C She, P Yi, J Wang, H Yang - KSII Transactions on Internet and …, 2013 - koreascience.kr
Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is …
A Siddiqua, K Sridevi… - … Conference on Signal …, 2015 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are a collection of mobile hosts which communicate with each other with no central network authority or fixed infrastructure. Due to its characteristics …
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks …
N Modi, VK Gupta - Int J Comput Sci Inf Technol, 2014 - Citeseer
Wireless networks are getting popular due to their ease of use MANET is a wireless ad hoc network, decentralized network and autonomous system. Each node in MANET is free to …
Abstract A Mobile Ad hoc Network (MANET) is susceptible to several security threats. This work aims at securing a MANET against black hole attacks. Based on MANET …
S Ehrampoosh, A Mahani - International Journal of Communications …, 2011 - cit.usb.ac.ir
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to …
N Tiwari, R Yadav - International Journal of Computer Applications, 2015 - Citeseer
Mobile ad hoc network (MANET) is a network of mobile nodes in which there is no infrastructure is defined. Mobile nodes transmit their information through intermediate nodes …
S Dixit, P Pathak, S Gupta - 2016 Symposium on Colossal Data …, 2016 - ieeexplore.ieee.org
Present intrusion detection systems rapidly monitor MANETs environment, which leads rapid depletion of battery life to address this issue we propose a novel intrusion detection system …
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However …