Main Article Content
Abstract
Mobile Ad hoc Networks remain vulnerable to a wide range of security threats, yet existing MANET security reviews provide fragmented insight into how recent studies frame security problems, model threats, and report design choices. This descriptive systematic review follows PRISMA guidelines and examines MANET security studies published between January and August 2025. A total of 51 studies were analyzed using a structured coding process covering security themes, attack types, defense techniques, threat modeling assumptions, detection logic, and reporting completeness. The results show convergence around a limited set of recurring attack models and reusable defense patterns. Both machine learning and deep learning, along with detection-oriented, trust-based, and optimization techniques, appear across multiple security themes rather than being confined to a single problem framing. However, threat specification, detection target definition, and trust design reporting are often incomplete or inconsistent, which limits reproducibility and cross-study comparison. Evaluation orientation, including performance metrics and experimental validation practices, is identified as an important direction for future work.
Keywords
Article Details
References
- Swain J, Pattanayak BK, Pati B. A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks. International Journal of Information Security and Privacy (IJISP) 2018;12:38–45. https://doi.org/10.4018/IJISP.2018040103.
- Gurung S, Chauhan S. A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Networks 2019 26:3 2019;26:1981–2011. https://doi.org/10.1007/S11276-019-01966-Z.
- Hassan SM, Mohamad MM, Muchtar FB. Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks. IEEE Access 2024. https://doi.org/10.1109/ACCESS.2024.3457682.
- Zhang C, Zhou MC, Yu M. Ad hoc network routing and security: A review. International Journal of Communication Systems 2007;20:909–25. https://doi.org/10.1002/DAC.840.
- Rodriguez-Baeza JA, Magan-Carrion R, Ruiz-Villalobos P. Advances on Security in Ad Hoc Networks: A preliminary analysis. Iberian Conference on Information Systems and Technologies, CISTI, Chaves, Portugal: IEEE Computer Society; 2021, p. 1–5. https://doi.org/10.23919/CISTI52073.2021.9476278.
- Mohandas R, Sivapriya N, Vaigandla KK, Kirubasankar K. Detection and Mitigation of Attacks in MANETs: A Comprehensive Survey of Security Techniques. Proceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024, Gobichettipalayam, India: IEEE; 2024, p. 1478–85. https://doi.org/10.1109/ICUIS64676.2024.10866793.
- Cho JH, Swami A, Chen IR. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials 2011;13:562–83. https://doi.org/10.1109/SURV.2011.092110.00088.
- Sathiya R, Yuvaraj N. Analyzing intrusion detection systems in mobile ad-hoc network architectures: A systematic review. In: Dagur A, Singh K, Mehra PS, Shukla DK, editors. Intelligent Computing and Communication Techniques, vol. 3. 1st ed., CRC Press; 2025, p. 238–42. https://doi.org/10.1201/9781003635680-37.
- Agor AD, Ami-Narh JT, Banning LA, Brown SA, Elliot MAA, Tanye HA. Hybridizing Intelligent Water Drops and River Formation Dynamics for Optimal Routing Path Selection with Minimum Energy in MANETs. Journal of Artificial Intelligence and Technology 2025:1–9. https://doi.org/10.37965/JAIT.2025.0575.
- Agor AD, Asante M, Hayfron-Acquah JB, Ami-Narh JT, Aziale LK, Peasah KO. A power-aware river formation dynamics routing algorithm for enhanced longevity in MANETs. International Journal of Computer Networks and Applications 2024;11:274–89. https://doi.org/10.22247/ijcna/2024/17.
- Agor AD, Asante M, Hayfron-Acquah JB, Peasah KO, Agangiba M, Elliot MAA, et al. Power-aware intelligent water drops routing algorithm for best path selection in MANETs. International Journal of Communication Networks and Information Security 2024;16:1–13.
- Nazir MK, Rehman RU, Nazir A. A novel review on security and routing protocols in MANET. Communications and Network 2016;8:205–18. https://doi.org/10.4236/cn.2016.84020.
- Prasath S. A study on manet and its security issues. National Conference on Recent Advances in Commerce, Management and Computer Science (NRCACMC-2020), vol. 22, Avadi, Chennai-62: Department of Commerce, VEL TECH Ranga Sanku Arts College; 2020, p. 66–74.
- Paliwal G, Mudgal AP, Taterh S. A study on various attacks of TCP/IP and security challenges in MANET layer architecture. Fourth International Conference on Soft Computing for Problem Solving, Advances in Intelligent Systems and Computing 336, 2018, p. 195–209. https://doi.org/10.1007/978-81-322-2220-0_16.
- Panda N, Patra B, Hota S. MANET routing attacks and their countermeasures: A survey. Journal of Critical Reviews 2020;7:2777–92. https://doi.org/10.31838/jcr.07.13.428.
