Security issues in MANET: A review

R Sheikh, MS Chande… - 2010 Seventh International …, 2010 - ieeexplore.ieee.org
… The mobile nodes use any of the radio technology like Bluetooth, IEEE 802.11 or Hiperlan
… The nodes behave as hosts as well as routers. The security challenges in the MANET arise …

A reputation-based clustering mechanism for manet routing security

AB Chehida, R Abassi… - … , Reliability and Security, 2013 - ieeexplore.ieee.org
… hoc NETwork (MANET) is a collection of mobile nodes having no … Because routing process
is fundamental in a MANET … -based clustering mechanism to locate malicious nodes and …

A secure clustering scheme protocol for MANET

L Wang, F Gao - … Information Networking and Security, 2010 - ieeexplore.ieee.org
MANET for short), this paper proposes a secure protocol of MANET by the means of clustering
select the cluster head within the cluster, and the nodes which have trust connection with …

[HTML][HTML] Malicious nodes detection in MANET using back-off clustering approach

AR Rajeswari, K Kulothungan, S Ganapathy… - Circuits and …, 2016 - scirp.org
… The security is one of the primary concerns in MANET. The malicious nodes in MANET
In this paper, the nodes in MANET are grouped using back-off duration technique and …

Security and pseudo-anonymity with a cluster-based approach for MANET

A Rachedi, A Benslimane - IEEE GLOBECOM 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
… an anonymous protocol to secure nodes which have important roles in the network. We
focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each …

[PDF][PDF] Challenges and issues of cluster based security in MANET

SB Kulkarni, B Yuvaraju - IOSR J Comput Eng (IOSR-JCE), 2016 - academia.edu
… In this paper, they proposed a security system for ID-based anonymous cluster-based
MANETs to protect the privacy of nodes. Moreover, they proposed a threshold signature scheme …

Real-time reliable clustering and secure transmission scheme for QoS development in MANET

S Muruganandam, JA Renjit - Peer-to-Peer Networking and Applications, 2021 - Springer
… transmission suffer in achieving expected performance in terms of clustering accuracy,
security, throughput, malicious node detection accuracy, and energy consumption. Several …

[HTML][HTML] Performance analysis of malicious node detection and elimination using clustering approach on MANET

S Gopalakrishnan - Circuits and Systems, 2016 - scirp.org
… and different attacks on MANET security. … node within the cluster gets the cluster key from
the cluster head and this key is used for the data trans- action between cluster head and node. …

A secure and efficient cluster based location aware routing protocol in MANET

SS Jamaesha, S Bhavani - Cluster Computing, 2019 - Springer
… The protocol used to route the information based on location aware routing with trusted
security is proposed in this paper. The nodes are communicated by clustering based routing …

Distributed trust node selection for secure group communication in MANET

T Jenitha, P Jayashree - 2014 Fourth International Conference …, 2014 - ieeexplore.ieee.org
… mechanism for selecting trust nodes which will participate in … MANET. The selection is
proposed in two stages; the first phase adopts clustering technique to identify trust worthy nodes