[HTML][HTML] F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs

MN Ahmed, AH Abdullah, H Chizari… - Journal of King Saud …, 2017 - Elsevier
Due to the absence of infrastructure support, secure data dissemination is a challenging task
in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing …

An empirical study of routing attacks in mobile ad-hoc networks

S Aluvala, KR Sekhar, D Vodnala - Procedia Computer Science, 2016 - Elsevier
Mobile ad-hoc network is an infrastructure-less and self-organizing network, where nodes
communicate through wireless links. Because of its dynamic topology, security becomes a …

Analysis of security attacks on AODV routing

MA Abdelshafy, PJB King - 8th International Conference for …, 2013 - ieeexplore.ieee.org
MANET routing protocols have many vulnerabilities that may be exploited by malicious
nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability …

AODV and SAODV under attack: Performance comparison

MA Abdelshafy, PJB King - Ad-hoc, Mobile, and Wireless Networks: 13th …, 2014 - Springer
AODV is a reactive MANET routing protocol that does not support security of routing
messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil …

Performance evaluation and comparison of aodv and dsr under adversarial environment

R Agrawal, R Tripathi, S Tiwari - 2011 International Conference …, 2011 - ieeexplore.ieee.org
A mobile ad-hoc network (MANET) can be described as a mobile wireless network,
consisting of a collection of communication nodes, which have to interact among themselves …

Mobile ad hoc netwoks security attacks and secured routing protocols: A survey

Supriya, M Khari - Advances in Computer Science and Information …, 2012 - Springer
Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured
dynamically without any centralized management system. Mobile Adhoc Networks …

[PDF][PDF] A brief introduction of different type of security attacks found in mobile ad-hoc network

S Shrivastava, S Jain - International Journal of Computer Science & …, 2013 - ijcset.com
A structure less network is called the mobile ad-hoc network, where all the nodes are
independent. In MANET, there is a collection of mobile nodes that from temporary network …

Dynamic source routing under attacks

MA Abdelshafy, PJB King - 2015 7th International Workshop on …, 2015 - ieeexplore.ieee.org
MANET routing protocols are designed based on the assumption that all nodes cooperate
without maliciously disrupting the operation of the routing protocol. A large number of attack …

Усовершенствование модели безопасной маршрутизации сообщения с оптимальной балансировкой числа его фрагментов по непересекающимся …

О Лемешко, А Еременко - Захист інформації, 2015 - irbis-nbuv.gov.ua
Представленная работа посвящена усовершенствованию и исследованию модели
безопасной маршрутизации с оптимальной балансировкой числа фрагментов в …

AODV routing protocol performance analysis under MANET attacks

M Abdelshafy, PJB King - International Journal for …, 2014 - pureportal.coventry.ac.uk
AODV is a well-known reactive protocol designed for MANET routing. All MANET routing
protocols are designed based on the assumption that all nodes cooperate without …