- Karthigha M, Latha L, Sripriyan K. A comprehensive survey of routing attacks in wireless mobile ad hoc networks. 5th International Conference on Inventive Computation Technologies, ICICT 2020, Institute of Electrical and Electronics Engineers Inc.; 2020, p. 396–402. https://doi.org/10.1109/ICICT48043.2020.9112588.
- Saha HN, Bhattacharyya D, Banerjee B, Mukherjee S, Singh R, Ghosh D. A review on attacks and secure routing protocols in MANET. International Journal of Innovative Research and Review 2013;1:12–36.
- Ali MA, Sarwar Y. Security issues regarding MANET (Mobile Ad Hoc Networks): challenges and solutions. Blekinge Institute of Technology, 2011.
- Tayal S, Gupta V. A survey of attacks on manet routing protocols. International Journal of Innovative Research in Science, Engineering and Technology 2013;2:1180–2285.
- Joshi K, Kumar K. Security breaches of mobile ad-hoc networks (MANET) - A review. Educational Administration Theory and Practice 2024;30:2656–65. https://doi.org/10.53555/kuey.v30i4.1912.
- Agor AD, Kwami Aziale L, Kataka Banaseka F, Owusu-Agyemang K, Brown SA, Partey BT. Trust and adaptiveness enhancements to PRFDRA for secure metaheuristic path selection in MANETs 2025;5:168–79. https://doi.org/10.55670/fpll.futech.5.1.15.
- Arulselvan G, Rajaram A. Routing attacks detection in MANET using trust management enabled hybrid machine learning. Wireless Networks 2025;31:1481–95. https://doi.org/10.1007/S11276-024-03846-7/METRICS.
- Akanksha, Mahapatra RP, Chaudhary H. Analysis and Design of Reliable Node Routing Mechanism for MANET using Fuzzy Logic. 2025 3rd International Conference on Communication, Security, and Artificial Intelligence, ICCSAI 2025, Greater Noida, India: Institute of Electrical and Electronics Engineers Inc.; 2025, p. 1346–51. https://doi.org/10.1109/ICCSAI64074.2025.11064038.
- Sarangi SK, Lenka R, Nanda A, Panda BS. Development of MD-LSTM for malicious detection and hybrid coati and dolphin swarm optimization for QoS-aware multicast routing in MANET environment. Computers and Electrical Engineering 2025;123:110086. https://doi.org/10.1016/J.COMPELECENG.2025.110086.
- Adilakshmi Y, Raziya S, Avinash S, Chaitanya VS, Siddi NG. A Secure Defensive Mechanism Against DDoS Attack in MANETs Using ML: Classification Algorithms. 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), Bhimdatta, Nepal: IEEE; 2025, p. 1021–9. https://doi.org/10.1109/ICSADL65848.2025.
- Bhutia R, Mothukuri R. Design of a one-dimensional network model for evaluating security threats in MANET. Information Security Journal: : A Global Perspective 2025:1. https://doi.org/10.1080/19393555.2025.2522436.
- Mohammed FJ, Andalib A, Azgomi H, Sharifi SA. Enhancing the Security of Mobile Ad-hoc Networks: A Black Hole Attack Mitigation Approach Using Response Time and Machine Learning Models. Journal of Industrial and Systems Engineering 2025;17:204–16. https://doi.org/10.1002/ETT.3676.
- Jangade V, Nirkhi S. A Novel Approach For Optimising Communication And Secure Connectivity In Mobile Ad-Hoc Networks (Manets). International Journal of Environmental Sciences 2025;11:1229–39. https://doi.org/10.64252/T0ANXP71.
- Priya SS, Vijayabhasker R, Rajaram A. Advanced Security and Efficiency Framework for Mobile Ad-Hoc Networks Using Adaptive Clustering and Optimization Techniques. Journal of Electrical Engineering and Technology 2025;20:1815–26. https://doi.org/10.1007/S42835-024-02119-9/METRICS.
- Mohsen Hassan S, Mohamad MM, Binti Muchtar F. Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols. IEEE Access 2025;13:120142–68. https://doi.org/10.1109/ACCESS.2025.3572619.
- Pramodh Krishna D, Sandhya E, Khaja Shareef S, Mantena SV, Desanamukula VS, Koteswararao C, et al. Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection. Scientific Reports 2025;15:1–16. https://doi.org/10.1038/S41598-024-84421-0.
- Addula SR, Mamodiya U, Jiang W, Almaiah MA. Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs. SHIFRA 2025;2025:62–8. https://doi.org/10.70470/SHIFRA/2025/003.
- Swathi R, Perumalla S, Arun M, Bharathi DVN, Srinivas E, Krishnan VG. Security Enhancement in MANET using Modified Crow Search Optimization Algorithm for IoT Applications. 2025 International Conference on Emerging Smart Computing and Informatics, ESCI 2025 2025. https://doi.org/10.1109/ESCI63694.2025.10988271.
