A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs
J Sathiamoorthy, B Ramakrishnan - Soft Computing, 2018 - Springer
Security is a major issue that is being constantly addressed in infrastructure less networks.
An ad hoc network like MANET faces several issues that can jeopardize the transmissions in …
An ad hoc network like MANET faces several issues that can jeopardize the transmissions in …
[PDF][PDF] CEAACK-a reduced acknowledgment for better data transmission for manets
J Sathiamoorthy, B Ramakrishnan - International Journal of …, 2016 - mecs-press.net
A MANET is a set of mobile nodes which works in a dynamic changing network and it is
capable of communicating with each other efficiently where all the nodes perform a dual role …
capable of communicating with each other efficiently where all the nodes perform a dual role …
[PDF][PDF] Survey of innovated techniques to detect selfish nodes in MANET
An Ad-hoc network is a collection of mobile nodes dynamically forming a temporary network
without the use of any existing network infrastructure or centralized administer. Because of …
without the use of any existing network infrastructure or centralized administer. Because of …
Detection of node-misbehavior using overhearing and autonomous agents in wireless Ad-Hoc networks
D Agarwal, RR Rout… - 2015 Applications and …, 2015 - ieeexplore.ieee.org
In Wireless Ad-hoc Networks, nodes co-operate among themselves to forward data packets
from a source node to a destination node. Nodes may participate in route discovery or route …
from a source node to a destination node. Nodes may participate in route discovery or route …
A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm
J Sathiamoorthy, B Ramakrishnan - Wireless personal communications, 2017 - Springer
Ad hoc networks like MANETs can be made manageable by clustering the network where a
cluster head is given the responsibility of an arbitrator. To make clustering more efficient …
cluster head is given the responsibility of an arbitrator. To make clustering more efficient …
Acknowledgement based approaches for detecting routing misbehaviour in MANETs
A Bansal, A Varshney, R Matta… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Here, we analyse routing misbehaviour in MANETS. Generally, the routing protocols for
MANETs are outlined on the underlying support assuming that all the nodes that are taking …
MANETs are outlined on the underlying support assuming that all the nodes that are taking …
[PDF][PDF] A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET.
R Murugan, A Shanmugam - Int. J. Netw. Secur., 2013 - Citeseer
The nodes in the network that causes dysfunction in network and damage to the other node
are misbehaving nodes. They support the flow of route discovery traffic but interrupt the data …
are misbehaving nodes. They support the flow of route discovery traffic but interrupt the data …
A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata
AB Aghababa, A Fathinavid, A Salari… - 2012 World Congress …, 2012 - ieeexplore.ieee.org
There are some fields in ad-hoc networks that are more highlighted these days, such as
energy consumption, quality of service and security. Among these, security has been …
energy consumption, quality of service and security. Among these, security has been …
CLAIDS: Cellular Learning Automata Based Approach for Anomaly Nodes Detection in Clustered Mobile Ad Hoc Networks.
A Fathinavid, M Ansari - Adhoc & Sensor Wireless Networks, 2015 - search.ebscohost.com
Security is hard to achieve due to nodes' dynamic nature in mobile ad hoc Networks.
Routing protocols for MANETs are designed based on the assumption that all participating …
Routing protocols for MANETs are designed based on the assumption that all participating …
[PDF][PDF] Irregular cellular learning automata-based method for intrusion detection in mobile ad hoc networks
A Fathinavid, AB Aghababa - 51st International FITCE (Federation …, 2012 - researchgate.net
In the recent years, wireless technology has had numerous applications in many fields. It
also has been opening new fields of applications. One such field concerns mobile ad hoc …
also has been opening new fields of applications. One such field concerns mobile ad hoc …