Last modified: 2019-04-25
References
References
[1] Sharma, S. B., & Chauhan, N. (2015, February). Security issues and their solutions in MANET. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 289-294). IEEE.
[2] Sheikh, R., Chande, M. S., & Mishra, D. K. (2010, September). Security issues in MANET: A review. In 2010 Seventh International Conference on Wireless and Optical Communications Networks-(WOCN) (pp. 1-4). IEEE.
[3] Alslaim, M. N., Alaqel, H. A., & Zaghloul, S. S. (2014, April). A comparative study of MANET routing protocols. In The Third International Conference on e-Technologies and Networks for Development (ICeND2014) (pp. 178-182). IEEE.
[4] Chitkara, M., & Ahmad, M. W. (2014). Review on manet: characteristics, challenges, imperatives and routing protocols. International journal of computer science and mobile computing, 3(2), 432-437.
[5] Shenbagapriya, R., & Kumar, N. (2014, November). A survey on proactive routing protocols in MANETs. In 2014 International Conference on Science Engineering and Management Research (ICSEMR) (pp. 1-7). IEEE.
[6] Patel, D. N., Patel, S. B., Kothadiya, H. R., Jethwa, P. D., & Jhaveri, R. H. (2014, February). A survey of reactive routing protocols in MANET. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-6). IEEE.
[7] Dilli, R., & Reddy, P. C. S. (2016, July). Trade-off between length of the Hash code and performance of hybrid routing protocols in MANETs. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (pp. 732-735). IEEE.
[8] Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. arXiv preprint arXiv:1503.03233.
[9] Alani, M. M. (2014, November). MANET security: A survey. In 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014) (pp. 559-564). IEEE.
[10] Kuzlu, M., Pipattanasomporn, M., & Rahman, S. (2014). Communication network requirements for major smart grid applications in HAN, NAN and WAN. Computer Networks, 67, 74-88.
[11] Ranjan, R., Singh, N. K., & Singh, A. (2015, May). Security issues of black hole attacks in MANET. In International Conference on Computing, Communication & Automation (pp. 452-457). IEEE.
[12] El-Azhari, M. S., Al-Amoudi, O. A., Woodward, M., & Awan, I. (2009, May). Performance analysis in aodv based protocols for manets. In 2009 International Conference on Advanced Information Networking and Applications Workshops (pp. 187-192). IEEE.
[13] Kamel, M. B. M., Alameri, I., & Onaizah, A. N. (2017, March). STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET. In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1278-1282). IEEE.
[14] Dorri, A. (2017). An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Networks, 23(6), 1767-1778.