Prevention of Blackhole Attack in MANET using certificateless signature scheme

V Kumar, M Shankar, AM Tripathi, V Yadav… - Journal of Scientific & …, 2022 - op.niscpr.res.in
Mobile AdHoc Networks (MANETs) are the network of self-configuring nodes. Such nodes
communicate through single as well as multi-hop modes without the aid of any centralized …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

An Efficient Approach for Prevention of Blackhole Attack in MANET

J Dhanke, S Rastogi, K Singh, K Saxena… - International Journal of …, 2024 - ijisae.org
A structure known as a Mobile Ad-Hoc Network (MANET) is formed when mobile nodes
come together to communicate with each other, offering a broad spectrum of applications …

Detection techniques of blackhole attack in mobile adhoc network: A survey

S Jain, A Khunteta - Proceedings of the 2015 international conference on …, 2015 - dl.acm.org
MANET is a group of mobile nodes that dynamically form a temporary network without
infrastructure. Routing in MANET is a special component and it has several routing …

An improved blackhole attack detection and prevention method for wireless ad-hoc network

G Bendale, S Shrivastava - … on ICT in Business Industry & …, 2016 - ieeexplore.ieee.org
The rapid development in communication technology has given rise to strong research
interest on Wireless Networks. The reality that mobile ad-hoc networks lack fixed …

[PDF][PDF] Distributed hash table based routing for P2P data sharing in MANETs

J Kaur, K Dinesh - World Wide J. Multidiscip. Res. Dev., 2017 - wwjmrd.com
Peer to peer network is a distributed, robust and fault tolerant network for sharing resources
such as files, CPU, memory etc. in P2P networks, peers organize themselves in a …

[PDF][PDF] Detecting network layer attacks in MANETs using the AODV protocol

B Pradhan, RK Samantaray - fuzzy-tversu.com
Abstract The emergence of Mobile Ad hoc Networks (MANETs) presents a crucial concern
within autonomous systems, characterized by mobile hosts establishing temporary networks …

[PDF][PDF] The Effects of Black hole attack on AODV and TORA protocols: A Review

D Jain, S Sangwan - International Journal of Engineering Trends and …, 2015 - Citeseer
Wireless network is a collection of large number of wireless devices. Such a network may or
may not have a base station. The network having a fixed based station is termed as an …

Sécurité des réseaux Ad hoc

M AZZA - 2017 - rdoc.univ-sba.dz
Le développement continu des réseaux, avec notamment l'existence de la conception des
dispositifs sans fil rend les réseaux ad hoc comme une technologie de plus en plus adoptée …

[PDF][PDF] AN EFFICIENT TECHNIQUE FOR PREVENTING COOPERATIVE BLACKHOLE ATTACK IN MANET USING AODV PROTOCOL

K Joshi, V Sagvekar - Citeseer
A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile
devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile …