[PDF][PDF] Network layer attacks and defense mechanisms in MANETS-a survey
GS Mamatha, SC Sharma - International Journal of Computer …, 2010 - academia.edu
The foremost concerned security issue in mobile ad hoc networks is to protect the network
layer from malicious attacks, thereby identifying and preventing malicious nodes. A unified …
layer from malicious attacks, thereby identifying and preventing malicious nodes. A unified …
Prevention of sleep deprivation attacks using clustering
M Sarkar, DB Roy - 2011 3rd international conference on …, 2011 - ieeexplore.ieee.org
MANETs are highly vulnerable to attacks due to the open medium dynamically changing
network topology, cooperative algorithm, lack of centralized monitoring and management …
network topology, cooperative algorithm, lack of centralized monitoring and management …
Securing data through avoidance routing
E Kline, P Reiher - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
As threats on the Internet become increasingly sophisticated, we now recognize the value in
controlling the routing of data in a manner that ensures security. However, few technical …
controlling the routing of data in a manner that ensures security. However, few technical …
[PDF][PDF] Study and performance of Mobile ad hoc routing protocols
Routing is a fundamental component in the operation of ad hoc networks. Nodes must
cooperatively create and manage the network without the support of any centralized …
cooperatively create and manage the network without the support of any centralized …
[PDF][PDF] Modeling and simulation tools for mobile ad hoc networks
K Erciyes, O Dagdeviren, D Cokuslu… - Mobile ad hoc …, 2011 - library.oapen.org
A model is a simplified representation of a system that aids the understanding and
investigation of the real system. Simulation is the manipulation of the model of a system that …
investigation of the real system. Simulation is the manipulation of the model of a system that …
Secure Routing Technique in MANET: A Review
A Chandrakar, R Sarkar - … , Networking, and Informatics: Proceedings of the …, 2014 - Springer
We are here to introduce the different approach that prevents security threat in MANET
routing protocol. In recent year, secure routing protocol has been extensively studied. A …
routing protocol. In recent year, secure routing protocol has been extensively studied. A …
Design, development and implementation of a high performance wireless mesh network for application in emergency and disaster recovery
M Iqbal - 2010 - eprints.kingston.ac.uk
This thesis describes research into communication protocols required by a wireless mesh
network (WMN) that would be deployed to support emergency rescue teams in a disaster …
network (WMN) that would be deployed to support emergency rescue teams in a disaster …
[PDF][PDF] TODV: Performance Analysis of a Time on Demand Distance Vector Protocol for MANETS
GS Mamatha, SC Sharma - International Journal of Computer Applications, 2011 - Citeseer
ABSTRACT In MANET (Mobile Adhoc Network) the physical connectivity of the network
keeps on changing dynamically. Because of the several MANET constraints such as limited …
keeps on changing dynamically. Because of the several MANET constraints such as limited …
Distributed certificate authority in cluster-based manet using multi secret sharing scheme
Providing secure communications in mobile ad hoc networks (MANET) is an important and
difficult problem, due to a lack of a key management infrastructure. The authentication is an …
difficult problem, due to a lack of a key management infrastructure. The authentication is an …
[PDF][PDF] Hash based Secure Multicast Routing in Mobile Ad Hoc Network
P Vigneshwaran, R Dhanasekaran - ICIREIE 2015, 2015 - researchgate.net
Mobile Ad Hoc Network (MANET) consists of number of mobile nodes which follows a
dynamic topology. In Nodes in MANET moves in an undefined manner and each node is …
dynamic topology. In Nodes in MANET moves in an undefined manner and each node is …