Journal articles on the topic 'MANET attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MANET attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textM. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.
Full textMurugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Full textKancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (2022): 3480. http://dx.doi.org/10.3390/electronics11213480.
Full textYusri Dak, Ahmad, Noor Elaiza Abdul Khalid, and Saadiah Yahya. "Integrated Combined Layer Algorithm (ICLA) for Jamming Detection in MANET." International Journal of Engineering & Technology 7, no. 3.15 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i3.15.17400.
Full textZain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.
Full textAhmed, N. Syed Siraj, and Debi Prasanna Acharjya. "A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set." International Journal of Information Security and Privacy 13, no. 4 (2019): 28–52. http://dx.doi.org/10.4018/ijisp.2019100103.
Full textDulaimi, Layth A. Khalil Al, R.Badlishah Ahmad, Naimah Yaakob, Mohd Hafiz Yusoff, and Mohamed Elshaikh. "Black hole attack behavioral analysis general network scalability." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 2 (2019): 677–82. https://doi.org/10.11591/ijeecs.v13.i2.pp677-682.
Full textHijazi, Sherin, Mahmoud Moshref, and Saleh Al-Sharaeh. "Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 1 (2017): 7535–47. http://dx.doi.org/10.24297/ijct.v16i1.5728.
Full textKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Full textHanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.
Full textPazhanisamy, K., and Dr Latha Parthiban. "Mobile Ad Hoc Networks Intrusion Detection in Co-Operative Motion." Alinteri Journal of Agriculture Sciences 36, no. 2 (2021): 76–81. http://dx.doi.org/10.47059/alinteri/v36i2/ajas21117.
Full textGhodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.
Full textRamachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.
Full textArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Full textSah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.
Full text., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.
Full textJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Full textA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textEltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (2023): 1956. http://dx.doi.org/10.3390/electronics12091956.
Full textYazdanypoor, Mohammad, Stefano Cirillo, and Giandomenico Solimando. "Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks." Applied Sciences 14, no. 17 (2024): 7982. http://dx.doi.org/10.3390/app14177982.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textNigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Full textNiranjan, Panda, and Kumar Pattanayak Binod. "Analysis of Blackhole Attack in AODV and DSR." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3092–102. https://doi.org/10.11591/ijece.v8i5.pp3092-3102.
Full textHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Full textT, Ramya. "Prevention of Cooperative E Black Hole Attacks and Emerging efficient in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 58–60. https://doi.org/10.5281/zenodo.1410971.
Full textSingh, Gurvir, and Tajinder Kaur. "Termite-Based Approach for Wormhole Attack Detection in Mobile Ad-Hoc Networks (MANETs)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42378.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Full textSafitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.
Full textBiswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.
Full textLalu Prasad, Jammana, Kavitha Chekuri, and Lakshmana Rao Rowthu. "INFLUENCE WITH TRAFFIC RATE AND BEACON TIME FOR JAMMING ATTACK ON 802.11B IN MOBILE AD HOC NETWORKS." International Journal of Engineering Applied Sciences and Technology 8, no. 1 (2023): 100–105. http://dx.doi.org/10.33564/ijeast.2023.v08i01.017.
Full textSowah, Robert A., Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, and Koudjo M. Koumadi. "Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)." Journal of Computer Networks and Communications 2019 (January 20, 2019): 1–14. http://dx.doi.org/10.1155/2019/4683982.
Full textPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Full textVijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.
Full textKONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textSrividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textKakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.
Full textAbdelhaq, Maha, Raed Alsaqour, Mada Alaskar, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textMaha, Abdelhaq, Alsaqour Raed, Alaskar Mada, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844–52. https://doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textNigahat*, Dr. Dinesh Kumar. "BLACK HOLE DETECTION AND PREVENTION USING ADOV AND SHORTEST DISTANCE TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 314–19. https://doi.org/10.5281/zenodo.546354.
Full textCh, Asha Jyothi, and Narsimha G. "Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks." International Journal of Information Security and Privacy 13, no. 4 (2019): 68–88. http://dx.doi.org/10.4018/ijisp.2019100105.
Full textSahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.
Full text