[引用][C] A Trustful Routing Protocol for Ad-hoc Network

MK Mishra, A Khare, M Dixit - Global Journal of Computer Science and Technology, 2011

Analysis of attacks on routing protocols in MANETs

RK Kapur, SK Khatri - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Mobile Adhoc Networks (MANETs) are networks of mobile nodes which have limited
resources in terms of processing power, memory and battery life. The traffic to the …

[PDF][PDF] AOMDV-multipath routing protocol in mobile networks to enhance network security

GS Brindha, M Rajeswari - Int. J. Sci. Res, 2014 - academia.edu
Dynamic topology formed by an interconnection of mobile devices through wireless links is
known as Mobile Ad-hoc Network (MANET). It is a dynamic wireless network that can be …

[引用][C] Security attacks on Routing protocols and Intrusion Detection in MANET

RM Chamudeeswari, P Sumathi - International Journal of Scientific Research and …, 2017

[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)

S Kalime, K Sagar - Journal of Critical Reviews, 2021 - researchgate.net
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …

Security threats in mobile ad hoc network

K Biswas, ML Ali - 2007 - diva-portal.org
Abstract Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes
that wish to communicate without any fixed infrastructure and pre-determined organization of …

[引用][C] Security threats in mobile ad hoc networks

U Agarwal, KP Yadav, U Tiwari - International Journal of Research in Science and …, 2013

Security challenges in mobile ad hoc networks: A survey

A Dorri, SR Kamel, E Kheirkhah - arXiv preprint arXiv:1503.03233, 2015 - arxiv.org
MANET is a kind of Ad hoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …

[PDF][PDF] Security attacks in mobile adhoc networks

M Singh, A Singh, R Tanwar… - IJCA Proceedings on …, 2011 - academia.edu
In this paper, we describe the security issues in Mobile adhoc networks. MANET has no
clear line of defense, so, it is accessible to both legitimate network users and malicious …

[PDF][PDF] A Survey on Intrusion Response Mechanism for MANET Routing Attacks

TK Rasha, S Vincent - International Journal of Emerging Technology and …, 2012 - Citeseer
Mobile Ad Hoc Network (MANET) is distinguished from other networks mainly by its self
configuring and optimizing nature. Being the flexible network, MANET is exposed to various …