupta,et al.  Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices , 2018, Int. J. E Serv. Mob. Appl..

[49]  Marco Carvalho Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.

[50]  R. Baskaran,et al.  ENERGY SUPPORTED AODV (EN-AODV) FOR QOS ROUTING IN MANET , 2013 .

[51]  V. R. Chirchi,et al.  OAODV Routing Algorithm for Improving Energy Efficiency in MANET , 2012 .

[52]  N. Sukavanam,et al.  An unsupervised learning based neural network approach for a robotic manipulator , 2017 .

[53]  Mamata Rath Information Security Problem and Solution Approaches in Social Applications , 2019 .

[54]  T. R. Reshmi,et al.  Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs , 2017, China Communications.

[55]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[56]  Binod Kumar Pattanayak,et al.  An Overview on Social Networking: Design, Issues, Emerging Trends, and Security , 2019, Social Network Analytics.

[57]  Binod Kumar Pattanayak,et al.  A Mobile Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks , 2014, J. Comput. Sci..

[58]  Binod Kumar Pattanayak,et al.  Mobile Agent-Based Improved Traffic Control System in VANET , 2018, Integrated Intelligent Computing, Communication and Security.

[59]  Binod Kumar Pattanayak,et al.  Resource Reservation and Improved QoS for Real Time Applications in MANET , 2016 .

[60]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[61]  Binod Kumar Pattanayak,et al.  Comparative analysis of AODV routing protocols based on network performance parameters in Mobile Adhoc Networks , 2016 .

[62]  Lionel C. Briand,et al.  Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning , 2015, IEEE Transactions on Dependable and Secure Computing.

[63]  Ming Yu,et al.  AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.

[64]  Yaghoub Farjami,et al.  NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET , 2018, Comput. Networks.

[65]  J. Paulo Davim,et al.  Handbook of IoT and Big Data , 2019 .

[66]  Binod Kumar Pattanayak,et al.  Network Security: Attacks and Control in MANET , 2018 .

[67]  Jonathan Rodriguez,et al.  Reliability and energy-efficiency analysis of safety message broadcast in VANETs , 2018, Comput. Commun..

[68]  Mamata Rath,et al.  Real Time Analysis Based on Intelligent Applications of Big Data and IoT in Smart Health Care Systems , 2018, Data Analytics in Medicine.

[69]  Binod Kumar Pattanayak,et al.  Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications , 2016 .

[70]  Marco Grangetto,et al.  Exploiting Rateless Codes and Belief Propagation to Infer Identity of Polluters in MANET , 2014, IEEE Transactions on Mobile Computing.

[71]  Mamata Rath,et al.  An Exhaustive Study and Analysis of Assorted Application and Challenges in Fog Computing and Emerging Ubiquitous Computing Technology , 2018, Int. J. Appl. Evol. Comput..

[72]  Kavita Sharma,et al.  Cross-Layer Based Intrusion Detection and Prevention for Network , 2018 .

[73]  Louise Lamont,et al.  Impact of trust-based security association and mobility on the delay metric in MANET , 2016, Journal of Communications and Networks.

[74]  Binod Kumar Pattanayak,et al.  Manifold Surveillance Issues in Wireless Network and the Secured Protocol , 2020, Int. J. Inf. Secur. Priv..

[75]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[76]  Mamata Rath,et al.  Security Assertion of IoT Devices Using Cloud of Things Perception , 2019, Int. J. Interdiscip. Telecommun. Netw..

[77]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[78]  Mamata Rath Delay and power based network assessment of network layer protocols in MANET , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[79]  Hsiao-Hwa Chen,et al.  A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study , 2009, IEEE Transactions on Vehicular Technology.

[80]  Leena Ragha,et al.  Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack , 2015 .

[81]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[82]  S. Prakash,et al.  An ACO look-ahead approach to QOS enabled fault- tolerant routing in MANETs , 2015, China Communications.

[83]  Mamata Rath,et al.  Prioritization of Security Measures at the Junction of MANET and IoT , 2016, ICTCS '16.

[84]  Mamata Rath Intelligent Information System for Academic Institutions: Using Big Data Analytic Approach , 2019 .

[85]  Binod Kumar Pattanayak,et al.  Relevance of Soft Computing Techniques in the Significant Management of Wireless Sensor Networks , 2018, Soft Computing in Wireless Sensor Networks.

[86]  Binod Kumar Pattanayak,et al.  A methodical survey on real time applications in MANETS: Focussing on key issues , 2014, 2014 International Conference on High Performance Computing and Applications (ICHPCA).

[87]  Binod Kumar Pattanayak,et al.  Technological improvement in modern health care applications using Internet of Things (IoT) and proposal of novel health care approach , 2019, International Journal of Human Rights in Healthcare.

[88]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[89]  Sudip Misra,et al.  E2-SCAN: an extended credit strategy-based energy-efficient security scheme for wireless ad hoc networks , 2009, IET Commun..

[90]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[91]  Manju Khari,et al.  Role of Cyber Security and Cyber Forensics in India , 2018 .

[92]  Mamata Rath,et al.  Smart Traffic Management System for Traffic Control using Automated Mechanical and Electronic Devices , 2018, IOP Conference Series: Materials Science and Engineering.