YM Khamayseh, SA Aljawarneh, AE Asaad - … Computing: Informatics and …, 2018 - Elsevier
Due to its scarce energy sources, and the open nature of transmissions in wireless environments, the wide spread of MANETs is challenged by many factors. Energy efficiency …
Abstract Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …
I Kaushik, N Sharma - Handbook of wireless sensor networks: issues and …, 2020 - Springer
Computers are being reasonably important part of our daily lives. Different solutions were introduced for its connectivity such as wired approach which existed for longer duration of …
RH Jhaveri - 2013 Third International Conference on Advanced …, 2013 - ieeexplore.ieee.org
Role of ad-hoc networks has become vital in ubiquitous computing. Ad-hoc On-demand Distance Vector (AODV) is such a routing protocol which is susceptible to a variety of …
Mobile adhoc networks (MANETs) suffer from various types of security attacks. In this paper, a novel probabilistic approach is proposed to detect and to isolate the Black Hole attack from …
A Carroll, G Heiser - 2014 IEEE 19th Real-Time and …, 2014 - ieeexplore.ieee.org
Energy efficiency is a primary design criterion of the modern smartphone due to limitations in battery capacity. Multi-core processors are now commonplace in these devices, which adds …
Mobile ad hoc networks (MANETs) are one of the emerging technologies of wireless communication, in which each node in the MANET acts as a router. In an ad hoc network …
S Behzad, R Fotohi, JH Balov, MJ Rabipour - arXiv preprint arXiv …, 2020 - arxiv.org
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having …
D Kshirsagar, A Patil - 2013 Fourth International Conference …, 2013 - ieeexplore.ieee.org
Adhoc network is a temporary network formed to share data among nodes. Network is constrained about resources and always has threat from malicious nodes. Blackhole attack …