S Gupta, C Kumar - Int. J. Future Generation Communication and …, 2013 - Citeseer
The security issues are more complex and challenging in Mobile Ad hoc Networks (MANETs) than other conventional wireless networks due to peer to peer behavior of the …
A Prabhu, R Dhanaraj - International Conference on Recent …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks are becoming popular day by day due to their characteristic features like wireless nature, dynamic topology, self healing mechanism and …
RS Shaktawat, D Singh… - International Journal of …, 2014 - researchgate.net
ABSTRACT A MANET is a collection of independent mobile nodes with self configuring, self administrating features. In MANET initial work for routing was done addressing the path …
ABSTRACT A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for …
Abstract Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into …
P Gite, DN Kanellopoulos… - International Journal of …, 2017 - inderscienceonline.com
In MANETs, various QoS problems exist such as high error rates, handling node mobility, inefficient routing, power conservation, and limited processing capabilities of network …
A Jayanand, T Jebarajan - … Journal of Computer Science Engineering & …, 2012 - ijcset.net
Security is one of the major concern in MANET routing. A large number of secured routing protocols exist however they are either insecure for some types of attacks or they consume …
N Gour, M Agarwal, H Singh, A Kumar - IOSR Journal of Computer …, 2014 - Citeseer
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward …
P Rathod, N Mody, D Gada, R Gogri, Z Dedhia… - IWDC, 2004 - academia.edu
In Ad hoc On Demand Vector (AODV) routing protocol for MANET (Mobile Ad hoc Networks), malicious nodes can easily disrupt the communication because of inherent limitations. A …