A survey on security issues and challenges in mobile Ad-hoc network

G Keerthana, P Anandan - EAI Endorsed Transactions on …, 2018 - publications.eai.eu
Rapid developments in the communication arena has tremendously improved the
transmission procedures today. The amount of information transmission in the commercial …

[PDF][PDF] Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

VS Kushwah, G Sharma - … Journal of Computer Science and Security, 1985 - academia.edu
A routing protocol plays important role to handle entire network for communication and
determines the paths of packets. A node is a part of the defined network for transferring …

[PDF][PDF] Diagnosing MAC misbehavior in mobile Ad Hoc networks using statistical methods

JH Monisha, R Uthariaraj - International Journal of Computer …, 2012 - academia.edu
Summary A Mobile Ad Hoc Network is formed dynamically and self organizes. Every node
acts as a sender, a receiver and a router. Due to its mobility, providing QoS is a challenge …

[PDF][PDF] Optimized Raco-Car Based Adaptive Routing in Mesh Network

P Ranjana, D Jeevani, A George - Middle East J. Sci. Res, 2016 - researchgate.net
Network management is a challenging issue due to the growing size of the network. Many
solutions are proposed for network management, but there is always difficulty arises when …

[PDF][PDF] VERSIONS OF 802.16

R Kumar, K Adhikary, MR Vaid - J. Comp. ech. Appl., 2011 - Citeseer
Access (WIMAX) which is currently employed in some parts of the world is the new era of
communication. It is approved by IEEE 802.16 group and is the latest technology which is a …

[引用][C] Sorb: Secure on demand resilient to byzantine multicast routing in multihop wireless networks

R Kalaidasan, V Hemamalini, AK Babu - ISCET 2010: Proceedings of International …, 2010

[引用][C] Improving authentication mechanism for using extended public key cryptography in mobile adhoc network

MSA Kahate, MOV Chandure - International Journal of Advanced Research in …, 2013