Journal articles on the topic 'ACTIVE attacks in MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ACTIVE attacks in MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Full textRamachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.
Full textZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Full textBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Full textBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Full textPatial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.
Full textSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Full textRao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.
Full textYasin, Adwan, and Mahmoud Abu Zant. "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique." Wireless Communications and Mobile Computing 2018 (September 6, 2018): 1–10. http://dx.doi.org/10.1155/2018/9812135.
Full textRajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.
Full textTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Full textG, Jeeva, and Selvaraj K. "INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2407–13. http://dx.doi.org/10.21917/ijct.2021.0356.
Full textK., Thamizhmaran. "Secure Wireless Ad Hoc Sensor Networks." Journal of Sensor Research and Technologies 4, no. 2 (2022): 1–5. https://doi.org/10.5281/zenodo.7207904.
Full textJ, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.
Full textRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Full textHadi, Raghad Mohammed, Salma Hameedi Abdullah, and Wafaa M. Salih Abedi. "Proposed neural intrusion detection system to detect denial of service attacks in MANETs." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 3 (2022): 70–78. https://doi.org/10.21533/pen.v10.i3.644.
Full textPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Full textPrasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.
Full textThamizhmaran, K. "Routing Protocol for Multipath in MANET." Journal of Communication Engineering and VLSI Design 1, no. 1 (2023): 24–26. http://dx.doi.org/10.48001/jocevd.2023.1124-26.
Full textSelvavinayaki, Dr K. "An Effectual Data Transmission Approach to Prevent Black Hole Attack in Mobile Adhoc Networks." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 526–40. http://dx.doi.org/10.17762/itii.v9i1.166.
Full textRathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.
Full textG., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.
Full textDeepa, J., K. Hemapriya K.Hemapriya, and S. Kaviarasan S.Kaviarasan. "Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes." International Journal of Computer Applications 113, no. 18 (2015): 30–33. http://dx.doi.org/10.5120/19927-2050.
Full textLiang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy Throughput of MANETs Under Passive and Active Attacks." IEEE Transactions on Information Theory 57, no. 10 (2011): 6692–702. http://dx.doi.org/10.1109/tit.2011.2165800.
Full textK.Thamizhmaran. "Efficient Non-Base-Station based Wireless Communication in MANET." Advancement of Signal Processing and its Applications 8, no. 1 (2025): 9–11. https://doi.org/10.5281/zenodo.14650658.
Full textKavita, Babriya, and Singh Surender. "A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET." International Journal of Trend in Scientific Research and Development 1, no. 4 (2017): 375–79. https://doi.org/10.31142/ijtsrd129.
Full textV, Jayalakshmi, and Abdul Razak T. "Selection of Trusted Nodes in MANET by using Analytic Network Process." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 03 (2014): 657–62. https://doi.org/10.5281/zenodo.14715503.
Full textVaneetha, V., and C. Vivekanandan. "Efficient Interference Prediction Using Bivariate Moment Generating Function in Mobile Ad Hoc Network." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 314–20. http://dx.doi.org/10.1166/jctn.2017.6322.
Full text., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.
Full textNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Full textGhodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Full textArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full textKakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.
Full textJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Full textShrivastava, Neha, and Anand Motwani. "Survey of Malicious Attacks in MANET." International Journal of Computer Applications 80, no. 14 (2013): 28–30. http://dx.doi.org/10.5120/13931-1916.
Full textArora, Jasleen, Paramjeet Singh, and Shaveta Rani. "Detecting and Preventing Attacks in MANET." International Journal of Computer Applications 81, no. 5 (2013): 14–18. http://dx.doi.org/10.5120/14007-2056.
Full textHemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and B. Anni Princy. "Challenges on Missing Packet Detection or Packet Dropping Attacks in Mobile Adhoc Network -A Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 676–80. http://dx.doi.org/10.17762/ijritcc.v11i8s.7255.
Full textA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Full textSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Full textSafdar Malik, Tauqeer, Muhammad Nasir Siddiqui, Muhammad Mateen, Kaleem Razzaq Malik, Song Sun, and Junhao Wen. "Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring." Security and Communication Networks 2022 (April 29, 2022): 1–18. http://dx.doi.org/10.1155/2022/4943218.
Full text