- Mathiazhagan P, Dhayashankar JM. Enhanced Authenticated Routing for MANET: A Comprehensive Solution for Reliable routing path selection. Networks 2025;1.
- Alyoubi AA. High-speed adaptive and efficient ad hoc on-demand distance vector for secure routing in mobile ad hoc networks using reinforcement learning and artificial bee colony optimization. Journal of High Speed Networks 2025;31:123–44. https://doi.org/10.1177/09266801241299920.
- Huang S, Raad R, Tubbal F, Odeh N. An ARP-integrated enhancement of AODV for wormhole attack detection in mobile ad hoc networks. Journal of Network and Computer Applications 2025;243:104283. https://doi.org/10.1016/J.JNCA.2025.104283.
- Aravind A, Poongodi A. Quantum-Driven Resilient Pathway Discovery for Optimized Security and Performance in MANETs under Adversarial Conditions. 2025 6th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Institute of Electrical and Electronics Engineers (IEEE); 2025, p. 1440–6. https://doi.org/10.1109/ICICV64824.2025.11085529.
- Gopalasamy K, Muthaiya KG. Optimizing packet routing and security in MANETs with the H-MAntnetSVM algorithm for energy efficiency and blackhole detection. Sustainable Computing: Informatics and Systems 2025;46:101123. https://doi.org/10.1016/J.SUSCOM.2025.101123.
- Schweitzer N, Cohen L, Hirst T, Dvir A, Stulman A. Achieving manet protection without the use of superfluous fictitious nodes. Computer Communications 2025;229:107978. https://doi.org/10.1016/J.COMCOM.2024.107978.
- Majumder S, Bhattacharyya D, Chowdhuri S. ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats. Eurasip Journal on Wireless Communications and Networking 2025;2025:1–39. https://doi.org/10.1186/S13638-025-02430-7.
- Sugumaran VR, Dinesh E, Ramya R, Muniyandy E. Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET. Scientific Reports 2025;15:1–21. https://doi.org/10.1038/S41598-025-92656-8.
- Gopinath S, Chairman M, Natraj NA, Sarankumar R. BDSCRP: Blockchain based Dynamic Secure Cluster Routing Protocol for MobileAd hoc Networks (MANETs). Proceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025, Institute of Electrical and Electronics Engineers Inc.; 2025, p. 1717–24. https://doi.org/10.1109/ICICT64420.2025.11005260.
- Dudala DSS, Patamsetti R, Nuli PB, Nagendranath M. WOA-DE Hybrid for Energy-Efficient and Secure Routing in MANETs. IJSAT - International Journal on Science and Technology 2025;16:1–8. https://doi.org/10.71097/IJSAT.V16.I1.3034.
- Saravanan T, Preetham DS, Venkatasubramanian A. Optimized Adaptive Routing and Link Health Management in Mobile Ad Hoc Networks using Enhanced Meta Ant Advanced Beaconing with Integrated Auto-Repair and Security Protocols. Proceedings of 2025 AI-Driven Smart Healthcare for Society 50, AdSoc50 2025, Institute of Electrical and Electronics Engineers Inc.; 2025, p. 278–82. https://doi.org/10.1109/IEEECONF64992.2025.10962821.
- Naveen N, Nirmaladevi J. Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs. Scientific Reports 2025;15:1–31. https://doi.org/10.1038/S41598-025-99269-1.
- Begum MB, Suganthi B, Sivagamasundhari P, Arunmozhi SA, Suhail SJM. An Enhanced Heterogeneous Local Directed Acyclic Graph Blockchain With Recalling Enhanced Recurrent Neural Networks for Routing in Secure MANET-IOT Environments in 6G. International Journal of Communication Systems 2025;38:e6110. https://doi.org/10.1002/DAC.6110.
- Vikas, Teotia S. Optimization of Graph Neural Networks for Real-TimeIntrusion Detection in Dynamic Mobile Ad-Hoc Networks. International Journal of Environmental Sciences 2025;11:740–8. https://doi.org/10.64252/79452G17.
- Rajkumar M, Karthika J, Abinayaa SS. Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks. Computers & Security 2025;150:104242. https://doi.org/10.1016/J.COSE.2024.104242.
- Hemalatha S, Shalini S, Kumar PS, Srinivas R, Thilagam T, Kumbhar DV, et al. A hybrid approach for intrusion detection and prevention in mobile ad hoc networks. Journal of Theoretical and Applied Information Technology 2025;15:1128–44.
- Sardar TH, Dar SA, Jaiswal J, Guru Prasad MS, Mittal M, Kumar V. Enhancing Security in MANETs with Deep Learning-Based Intrusion Detection. Procedia Computer Science 2025;259:120–9. https://doi.org/10.1016/J.PROCS.2025.03.313.
