Journal articles on the topic 'MANET Issues'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MANET Issues.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Full textSwain, Jhum, Binod Kumar Pattanayak, and Bibudhendu Pati. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks." International Journal of Information Security and Privacy 12, no. 2 (2018): 38–45. http://dx.doi.org/10.4018/ijisp.2018040103.
Full textJangra, Dr Banta Singh, and Manish Kumar Naga. "Study on Security Issues & Challenges in MANET." Paripex - Indian Journal Of Research 3, no. 4 (2012): 54–57. http://dx.doi.org/10.15373/22501991/apr2014/16.
Full textVelagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.
Full textGoyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.
Full textDhende, Sandeep, and Suresh Shirbahadurkar. "MACO-DHKE Based Secure Data Transmission in MANETs." International journal of electrical and computer engineering systems 13, no. 4 (2022): 245–52. http://dx.doi.org/10.32985/ijeces.13.4.1.
Full textHabboush, Ahmad Khader. "Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review." Computer and Information Science 12, no. 1 (2019): 82. http://dx.doi.org/10.5539/cis.v12n1p82.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textSrividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Full textRakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "AN ARTIFICIAL INTELLIGENCE BASED LIGHT WEIGHT CRYPTOGRAPHIC ADDRESS GENERATION (LW-CGA) USING OPTIMIZATION FOR IPv6 BASED MANETs." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 251–61. https://doi.org/10.5281/zenodo.1345600.
Full textAbdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.
Full textKurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.
Full textSirajuddin, Mohammad, Ch Rupa, Surbhi Bhatia, R. N. Thakur, and Arwa Mashat. "Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–8. http://dx.doi.org/10.1155/2022/9134036.
Full textSarkar, Nurul I., and Md Jahan Ali. "A Study of MANET Routing Protocols in Heterogeneous Networks: A Review and Performance Comparison." Electronics 14, no. 5 (2025): 872. https://doi.org/10.3390/electronics14050872.
Full textHabboush, Ahmad Khader. "Hot Spot Phenomenon and Greedy Routing Failure in Mobile Ad-hoc Networks." Modern Applied Science 13, no. 4 (2019): 89. http://dx.doi.org/10.5539/mas.v13n4p89.
Full textA.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.
Full textM. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.
Full textBiswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.
Full textIslam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.
Full textBurhan, Ul Islam Khan, Funke Olanrewaju Rashidah, Anwar Farhat, Rahman Najeeb Athaur, and Yaacob Mashkuri. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832–42. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842.
Full textNigar, Nahida, and Muhammad Anwarul Azim. "Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2199. http://dx.doi.org/10.11591/ijece.v8i4.pp2199-2206.
Full textNahida, Nigar, and Anwarul Azim Muhammad. "Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2199–206. https://doi.org/10.11591/ijece.v8i4.pp2199-2206.
Full textKrzysztoń, Mateusz, and Ewa Niewiadomska-Szynkiewicz. "This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication wi." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2016): 38–49. http://dx.doi.org/10.26636/jtit.2016.3.739.
Full textTiwari, Narendra Kumar. "A Comprehensive Survey on MANET: Architecture, Protocols, and Challenges." International Journal of Information Technology and Management 19, no. 1 (2024): 259–71. https://doi.org/10.29070/7ddjde88.
Full textS, Hemalatha, Harikumar Pallathadka, and Rajesh Chinchewadi. "An Overview of Manet Power Management Approaches." International Journal of Data Informatics and Intelligent Computing 2, no. 4 (2023): 11–19. http://dx.doi.org/10.59461/ijdiic.v2i4.82.
Full textHemalatha, S., Nileshkumar Patel, Ajay Kumar, et al. "MANET Hidden and Exposed Terminal - Challenges and Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (2023): 48–51. http://dx.doi.org/10.17762/ijritcc.v11i10s.7593.
Full textVijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.
Full textZhao, Huanyu, Xin Yang, and Xiaolin Li. "cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks." Vehicular Technology, IEEE Transactions on 62, no. 6 (2013): 2792–806. http://dx.doi.org/10.1109/tvt.2012.2230411.
