Skip to main content
. 2025 Aug 22;15:30849. doi: 10.1038/s41598-025-89221-8

Table 1.

Survey of the intrusion detection techniques in MANET.

Novelist Year Algorithm Consequences
Cheng et al.21 2019 PPVF-RSU-CSP An initiative is undertaken to integrate cloud storage with VANET, and a PPVF is introduced for cloud-assisted VANET
Prasad et al.22 2019 Machine learning In the case of wormhole attack detection in ad hoc networks, the accuracy is 93.12%.
Jhanjhi et al.23 2020 Machine learning Making a recommendation for a hybrid RPL protocol that uses machine learning to counter attacks utilizing rank and wormholes
Wang et al.24 2020 FD-WCFRSNPS According to the results of five different experiments, the FD-WCFRSNPS that was suggested is both efficient and effective.
Singh et al.25 2020 Artificial neural network Monitoring wireless sensor networks for the presence of wormhole attacks
Srilakshmi et al.26 2021 Hybrid reactive search and bat algorithm It is necessary to estimate both the harm detection rate and the node energy in order to determine the lifespan of the node
Goyal et al.27 2021 CDMA-based security Wormhole attack in underwater wireless sensor networks. The proposed strategy enhances energy efficiency in comparison to existing methods
Wang et al.28 2021 Approaches to service selection that is quick and dependable Our proposed approach has more reliability and reduced time expenditure compared to prior implementations, as indicated by the findings.
Ni et al.29 2021 Fault detection method relies on TDMA The proposed methodology decreases resource use by 88-90% in comparison to the chain-TDMA strategy.
Amutha et al.30 2021 Clustering techniques An examination of WSN clustering of three categories: classical, optimization, and machine learning techniques.
Jiang et al.31 2021 System for adaptive cosite fading channels The analytical modeling and experiments validate the theoretical reasoning as both sound and beneficial.
Ahmadi et al.32 2021 New KATP network for adaptation The state-of-the-art efficiency of your model has been validated by tests on a variety of typical samples and clinical data.
Tami and Lim et al.33 2021 Ensemble learning The success value of classification algorithms is statistically studied using metrics such as accuracy, FPR, Matthews coefficients, and AUC.
Chen et al.34 2021 RPPTD A secure and private method of discovering the truth
Sultana et al.35 2021 Considering bottleneck intermediate node The data indicate that the oversight of esteemed packet loss nodes by IDS algorithms constitutes a substantial problem that adversely affects network efficiency.
Sultanuddin et al.36 2022 Decision tree and Reinforcement learning Proposed model to select a dependable and trustworthy nearby node for data transmission in the MANET.
Majid Hamid Ali et al.37 2022 Improved Whale Optimization Algorithm-SVM It was capable of identifying multiple forms of cyber-attacks, including Distributed Denial of Service (DDoS) attacks, password guessing attempts and phishing attacks.
Jayakanth et al.38 2023 Equalized Multi-routing protocol It engages with multipath routing strategies to rectify significant flaws. The author employed a trust table to identify malicious nodes.
Edwin Singh et al.39 2023 Fuzzy Extreme Learning Machine For all circumstances of the Green Smart Transportation network, the attacks are classified after the PCA features
Mohamad et al.40 2023 Deep Learning ANN The application of ANN techniques in the Internet of Things introduces a detection system for rank and wormhole attacks
Manoj Gupta et al.41 2024 Machine learning and deep learning model The author devised an advanced, self-learning protection system proficient in detecting and countering Blackhole Attacks in MANET
Mohammadi et al.42 2024 Federated learning with AI It enables secure data sharing without accessing local data, which ensures fair benefit redistribution
Hassan et al.43 2024 Advanced Machine learning Analyzing MANET characteristics and detailing black and gray hole attacks and detection techniques