- Aakunuri M, Manjula A, Vaishali K, Gachikanti S. A Novel Intrusion Detection System for Mitigating Black Hole Attacks in Wireless Networks. Communications on Applied Nonlinear Analysis 2025;32:640–50.
- Gayathri Devi S, Chandia S, Savithri V, Saraswathi K. Optimized high-dimensional memristive hopfield neural network for DoS attack detection in Mobile Adhoc Network. Knowledge-Based Systems 2025;310.
- Muhammad MM, AL-Asadi HAA. A Deep Learning-Based Enhancement to OLSR for Robust Attack Detection and Secure Multimedia Transmission in MANETs. Basrah Researches Sciences 2025;51:15.
- Martin JJ, George JP, Alapatt BP. A Novel Approach to Packet Dropping and Malicious Attack Detection using Ensemble Techniques 2025:1458–63. https://doi.org/10.1109/ICICV64824.2025.11085510.
- Saminathan K, Perumal L, Shajin FH, Shakya RK. Multicast On-Route cluster propagation to detect network intrusion detection systems on MANET using Deep Operator Neural networks. Expert Systems with Applications 2025;271:125864. https://doi.org/10.1016/J.ESWA.2024.125864.
- Sunitha D, Latha P. A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET. Computers & Security 2025;148:104166. https://doi.org/10.1016/J.COSE.2024.104166.
- Pushpalatha S, Narasimhulu N. A hybrid approach for detecting network layer attacks in MANET. International Journal of System Assurance Engineering and Management 2025:1–14. https://doi.org/10.1007/S13198-025-02854-W/METRICS.
- Pavani V, Vyshnavi A, Divya C, Jayalakshmi M, Jyothi P. QOS-aware Secure and Energy Efficient MAC framework for MANETs 2025:1–6. https://doi.org/10.1109/RFCON62306.2025.11085407.
- Anugraha DM, Ebenezer DSS, Maheswari DS. Hybrid elk herd green anaconda-based multipath routing and deep learning-based intrusion detection in MANET. Pervasive and Mobile Computing 2025;112:102079. https://doi.org/10.1016/J.PMCJ.2025.102079.
- Khandekar VA, Gupta P. Machine learning-based hybrid SSO-MA with optimized secure link state routing protocol in Manet. China Communications, vol. 22, Institute of Electrical and Electronics Engineers (IEEE); 2025, p. 164–80. https://doi.org/10.23919/JCC.JA.2023-0401.
- Sudhaakar K, Meena Abarna KT, Mohan E. Detection of Selfish Node in Mobile Ad Hoc Network by Adaptive Multi-Serial Cascaded Network. International Journal of Communication Systems 2025;38:e70059. https://doi.org/10.1002/DAC.70059.
- Messabih H, Cheriguene Y, Ahmad F, Hadjkouider AM, Kerrache CA. Digital Twins with Stackelberg Game for Mobile Ad-hoc Networks’ Security. In 7th International Conference on Pattern Analysis and Intelligent Systems (PAIS), IEEE; 2025.
- Dhand G, Rao M, Chaudhary P, Sheoran K. A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism. Journal of Network and Computer Applications 2025;235:104093. https://doi.org/10.1016/J.JNCA.2024.104093.
- Dalal K. Hybrid optimization-based secured routing in mobile ad-hoc network. Intelligent Decision Technologies 2025;19:312–36. https://doi.org/10.3233/IDT-240739.
- Prasanna KS, Ramesh B. Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks. International Journal of Communication Systems 2025;38:e6074. https://doi.org/10.1002/DAC.6074.
- Anand MV, Krishnamurthy A, Kannan A, Govindarajan N. Secure Routing in Mobile Ad Hoc Networks with Hybrid Tasmanian Gazelle Optimization. IETE Journal of Research 2025:1. https://doi.org/10.1080/03772063.2025.2466683.
- Nivedita V, Shieh CS, Horng MF. An integrated trust-based secure routing with intrusion detection for mobile Ad Hoc network using adaptive snow geese optimization algorithm. Ain Shams Engineering Journal 2025;16:103385. https://doi.org/10.1016/J.ASEJ.2025.103385.
- Zubairu B, Gide AI. Machine Learning-Based Framework for Detecting and Mitigating DoS Attacks in Mobile Ad-Hoc Networks (MANETs). International Journal of Computers 2025;10:151–60.
- Vincent SSM. Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm. CLEI Electronic Journal 2025;28:1–9. https://doi.org/10.19153/CLEIEJ.28.1.7.
- Sudha B, Midhunchakkaravarthy, Khekare G, Aishwarya M. High-Security Voice Data Encryption in MANETs Using AES, Wavelets, and AI Optimization Optimization. SGS - Engineering & Sciences 2025;1:1–7.
