A cluster based technique for securing routing protocol AODV against black-hole attack in MANET

S Yadav, K Lakhani - International Journal of Distributed and …, 2013 - search.proquest.com
Mobile ad-hoc networks are prone to various security vulnerabilities because of its
characteristics mainly high mobility of nodes, and no well defined architecture. Security …

[PDF][PDF] LITERATURE SURVEY ON IDS IN MOBILE AD HOC NETWORK

GJ Solanke, PR Chandre - Int J Sci Eng Technol Res, 2015 - Citeseer
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate
to each other via radio waves. The mobile nodes that are in radio range of each other can …

[PDF][PDF] Assessment of MANET Routing Protocols in Special Traffic and Mobility Models

M Priyanka - academia.edu
Anonymous routing protocols are used to hide the route between the source and
destination, source identity and destination identity. In the existing system, anonymous …

[引用][C] A Cogitate study of IDS in MANET

N Naveen, A Annalakshmi, KR Valluvan