Advances in Privacy Preservation Techniques for Mobile Ad Hoc Networks: A Review
- Authors
-
-
Opeyemi O. ASAOLU
Author
-
Oluwasanmi S. ADANIGBO
Author
-
Temidayo J. AKINDAHUNSI
Author
-
- Keywords:
- Mobile Ad Hoc Networks, Privacy Preservation, Homomorphic Encryption, Differential Privacy, Federated Learning.
- Abstract
-
This literature review examines recent developments in privacy preservation techniques for Mobile Ad Hoc Networks (MANETs) through a systematic analysis of 49 peer-reviewed journal articles published between 2020 and 2025. The review focuses on four principal technical domains: blockchain-based privacy frameworks, advanced homomorphic encryption implementations, differential privacy mechanisms, and federated learning applications in mobile networks. It further addresses the convergence of these techniques with Internet of Things (IoT) and edge computing paradigms. The analysis reveals significant evolution in privacy preservation methodologies, with a discernible trend toward context-aware privacy mechanisms, lightweight cryptographic solutions tailored to resource-constrained environments, and hybrid approaches that integrate complementary techniques to achieve comprehensive protection. The review identifies the absence of standardised benchmarks, unresolved tensions between privacy and accountability, and the scarcity of real-world deployment studies as the most critical open challenges facing the field. The findings demonstrate substantial progress in addressing classical MANET privacy challenges while highlighting the novel demands introduced by contemporary mobile network applications, including vehicular networks, smart city infrastructure, and autonomous systems.
- References
- Downloads
- Published
- 25-04-2026
- Section
- Articles
- License
-
Copyright (c) 2026 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Lawal B. IDRIS, A Review on Vehicular Ad Hoc Network (VANET) Security challenges and Solutions , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Munir A. ADEWOYE, Ahmed ALIYU, Usman A. ALI, Abdulrasheed JIMOH, Blockchain-Based Food Supply Chain Traceability: A Systematic Review of Privacy Preserving and Scalability , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Usman A. ABDURRAHMAN, Abdulkadir A. BICHI, Usman HARUNA, Akibu M. ABDULLAHI, A Hybrid Graph Neural Network Framework Integrating Handcrafted Features for Real-Time Iris Recognition in Motion , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
