[PDF][PDF] MANET Routing Protocols Attacks and Mitigation Techniques: A Review

TA Teli, R Yousuf, DA Khan - International Journal of Mechanical …, 2022 - researchgate.net
In Mobile Ad-hoc Networks (MANETs) the nodes move around freely in any possible
direction and as such, the reorganization of the network structure happens on the fly …

An overview of security services and trust-based authentication schemes in VANET

M Gayathri, C Gomathy - International Conference on Micro-Electronics …, 2021 - Springer
Communication has played a very significant role in mobile communication. MANET Mobile
Ad Hoc Network which uses mobile nodes in a distributed way to communicate with all …

MANET security: A survey

MM Alani - 2014 IEEE International Conference on Control …, 2014 - ieeexplore.ieee.org
Mobile Ad hoc Networks are being adopted in more and more applications in our daily life.
Mobile computing and mobile ad hoc networks in particular have become a daily need. As …

Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET.

S Maheswari, R Vijayabhasker - Intelligent Automation & …, 2023 - search.ebscohost.com
Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day.
Evaluating a node's trust value has significant advantages since such network applications …

Trusted and secured routing in MANET: An improved approach

K Ullah, R Das, P Das, A Roy - 2015 International Symposium …, 2015 - ieeexplore.ieee.org
A mobile ad-hoc network (or simply a MANET) is a type of infrastructure-less as well as
wireless network. MANET depends mainly on mobile nodes for its functionality. Since nodes …

Jellyfish reorder attack on hybrid protocol in manet dissection on variegated parameters

PS Tiwana, N Mann - 2016 Fourth International Conference on …, 2016 - ieeexplore.ieee.org
MANET's have gotten the excitement of examiners in years back. It is a wireless network with
the goal that nodes move subjectively in the system. Zone routing protocol is a kind of …

Defence Mechanism for Sybil Attacks in MANETS using ABR Protocol

P Sowmya, V Anitha - International Journal of Advanced …, 2014 - search.proquest.com
Security is a paramount concern in any ad-hoc network. In Mobile Adhoc NETworks, mobility
of the nodes poses a problem for providing security services. The ad-hoc network is …

EPPN: Extended Prime Product Number based wormhole DETECTION scheme for MANETs

S Sharma, RM Sharma - 2017 11th International Conference on …, 2017 - ieeexplore.ieee.org
MANETs are an upcoming technology that is gaining momentum in recent years. Due to
their unique characteristics, MANETs are suffering from wide range of security attacks …

A comparison of detection techniques for attacks on MANETs

H Gul, MB Ahmad, M Asif - 2019 4th International Conference …, 2019 - ieeexplore.ieee.org
The key feature of Mobile Ad-hoc Network (MANET) is its dynamic topology. So, routing
protocols designed for MANETs should not only accommodate this feature but also should …

Comprehensive study on MANETs network layer attacks

G Garg, S Kaushal, A Sharma - 2013 Fourth International …, 2013 - ieeexplore.ieee.org
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a
temporary network in decentralized manner. Security has become a primary concern in …