Performance comparision of AODV, DSR and DSDV under various network conditions: a survey

GS Tomar, T Sharma… - 2011 International …, 2011 - ieeexplore.ieee.org
Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of
fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to …

A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks

E Chiejina, H Xiao, B Christianson, A Mylonas… - Sensors, 2022 - mdpi.com
The distributed nature of mobile ad hoc networks (MANETs) presents security challenges
and vulnerabilities which sometimes lead to several forms of attacks. To improve the security …

[PDF][PDF] AOMDV protocol: A literature review

B Mathur, A Jain - International Journal of New Technology and …, 2018 - academia.edu
MANET has received the significant attention in every field of Information and
Communication Technology industry. The nodes in Mobile Ad hoc networks continuously …

[PDF][PDF] Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs.

S Mehfuz, MN Doja - Journal of Artificial Evolution & …, 2008 - pdfs.semanticscholar.org
MANETs are zero-configuration, self-organizing, and highly dynamic networks formed by a
set of mobile hosts connected through wireless links. These networkscan be formed on the …

[PDF][PDF] Performance evaluation of the impact of attacks on mobile ad hoc networks

M Parsons, P Ebinger - … of 28th IEEE International Symposium on …, 2009 - cse.buffalo.edu
In this paper we implement and evaluate the most prominent attacks described in literature
in a consistent manner to provide a concise comparison on attack types and parameters …

[PDF][PDF] Performance comparison of single and multi-path routing protocol in MANET with selfish behaviors

AR Sangi, J Liu, Z Liu - World Academy of Science, Engineering and …, 2010 - Citeseer
Mobile Ad Hoc network is an infrastructure less network which operates with the
coordination of each node. Each node believes to help another node, by forwarding its data …

Behavior analysis of malicious node in the different routing algorithms in mobile ad hoc network (MANET)

D Mishra, YK Jain, S Agrawal - 2009 International Conference …, 2009 - ieeexplore.ieee.org
An ad hoc network is a collection of mobile nodes that dynamically form a temporary
network. It operates without the use of existing infrastructure. Two on-demand routing …

Flexible optical backplane interconnections

MA Shahid, WR Holland - Proceedings of Massively Parallel …, 1996 - ieeexplore.ieee.org
The increasing demand for bandwidth and interconnection density to provide wide
bandwidth services at reasonably low cost are rapidly exhausting capabilities of …

[PDF][PDF] Analysis and implementation of AODV routing protocol against black hole attack in MANET

S Kumar, DS Rana, SC Dimri - International Journal of Computer …, 2015 - academia.edu
Wireless mobile ad hoc network (MANET) is a selfconfiguring network which is composed of
several movable mobile nodes. Black Hole attack is one of the DOS attacks in MANET …

[PDF][PDF] A modified aodv routing protocol to avoid black hole attack in manets

TM Mahmoud, AA Aly, O Makram - International Journal of Computer …, 2015 - academia.edu
Mobile ad hoc networks (MANETs) are composed of a set of stations (nodes) communicating
through wireless channels, without any fixed backbone support in which nodes are allowed …