- Sudha B, Midhunchakkaravarthy, Khekare G. Biometrically Enhanced Dual-Layer Voice Encryption for MANETs using DWT-AES and Deep Reinforcement Learning Optimization. SGS - Engineering & Sciences 2025;1:1–2.
- Mabina A. Enhancing Security Protocols for MANETs in 5G-Enabled Smart Healthcare Systems. International Journal of Artificial Intelligence and Science 2025;2:18–39. https://doi.org/10.63158/IJAIS.V2.I1.15.
References
Swain J, Pattanayak BK, Pati B. A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks. International Journal of Information Security and Privacy (IJISP) 2018;12:38–45. https://doi.org/10.4018/IJISP.2018040103.
Gurung S, Chauhan S. A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Networks 2019 26:3 2019;26:1981–2011. https://doi.org/10.1007/S11276-019-01966-Z.
Hassan SM, Mohamad MM, Muchtar FB. Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks. IEEE Access 2024. https://doi.org/10.1109/ACCESS.2024.3457682.
Zhang C, Zhou MC, Yu M. Ad hoc network routing and security: A review. International Journal of Communication Systems 2007;20:909–25. https://doi.org/10.1002/DAC.840.
Rodriguez-Baeza JA, Magan-Carrion R, Ruiz-Villalobos P. Advances on Security in Ad Hoc Networks: A preliminary analysis. Iberian Conference on Information Systems and Technologies, CISTI, Chaves, Portugal: IEEE Computer Society; 2021, p. 1–5. https://doi.org/10.23919/CISTI52073.2021.9476278.
Mohandas R, Sivapriya N, Vaigandla KK, Kirubasankar K. Detection and Mitigation of Attacks in MANETs: A Comprehensive Survey of Security Techniques. Proceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024, Gobichettipalayam, India: IEEE; 2024, p. 1478–85. https://doi.org/10.1109/ICUIS64676.2024.10866793.
Cho JH, Swami A, Chen IR. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials 2011;13:562–83. https://doi.org/10.1109/SURV.2011.092110.00088.
Sathiya R, Yuvaraj N. Analyzing intrusion detection systems in mobile ad-hoc network architectures: A systematic review. In: Dagur A, Singh K, Mehra PS, Shukla DK, editors. Intelligent Computing and Communication Techniques, vol. 3. 1st ed., CRC Press; 2025, p. 238–42. https://doi.org/10.1201/9781003635680-37.
Agor AD, Ami-Narh JT, Banning LA, Brown SA, Elliot MAA, Tanye HA. Hybridizing Intelligent Water Drops and River Formation Dynamics for Optimal Routing Path Selection with Minimum Energy in MANETs. Journal of Artificial Intelligence and Technology 2025:1–9. https://doi.org/10.37965/JAIT.2025.0575.
Agor AD, Asante M, Hayfron-Acquah JB, Ami-Narh JT, Aziale LK, Peasah KO. A power-aware river formation dynamics routing algorithm for enhanced longevity in MANETs. International Journal of Computer Networks and Applications 2024;11:274–89. https://doi.org/10.22247/ijcna/2024/17.
Agor AD, Asante M, Hayfron-Acquah JB, Peasah KO, Agangiba M, Elliot MAA, et al. Power-aware intelligent water drops routing algorithm for best path selection in MANETs. International Journal of Communication Networks and Information Security 2024;16:1–13.
Nazir MK, Rehman RU, Nazir A. A novel review on security and routing protocols in MANET. Communications and Network 2016;8:205–18. https://doi.org/10.4236/cn.2016.84020.
Prasath S. A study on manet and its security issues. National Conference on Recent Advances in Commerce, Management and Computer Science (NRCACMC-2020), vol. 22, Avadi, Chennai-62: Department of Commerce, VEL TECH Ranga Sanku Arts College; 2020, p. 66–74.
Paliwal G, Mudgal AP, Taterh S. A study on various attacks of TCP/IP and security challenges in MANET layer architecture. Fourth International Conference on Soft Computing for Problem Solving, Advances in Intelligent Systems and Computing 336, 2018, p. 195–209. https://doi.org/10.1007/978-81-322-2220-0_16.
Panda N, Patra B, Hota S. MANET routing attacks and their countermeasures: A survey. Journal of Critical Reviews 2020;7:2777–92. https://doi.org/10.31838/jcr.07.13.428.
Karthigha M, Latha L, Sripriyan K. A comprehensive survey of routing attacks in wireless mobile ad hoc networks. 5th International Conference on Inventive Computation Technologies, ICICT 2020, Institute of Electrical and Electronics Engineers Inc.; 2020, p. 396–402. https://doi.org/10.1109/ICICT48043.2020.9112588.