Full textRam Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.
Full textJagadev, Nibedita, Binod Kumar Pattanayak, Debabrata Singh, and Sipra Sahoo. "A Survey on Bandwidth Management in MANET." International Journal of Engineering & Technology 7, no. 3.4 (2018): 38. http://dx.doi.org/10.14419/ijet.v7i3.4.14672.
Full textVijay U. Rathod. "To Reduce Channel Interference in Mobile Ad-Hoc Networks through LSTM and GRU Prediction Algorithms." Advances in Nonlinear Variational Inequalities 27, no. 2 (2024): 499–516. http://dx.doi.org/10.52783/anvi.v27.1342.
Full textPraveen, Mourya, and Avinash Sharma Prof. "Review on Intrusion Detection in MANETs." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 213–15. https://doi.org/10.5281/zenodo.3843071.
Full textHemalatha, S., Nileshkumar Patel, Neelesh Kumar Jain, Ajay Kumar, Anant Nagesh Kaulage, and Amit Kumar Mishra. "MANET Congestion Control Mechanism - Challenges and Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (2023): 210–14. http://dx.doi.org/10.17762/ijritcc.v11i7.7847.
Full textJohn, Y. M. Mahaboob, and G. Ravi. "Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 232–41. http://dx.doi.org/10.17762/ijritcc.v11i4s.6533.
Full textWijonarko, Dwi, Samsul Arifin, Muhammad Faisal, Muhammad Nabil Pratama, Okta Nindita Priambodo, and Edwin Setiawan Nugraha. "Mobile Ad-Hoc Network (MANET) Method: Some Trends and Open Issues." Recent in Engineering Science and Technology 3, no. 2 (2025): 49–74. https://doi.org/10.59511/riestech.v3i2.108.
Full textHanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.
Full textSumathi, K., and D. Vimal Kumar. "Manet Security and Attacks Issues, Challenges and Solutions." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 433–37. http://dx.doi.org/10.26438/ijcse/v7i3.433437.
Full textEl brak, Said, Mohamed El brak, and Driss Benhaddou. "A New QoS Management Scheme for VoIP Application over Wireless Ad Hoc Networks." Journal of Computer Networks and Communications 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/945695.
Full textRamadass, Parthasarathy, Manjula Sankar, and Shanmugapriyan J. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 37–47. http://dx.doi.org/10.4018/ijkss.2021010103.
Full textNigahat*, Dr. Dinesh Kumar. "BLACK HOLE DETECTION AND PREVENTION USING ADOV AND SHORTEST DISTANCE TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 314–19. https://doi.org/10.5281/zenodo.546354.
Full textShajin, Francis H., Muthusamy Palaniappan, and P. Rajesh. "Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET." International Journal of Computer Network and Information Security 16, no. 1 (2024): 123–32. http://dx.doi.org/10.5815/ijcnis.2024.01.10.
Full textKadhum, Aseel Nadhum. "Improved Digital Security Applications for Smart Card." Feb-Mar 2024, no. 42 (February 1, 2024): 11–18. http://dx.doi.org/10.55529/ijrise.42.11.18.
Full textZaman, Rafi U., Humaira M. Alam, Khaleel Ur Rahman Khan, and A. Venugopal Reddy. "Improvement of Adaptive Load Balanced Gateway Discovery Protocol in Hybrid Integrated Internet-MANET." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 3 (2017): 162. http://dx.doi.org/10.3991/ijim.v11i3.6706.
Full textSingh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.
Full textInternational, Journal on AdHoc Networking Systems (IJANS). "Different Ways to Achieve Trust in MANET." International Journal on AdHoc Networking Systems (IJANS) 2, no. 2 (2024): 12. https://doi.org/10.5121/ijans.2012.2206.
Full textAl mojamed, Mohammad. "Integrating IP Mobility Management Protocols and MANET: A Survey." Future Internet 12, no. 9 (2020): 150. http://dx.doi.org/10.3390/fi12090150.
Full text