[PDF][PDF] A review: black hole and gray hole attack in MANET

S Dixit, KK Joshi, N Joshi - International Journal of Future …, 2015 - researchgate.net
In past few years, mobile ad hoc network has gaining more attention of researchers. Mobile
Adhoc Network (MANET) are most widely used all over the world, due to its ability to …

[PDF][PDF] A study of various Black Hole Attack techniques and IDS in MANET

A Patel, A Jain - International Journal of Advanced Computer …, 2015 - ijact.org
Mobile Ad Hoc Network (MANET) is said to be as a group of wireless mobile nodes
vigorously forming a impermanent network that does not use any accessible heterogeneous …

A novel SERIeS algorithm for enhancing link stability and security in Manet

P Rajeswari, TN Ravi - Journal of Applied Security Research, 2017 - Taylor & Francis
The major issue that affects the performance of Mobile Ad-hoc Network (MANET) is the way
of routing implemented in a network. In general, routing refers to the problem of finding the …

[PDF][PDF] Performance Evaluation of the Techniques to Mitigate Blackhole Attack in VANETs

L Kumar, PK Dahiya - Performance Evaluation, 2015 - Citeseer
ABSTRACT Vehicular Adhoc Network (VANET), an integrated part of Intelligent
Transportation System (ITS), is a real-life illustration of a self-organized Adhoc network for …

[PDF][PDF] ESWCRP: Efficient and Secure Weighted Cluster Routing Protocol-I

BK Verma, B Kumar - researchgate.net
In this paper, we are investigating the security of the wireless networks. As in different
mobility based technologies the security and efficiency is a concern then need to address …

[引用][C] Two-step verification technique for isolation of black hole attack in Manets

A Chauhan - Int. J. Recent Technol. Eng, 2019

[引用][C] Survey of MANET Attacks, Security Concerns and Measures

S Jadye - IJCSIT) International Journal of Computer Science and …, 2016

[引用][C] Prevention of Black Hole Attacks in MANETs

V Kumar - International Journal of Engineering Trends and …, 2018

[引用][C] Minimizing black hole attack in mobile ad hoc network with anomaly based ids approach

A Worku - 2019 - ASTU

[引用][C] A Technique to remove Black Hole Attacks in MANETs