Saha HN, Bhattacharyya D, Banerjee B, Mukherjee S, Singh R, Ghosh D. A review on attacks and secure routing protocols in MANET. International Journal of Innovative Research and Review 2013;1:12–36.
Ali MA, Sarwar Y. Security issues regarding MANET (Mobile Ad Hoc Networks): challenges and solutions. Blekinge Institute of Technology, 2011.
Tayal S, Gupta V. A survey of attacks on manet routing protocols. International Journal of Innovative Research in Science, Engineering and Technology 2013;2:1180–2285.
Joshi K, Kumar K. Security breaches of mobile ad-hoc networks (MANET) - A review. Educational Administration Theory and Practice 2024;30:2656–65. https://doi.org/10.53555/kuey.v30i4.1912.
Agor AD, Kwami Aziale L, Kataka Banaseka F, Owusu-Agyemang K, Brown SA, Partey BT. Trust and adaptiveness enhancements to PRFDRA for secure metaheuristic path selection in MANETs 2025;5:168–79. https://doi.org/10.55670/fpll.futech.5.1.15.
Arulselvan G, Rajaram A. Routing attacks detection in MANET using trust management enabled hybrid machine learning. Wireless Networks 2025;31:1481–95. https://doi.org/10.1007/S11276-024-03846-7/METRICS.
Akanksha, Mahapatra RP, Chaudhary H. Analysis and Design of Reliable Node Routing Mechanism for MANET using Fuzzy Logic. 2025 3rd International Conference on Communication, Security, and Artificial Intelligence, ICCSAI 2025, Greater Noida, India: Institute of Electrical and Electronics Engineers Inc.; 2025, p. 1346–51. https://doi.org/10.1109/ICCSAI64074.2025.11064038.
Sarangi SK, Lenka R, Nanda A, Panda BS. Development of MD-LSTM for malicious detection and hybrid coati and dolphin swarm optimization for QoS-aware multicast routing in MANET environment. Computers and Electrical Engineering 2025;123:110086. https://doi.org/10.1016/J.COMPELECENG.2025.110086.
Adilakshmi Y, Raziya S, Avinash S, Chaitanya VS, Siddi NG. A Secure Defensive Mechanism Against DDoS Attack in MANETs Using ML: Classification Algorithms. 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), Bhimdatta, Nepal: IEEE; 2025, p. 1021–9. https://doi.org/10.1109/ICSADL65848.2025.
Bhutia R, Mothukuri R. Design of a one-dimensional network model for evaluating security threats in MANET. Information Security Journal: : A Global Perspective 2025:1. https://doi.org/10.1080/19393555.2025.2522436.
Mohammed FJ, Andalib A, Azgomi H, Sharifi SA. Enhancing the Security of Mobile Ad-hoc Networks: A Black Hole Attack Mitigation Approach Using Response Time and Machine Learning Models. Journal of Industrial and Systems Engineering 2025;17:204–16. https://doi.org/10.1002/ETT.3676.
Jangade V, Nirkhi S. A Novel Approach For Optimising Communication And Secure Connectivity In Mobile Ad-Hoc Networks (Manets). International Journal of Environmental Sciences 2025;11:1229–39. https://doi.org/10.64252/T0ANXP71.
Priya SS, Vijayabhasker R, Rajaram A. Advanced Security and Efficiency Framework for Mobile Ad-Hoc Networks Using Adaptive Clustering and Optimization Techniques. Journal of Electrical Engineering and Technology 2025;20:1815–26. https://doi.org/10.1007/S42835-024-02119-9/METRICS.
Mohsen Hassan S, Mohamad MM, Binti Muchtar F. Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols. IEEE Access 2025;13:120142–68. https://doi.org/10.1109/ACCESS.2025.3572619.
Pramodh Krishna D, Sandhya E, Khaja Shareef S, Mantena SV, Desanamukula VS, Koteswararao C, et al. Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection. Scientific Reports 2025;15:1–16. https://doi.org/10.1038/S41598-024-84421-0.
Addula SR, Mamodiya U, Jiang W, Almaiah MA. Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs. SHIFRA 2025;2025:62–8. https://doi.org/10.70470/SHIFRA/2025/003.
Swathi R, Perumalla S, Arun M, Bharathi DVN, Srinivas E, Krishnan VG. Security Enhancement in MANET using Modified Crow Search Optimization Algorithm for IoT Applications. 2025 International Conference on Emerging Smart Computing and Informatics, ESCI 2025 2025. https://doi.org/10.1109/ESCI63694.2025.10988271.
Mathiazhagan P, Dhayashankar JM. Enhanced Authenticated Routing for MANET: A Comprehensive Solution for Reliable routing path selection. Networks 2025;1.
Alyoubi AA. High-speed adaptive and efficient ad hoc on-demand distance vector for secure routing in mobile ad hoc networks using reinforcement learning and artificial bee colony optimization. Journal of High Speed Networks 2025;31:123–44. https://doi.org/10.1177/09266801241299920.
