Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be …
Y Zhang, W Lee - Ad hoc networks: technologies and protocols, 2005 - Springer
Security is a paramount concern in mobile ad hoc network (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed …
SU Agalawe, NR Chopde - … Journal of Computer Science and Mobile …, 2014 - academia.edu
In recent years Mobile ad-hoc network (MANET) is one of the most promising fields for research and development of wireless network. As the popularity of mobile device and …
N Shukla, S Gupta, A Virmani - International Journal of Computer …, 2013 - Citeseer
In this paper, we discuss the mobile ad hoc Network: Security issues regarding attacks. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats …
J Filipek, L Hudec - Journal of Electrical Engineering, 2018 - sciendo.com
Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited …
S Tanwar, KV Prema - International Journal of Soft Computing and …, 2013 - Citeseer
With the advancement in radio technologies like Bluetooth, IEEE 802.11, a new concept of networking has emerged; this is known as ad hoc networking where potential mobile users …
SB Velagaleti, SM GNITS S, SV Raju - Int J Comput Sci Inform Secur …, 2020 - academia.edu
ABSTRACT A Mobile ad hoc Network is a kind of wireless network, and also an infrastructure less network. All the nodes are independent of each other and hence nodes …
K Gupta, PK Mittal - … Journals of Advanced Research in Computer …, 2017 - researchgate.net
A MANET is a distributed infrastructure less network and mainly relies on individual security solutions from each mobile node and therefore centralized security control is hard to …
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …