Secure routing in mobile Ad hoc networks: a predictive approach

AM Desai, RH Jhaveri - International Journal of Information Technology, 2019 - Springer
… which address different security issues in wireless ad-hoc networks. Based on the literature
review, … threat on the network layer of MANETs. Sequence number attack is type of Denial-of-…

Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm

MM Mukhedkar, U Kolekar - The Computer Journal, 2019 - academic.oup.com
wireless links. The main aim of the paper is to establish an optimal algorithm to perform secure
routing … the design of the objective function that is based on the trust factor, which includes …

Quality of service (QoS) and priority aware models for energy efficient and demand routing procedure in mobile ad hoc networks

S Kalaivanan - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
… In our future work that we are planning to ensure the message authentication based security
mobile ad hoc networks. Alternative connection for energy efficient advertising networks

An adaptive secure and efficient routing protocol for mobile ad hoc networks

BK Tripathy, SK Jena, P Bera, S Das - Wireless Personal Communications, 2020 - Springer
… Several research works have contributed in the direction of routing protocol design for ad
hoc networks. These works essentially focus on efficient and secure routing protocol …

RETRACTED ARTICLE: Quality of Service based Ad hoc On-demand Multipath Distance Vector Routing protocol in mobile ad hoc network

R Thiagarajan, MR Babu, M Moorthi - Journal of Ambient Intelligence and …, 2021 - Springer
Mobile ad hoc networks (MANETs) are wireless networks that include many peer nodes. …
the network Quality of Service (QoS). In MANETs, a major role is played by the routing protocol …

QASEC: A secured data communication scheme for mobile Ad-hoc networks

M Usman, MA Jan, X He, P Nanda - Future Generation Computer Systems, 2020 - Elsevier
… , maintains the routing tables. Our routing model is also based on the table-driven routing
principles. As the nodes are mobile, it is possible that they may be moving constantly from one …

Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization

C Ram Mohan, VR Ananthula - International Journal of Modeling …, 2019 - World Scientific
… This paper addresses the security issues by proposing an optimization algorithm, named …
initiating secure route among the MANET nodes so that the path attained is feasible and secure

Reliable data transmission model for mobile ad hoc network using signcryption technique

M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
… ability in the wireless network has tremendously been … security in reliable networks, mobile
ad hoc networks (MANETs) play a top role, like open network boundary, distributed network, …

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

AR Rajeswari, K Kulothungan, S Ganapathy… - Peer-to-Peer Networking …, 2019 - Springer
… The use of mobile phones and laptops in the current communication scenario necessitaed
the services of Mobile Ad hoc Networks (MANETs) that have a wide range of applications …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - … of Communication Networks and …, 2020 - inderscienceonline.com
… Abstract: Wireless communication formly mobile ad-hoc network (MANET) plays a significant
role in modern technology for transmitting the packets from source node to destination node…