[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …
restricted resources by the conditions of battery life, memory, and processing power. The …
SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications
A Meddeb Makhlouf, M Guizani - International Journal of Information …, 2019 - Springer
Abstract The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide
essential services to drivers on the road. To exchange data, vehicles as network nodes route …
essential services to drivers on the road. To exchange data, vehicles as network nodes route …
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET
AO Alkhamisi, SM Buhari… - … Journal of Grid and …, 2020 - inderscienceonline.com
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
A secure cryptography based clustering mechanism for improving the data transmission in MANET
AR MOHINDRA, C GANDHI - Walailak Journal of Science and …, 2021 - wjst.wu.ac.th
Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and
critical tasks in recent days, due to its dynamic nature. For this reason, the various routing …
critical tasks in recent days, due to its dynamic nature. For this reason, the various routing …
Performance analysis of ad hoc on-demand distance vector routing protocol for mobile ad hoc networks
An ad hoc network is build up from the cooperative engagement of an accumulation of
wireless mobile nodes and is capable of operating without the support of any fixed …
wireless mobile nodes and is capable of operating without the support of any fixed …
A secure path selection scheme for mobile ad hoc network
SD Ubarhande, DD Doye, PS Nalwade - Wireless Personal …, 2017 - Springer
Mobile ad hoc network is open medium, infrastructure-less and easy to install. Despite these
features, mobile ad hoc network is vulnerable to various security attacks. Black hole and …
features, mobile ad hoc network is vulnerable to various security attacks. Black hole and …
A new trust-based mechanism for detecting intrusions in MANET.
K Anusha, E Sathiyamoorthy - Inf. Secur. J. A Glob. Perspect., 2017 - search.ebscohost.com
Abstract Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and
demanding task. It is important to secure the network against intrusions in MANET for …
demanding task. It is important to secure the network against intrusions in MANET for …
Changing dimensions of accountants' role and skill requirements in organisations: findings from the corporate sector in Bahrain
PL Joshi, WG Bremser - International Journal of Accounting …, 2004 - inderscienceonline.com
In a rapidly changing information technology environment, accountants' organisational roles
and skill requirements are also changing. This study examines the changing dimensions of …
and skill requirements are also changing. This study examines the changing dimensions of …
Secure routing protocol in wireless ad hoc networks via deep learning
Open wireless channels make a wireless ad hoc network vulnerable to various security
attacks, so it is crucial to design a routing protocol that can defend against the attacks of …
attacks, so it is crucial to design a routing protocol that can defend against the attacks of …
Resource-based routing protocol for Mobile Adhoc Networks.
P Theerthagiri, T Menakadevi - Songklanakarin Journal of …, 2020 - search.ebscohost.com
Abstract Mobile Adhoc Networks (MANETs) provide special extemporary applications and
services in a shorter time at anytime and anywhere. In MANETs, nodes require well …
services in a shorter time at anytime and anywhere. In MANETs, nodes require well …