Huang S, Raad R, Tubbal F, Odeh N. An ARP-integrated enhancement of AODV for wormhole attack detection in mobile ad hoc networks. Journal of Network and Computer Applications 2025;243:104283. https://doi.org/10.1016/J.JNCA.2025.104283.
Aravind A, Poongodi A. Quantum-Driven Resilient Pathway Discovery for Optimized Security and Performance in MANETs under Adversarial Conditions. 2025 6th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Institute of Electrical and Electronics Engineers (IEEE); 2025, p. 1440–6. https://doi.org/10.1109/ICICV64824.2025.11085529.
Gopalasamy K, Muthaiya KG. Optimizing packet routing and security in MANETs with the H-MAntnetSVM algorithm for energy efficiency and blackhole detection. Sustainable Computing: Informatics and Systems 2025;46:101123. https://doi.org/10.1016/J.SUSCOM.2025.101123.
Schweitzer N, Cohen L, Hirst T, Dvir A, Stulman A. Achieving manet protection without the use of superfluous fictitious nodes. Computer Communications 2025;229:107978. https://doi.org/10.1016/J.COMCOM.2024.107978.
Majumder S, Bhattacharyya D, Chowdhuri S. ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats. Eurasip Journal on Wireless Communications and Networking 2025;2025:1–39. https://doi.org/10.1186/S13638-025-02430-7.
Sugumaran VR, Dinesh E, Ramya R, Muniyandy E. Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET. Scientific Reports 2025;15:1–21. https://doi.org/10.1038/S41598-025-92656-8.
Gopinath S, Chairman M, Natraj NA, Sarankumar R. BDSCRP: Blockchain based Dynamic Secure Cluster Routing Protocol for MobileAd hoc Networks (MANETs). Proceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025, Institute of Electrical and Electronics Engineers Inc.; 2025, p. 1717–24. https://doi.org/10.1109/ICICT64420.2025.11005260.
Dudala DSS, Patamsetti R, Nuli PB, Nagendranath M. WOA-DE Hybrid for Energy-Efficient and Secure Routing in MANETs. IJSAT - International Journal on Science and Technology 2025;16:1–8. https://doi.org/10.71097/IJSAT.V16.I1.3034.
Saravanan T, Preetham DS, Venkatasubramanian A. Optimized Adaptive Routing and Link Health Management in Mobile Ad Hoc Networks using Enhanced Meta Ant Advanced Beaconing with Integrated Auto-Repair and Security Protocols. Proceedings of 2025 AI-Driven Smart Healthcare for Society 50, AdSoc50 2025, Institute of Electrical and Electronics Engineers Inc.; 2025, p. 278–82. https://doi.org/10.1109/IEEECONF64992.2025.10962821.
Naveen N, Nirmaladevi J. Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs. Scientific Reports 2025;15:1–31. https://doi.org/10.1038/S41598-025-99269-1.
Begum MB, Suganthi B, Sivagamasundhari P, Arunmozhi SA, Suhail SJM. An Enhanced Heterogeneous Local Directed Acyclic Graph Blockchain With Recalling Enhanced Recurrent Neural Networks for Routing in Secure MANET-IOT Environments in 6G. International Journal of Communication Systems 2025;38:e6110. https://doi.org/10.1002/DAC.6110.
Vikas, Teotia S. Optimization of Graph Neural Networks for Real-TimeIntrusion Detection in Dynamic Mobile Ad-Hoc Networks. International Journal of Environmental Sciences 2025;11:740–8. https://doi.org/10.64252/79452G17.
Rajkumar M, Karthika J, Abinayaa SS. Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks. Computers & Security 2025;150:104242. https://doi.org/10.1016/J.COSE.2024.104242.
Hemalatha S, Shalini S, Kumar PS, Srinivas R, Thilagam T, Kumbhar DV, et al. A hybrid approach for intrusion detection and prevention in mobile ad hoc networks. Journal of Theoretical and Applied Information Technology 2025;15:1128–44.
Sardar TH, Dar SA, Jaiswal J, Guru Prasad MS, Mittal M, Kumar V. Enhancing Security in MANETs with Deep Learning-Based Intrusion Detection. Procedia Computer Science 2025;259:120–9. https://doi.org/10.1016/J.PROCS.2025.03.313.
Aakunuri M, Manjula A, Vaishali K, Gachikanti S. A Novel Intrusion Detection System for Mitigating Black Hole Attacks in Wireless Networks. Communications on Applied Nonlinear Analysis 2025;32:640–50.
Gayathri Devi S, Chandia S, Savithri V, Saraswathi K. Optimized high-dimensional memristive hopfield neural network for DoS attack detection in Mobile Adhoc Network. Knowledge-Based Systems 2025;310.
