[PDF][PDF] Performance Evaluation of AODV variants on DDOS, Blackhole

H Simaremare, RF Sari - IJCSNS, 2011 - researchgate.net
This paper reviews security issues on Adhoc network and Ad hoc On-Demand Distance
Vector (AODV) protocol. In Adhoc network, active attack ie DDOS, blackhole and malicious …

[PDF][PDF] Trust based secure aodv in manet

P Sharma - Journal of Global Research in Computer Science, 2012 - Citeseer
The nature of self-organization and the limitation of individual resources, MANET always
confront security and selfishness issues. In this thesis, we design trusted routing protocols …

Secure AODV routing protocol based on trust mechanism

H Simaremare, A Abouaissa, RF Sari… - Wireless Networks and …, 2013 - Springer
A mobile ad hoc network (MANET) is a wireless network with high of mobility, no fixed
infrastructure and no central administration. These characteristics make MANET more …

RSRP: a robust secure routing protocol in MANET

D Sinha, U Bhattacharya, R Chaki - Foundations of computing and …, 2014 - sciendo.com
In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol
in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such …

Performance evaluation of hybrid routing protocols against network layer attacks in MANET

A Chandra, S Thakur - 2015 1st International Conference on …, 2015 - ieeexplore.ieee.org
This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid
wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) …

A development of secure and optimized AODV routing protocol using ant algorithm

H Simaremare - 2013 - theses.fr
Résumé Les réseaux sans fil sont devenus une technologie importante dans le secteur des
télécommunications. L'une des principales technologies des réseaux sans fil sont les …

[PDF][PDF] T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks

S Lokuliyana, L Rupasinghe - International Journal of Computer … - academia.edu
ABSTRACT Wireless Sensor Networks (WSNs) operates with an open network topology
without well-established infrastructure. Due to the absence of a centralized administration in …

[PDF][PDF] International Journal of Scientific Research and Reviews

RK Verma, JK Premi - researchgate.net
Sexuality, in general, has been of interest to writers throughout recorded history, today, the
subject of sex permeates popular literature. Increasingly, the scientific literature also …

Modeling of microstructural evolution in an MCrAlY overlay coating on different superalloy substrates

MS Karunaratne, ID Martino, SL Ogden, DL Oates… - 2012 - cdap.sliit.lk
A multicomponent, one-dimensional diffusion model that was developed for simulating
microstructure evolution in coated gas turbine blade systems has been used to compare the …

Comparative Performance Analysis of AESCRT Using NS2

D Sinha, R Chaki - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
MANETs are normally used in applications which are highly confidential in nature, such as
defense, disaster management, etc. Secure data transmission is one of the challenging …