[PDF][PDF] Implementation of black hole security attack using malicious node for enhanced-dsr routing protocol of manet

R Kothari, D Dembla - International Journal of Computer Applications, 2013 - Citeseer
ABSTRACT A Mobile Ad hoc Network (MANET) is a group of movable hosts with wireless
network interfaces that structure a temporary network without the support of any permanent …

REFRAHN: A resilience evaluation framework for ad hoc routing protocols

J Friginal, D de Andrés, JC Ruiz, M Martínez - Computer Networks, 2015 - Elsevier
Routing protocols are key elements for ad hoc networks. They are in charge of establishing
routes between network nodes efficiently. Despite the interest shown by the scientific …

[PDF][PDF] Study of Rushing attack in MANET

GS Chandel, R Chowksi - International Journal of Computer Applications, 2013 - Citeseer
ABSTRACT A mobile ad-hoc network or MANET incorporates mobile nodes that forward
information or packets from node to node without a wired connection. This is the topology …

[PDF][PDF] Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks

G Anjaneyulu, VM Viswanatham… - Advances in Applied …, 2011 - academia.edu
Non-infrastructure networks are most commonly called as Mobile Ad hoc networks
(MANETs). Unavailability of infrastructure or complexity and expensiveness of setting up the …

[PDF][PDF] Remap** attack detection and prevention for reliable data service in MANET

I Rathod, A Saxena - J Comput Networks Commun, 2023 - academia.edu
Mobile ad hoc Network is a promising technology in recent years. The number of nodes are
forming dynamic link in between sender and receiver. The Mobile ad hoc Network (MANET) …

[PDF][PDF] Effect of rushing attack in AODV and its prevention technique

GS Chandel, R Chowksi - International Journal of Computer Applications, 2013 - Citeseer
The MANET incorporates mobile nodes that forward information or packets from node to
node without a wired connection. The topology changes rapidly and unproductively, there is …

Security enabled DSR for establishing symmetric key and security in MANETS

AS Khubalkar, LR Ragha - 2013 Tenth International …, 2013 - ieeexplore.ieee.org
In recent years, MANETs have been develo** rapidly and are increasingly being used in
many applications, ranging from military to civilian and commercial uses. The security has …

[PDF][PDF] Security Issues of Routing Protocols in MANETs

R Narula, S Khullar, A Arora - IJCT, ISSN, 2012 - Citeseer
There are a number of routing protocols developed by researchers. Due to the nature of ad
hoc networks, secure routing is an important area of research in develo** secure routing …

[PDF][PDF] Performance Evaluation of Malicious node in Mobile Ad Hoc Network using AODV Protocol

ABSTRACT MANETs (Mobile Ad hoc Network) is collection of wireless nodes that can
dynamically be set up anywhere and anytime without using any pre-existing network …

[PDF][PDF] QoS Aware and Secure Dynamic Multipath Routing Protocol for MANET

MP Navale, GT Chavan - 2015 - academia.edu
Now days the use of wireless networks such as Mobile Ad Hoc Networks (MANET) or
Wireless Sensor Networks (WSNs) is common and widely used in day to day life. Mobile Ad …