Muhammad MM, AL-Asadi HAA. A Deep Learning-Based Enhancement to OLSR for Robust Attack Detection and Secure Multimedia Transmission in MANETs. Basrah Researches Sciences 2025;51:15.
Martin JJ, George JP, Alapatt BP. A Novel Approach to Packet Dropping and Malicious Attack Detection using Ensemble Techniques 2025:1458–63. https://doi.org/10.1109/ICICV64824.2025.11085510.
Saminathan K, Perumal L, Shajin FH, Shakya RK. Multicast On-Route cluster propagation to detect network intrusion detection systems on MANET using Deep Operator Neural networks. Expert Systems with Applications 2025;271:125864. https://doi.org/10.1016/J.ESWA.2024.125864.
Sunitha D, Latha P. A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET. Computers & Security 2025;148:104166. https://doi.org/10.1016/J.COSE.2024.104166.
Pushpalatha S, Narasimhulu N. A hybrid approach for detecting network layer attacks in MANET. International Journal of System Assurance Engineering and Management 2025:1–14. https://doi.org/10.1007/S13198-025-02854-W/METRICS.
Pavani V, Vyshnavi A, Divya C, Jayalakshmi M, Jyothi P. QOS-aware Secure and Energy Efficient MAC framework for MANETs 2025:1–6. https://doi.org/10.1109/RFCON62306.2025.11085407.
Anugraha DM, Ebenezer DSS, Maheswari DS. Hybrid elk herd green anaconda-based multipath routing and deep learning-based intrusion detection in MANET. Pervasive and Mobile Computing 2025;112:102079. https://doi.org/10.1016/J.PMCJ.2025.102079.
Khandekar VA, Gupta P. Machine learning-based hybrid SSO-MA with optimized secure link state routing protocol in Manet. China Communications, vol. 22, Institute of Electrical and Electronics Engineers (IEEE); 2025, p. 164–80. https://doi.org/10.23919/JCC.JA.2023-0401.
Sudhaakar K, Meena Abarna KT, Mohan E. Detection of Selfish Node in Mobile Ad Hoc Network by Adaptive Multi-Serial Cascaded Network. International Journal of Communication Systems 2025;38:e70059. https://doi.org/10.1002/DAC.70059.
Messabih H, Cheriguene Y, Ahmad F, Hadjkouider AM, Kerrache CA. Digital Twins with Stackelberg Game for Mobile Ad-hoc Networks’ Security. In 7th International Conference on Pattern Analysis and Intelligent Systems (PAIS), IEEE; 2025.
Dhand G, Rao M, Chaudhary P, Sheoran K. A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism. Journal of Network and Computer Applications 2025;235:104093. https://doi.org/10.1016/J.JNCA.2024.104093.
Dalal K. Hybrid optimization-based secured routing in mobile ad-hoc network. Intelligent Decision Technologies 2025;19:312–36. https://doi.org/10.3233/IDT-240739.
Prasanna KS, Ramesh B. Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks. International Journal of Communication Systems 2025;38:e6074. https://doi.org/10.1002/DAC.6074.
Anand MV, Krishnamurthy A, Kannan A, Govindarajan N. Secure Routing in Mobile Ad Hoc Networks with Hybrid Tasmanian Gazelle Optimization. IETE Journal of Research 2025:1. https://doi.org/10.1080/03772063.2025.2466683.
Nivedita V, Shieh CS, Horng MF. An integrated trust-based secure routing with intrusion detection for mobile Ad Hoc network using adaptive snow geese optimization algorithm. Ain Shams Engineering Journal 2025;16:103385. https://doi.org/10.1016/J.ASEJ.2025.103385.
Zubairu B, Gide AI. Machine Learning-Based Framework for Detecting and Mitigating DoS Attacks in Mobile Ad-Hoc Networks (MANETs). International Journal of Computers 2025;10:151–60.
Vincent SSM. Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm. CLEI Electronic Journal 2025;28:1–9. https://doi.org/10.19153/CLEIEJ.28.1.7.
Sudha B, Midhunchakkaravarthy, Khekare G, Aishwarya M. High-Security Voice Data Encryption in MANETs Using AES, Wavelets, and AI Optimization Optimization. SGS - Engineering & Sciences 2025;1:1–7.
Sudha B, Midhunchakkaravarthy, Khekare G. Biometrically Enhanced Dual-Layer Voice Encryption for MANETs using DWT-AES and Deep Reinforcement Learning Optimization. SGS - Engineering & Sciences 2025;1:1–2.
Mabina A. Enhancing Security Protocols for MANETs in 5G-Enabled Smart Healthcare Systems. International Journal of Artificial Intelligence and Science 2025;2:18–39. https://doi.org/10.63158/IJAIS.V2.I1.15.