[HTML][HTML] Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc …

P Tyagi, D Dembla - Egyptian informatics journal, 2017 - Elsevier
Next-generation communication networks have become widely popular as ad-hoc networks,
broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET) and …

An empirical study of routing attacks in mobile ad-hoc networks

S Aluvala, KR Sekhar, D Vodnala - Procedia Computer Science, 2016 - Elsevier
Mobile ad-hoc network is an infrastructure-less and self-organizing network, where nodes
communicate through wireless links. Because of its dynamic topology, security becomes a …

A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network

P Tyagi, D Dembla - International Journal of Information Technology, 2019 - Springer
The societal costs accompanying the developments are usually related to traffic congestion
and accidents. The condition can be enhanced by providing timely information on traffic …

[PDF][PDF] Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network.

P Sarao - J. Commun., 2023 - researchgate.net
Wireless networks are the networks in which data communication is done through the
wireless channels and wireless nodes. In such type of the networks, cooperation of the all …

Black hole attack evaluation for AODV and AOMDV routing protocols

A Mesleh - International Journal of Electronic Security and …, 2018 - inderscienceonline.com
Protecting a mobile ad hoc network (MANET) from malicious attacks is a challenging
security issue, many of those attacks are reported on ad hoc on demand distance vector …

Analysis of malicious behavior of blackhole and rushing attack in MANET

A Kumari, S Krishnan - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Mobile Adhoc Network (MANET) are the networks where network nodes uses wireless links
to transfer information from one node to another without making use of existing …

Simulation Based Study of Blackhole Attack Under AODV Protocol

A Kumari, S Krishnan - 2018 Fourth International Conference …, 2018 - ieeexplore.ieee.org
Mobile adhoc network are fully autonomous where the nodes act both as node as well as
router. Centralization is absent in MANETs. In MANETs nodes are continuously moving and …

Two variants of secure routing algorithms in mobile ad hoc network

S Mitra, P Dhar - International Journal of Sensors Wireless …, 2019 - ingentaconnect.com
Background and Objective: Two different variants of secure routing algorithms are proposed
in the present work. In both the variants a stable route is established between source and …

[PDF][PDF] A Review on Different Types of Attacks in MANET

MK Niharika - wwjmrd.com
MANET is Mobile ad-hoc network. It includes large number of wirelessly connected nodes.
This type of network is also called as peer to peer network. It is infrastructure less network …

[PDF][PDF] Egyptian Informatics Journal

P Tyagi, D Dembla - 2016 - core.ac.uk
abstract Next-generation communication networks have become widely popular as ad-hoc
networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks …