[PDF][PDF] Network layer attacks and defense mechanisms in MANETS-a survey

GS Mamatha, SC Sharma - International Journal of Computer …, 2010 - academia.edu
The foremost concerned security issue in mobile ad hoc networks is to protect the network
layer from malicious attacks, thereby identifying and preventing malicious nodes. A unified …

Prevention of sleep deprivation attacks using clustering

M Sarkar, DB Roy - 2011 3rd international conference on …, 2011 - ieeexplore.ieee.org
MANETs are highly vulnerable to attacks due to the open medium dynamically changing
network topology, cooperative algorithm, lack of centralized monitoring and management …

Securing data through avoidance routing

E Kline, P Reiher - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
As threats on the Internet become increasingly sophisticated, we now recognize the value in
controlling the routing of data in a manner that ensures security. However, few technical …

[PDF][PDF] Study and performance of Mobile ad hoc routing protocols

R Lacuesta, M García, J Lloret… - Mobile Ad Hoc Networks …, 2011 - library.oapen.org
Routing is a fundamental component in the operation of ad hoc networks. Nodes must
cooperatively create and manage the network without the support of any centralized …

[PDF][PDF] Modeling and simulation tools for mobile ad hoc networks

K Erciyes, O Dagdeviren, D Cokuslu… - Mobile ad hoc …, 2011 - library.oapen.org
A model is a simplified representation of a system that aids the understanding and
investigation of the real system. Simulation is the manipulation of the model of a system that …

Secure Routing Technique in MANET: A Review

A Chandrakar, R Sarkar - … , Networking, and Informatics: Proceedings of the …, 2014 - Springer
We are here to introduce the different approach that prevents security threat in MANET
routing protocol. In recent year, secure routing protocol has been extensively studied. A …

Design, development and implementation of a high performance wireless mesh network for application in emergency and disaster recovery

M Iqbal - 2010 - eprints.kingston.ac.uk
This thesis describes research into communication protocols required by a wireless mesh
network (WMN) that would be deployed to support emergency rescue teams in a disaster …

[PDF][PDF] TODV: Performance Analysis of a Time on Demand Distance Vector Protocol for MANETS

GS Mamatha, SC Sharma - International Journal of Computer Applications, 2011 - Citeseer
ABSTRACT In MANET (Mobile Adhoc Network) the physical connectivity of the network
keeps on changing dynamically. Because of the several MANET constraints such as limited …

Distributed certificate authority in cluster-based manet using multi secret sharing scheme

M Azza, SB Hacene - Advances in Science and Technology …, 2015 - yadda.icm.edu.pl
Providing secure communications in mobile ad hoc networks (MANET) is an important and
difficult problem, due to a lack of a key management infrastructure. The authentication is an …

[PDF][PDF] Hash based Secure Multicast Routing in Mobile Ad Hoc Network

P Vigneshwaran, R Dhanasekaran - ICIREIE 2015, 2015 - researchgate.net
Mobile Ad Hoc Network (MANET) consists of number of mobile nodes which follows a
dynamic topology. In Nodes in MANET moves in an undefined manner and each node is …