Journal articles on the topic 'Passive attacks in MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Passive attacks in MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.
Full textNigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Full textM S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.
Full textTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Full textBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Full textA., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.
Full textRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Full textPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Full textPrasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.
Full textLiang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy Throughput of MANETs Under Passive and Active Attacks." IEEE Transactions on Information Theory 57, no. 10 (2011): 6692–702. http://dx.doi.org/10.1109/tit.2011.2165800.
Full textLalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Full text., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.
Full textNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Full textGhodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Full textSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Full textArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full textKakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.
Full textJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Full textShrivastava, Neha, and Anand Motwani. "Survey of Malicious Attacks in MANET." International Journal of Computer Applications 80, no. 14 (2013): 28–30. http://dx.doi.org/10.5120/13931-1916.
Full textArora, Jasleen, Paramjeet Singh, and Shaveta Rani. "Detecting and Preventing Attacks in MANET." International Journal of Computer Applications 81, no. 5 (2013): 14–18. http://dx.doi.org/10.5120/14007-2056.
Full textHemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and B. Anni Princy. "Challenges on Missing Packet Detection or Packet Dropping Attacks in Mobile Adhoc Network -A Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 676–80. http://dx.doi.org/10.17762/ijritcc.v11i8s.7255.
Full textA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Full textSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Full textSafdar Malik, Tauqeer, Muhammad Nasir Siddiqui, Muhammad Mateen, Kaleem Razzaq Malik, Song Sun, and Junhao Wen. "Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring." Security and Communication Networks 2022 (April 29, 2022): 1–18. http://dx.doi.org/10.1155/2022/4943218.
Full textHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Full textVijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.
Full textMurugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Full textBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Full textG, Jeeva, and Selvaraj K. "INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2407–13. http://dx.doi.org/10.21917/ijct.2021.0356.
Full textDrishya, Sr, and Vaidehi Vijayakumar. "A REVIEW ON SECURITY ENHANCEMENT THROUGH ANONYMOUS ROUTING IN MANET." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 166. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19629.
Full textYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Full textPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Full textAhamad, Tariq, and Abdullah Aljumah. "Preventive mechanism against DDoS attacks in MANET." International Journal of ADVANCED AND APPLIED SCIENCES 4, no. 5 (2017): 94–100. http://dx.doi.org/10.21833/ijaas.2017.05.017.
Full textChahal, Pooja, Gaurav Kumar Tak, and Anurag Singh Tomar. "Comparative Analysis of Various Attacks on MANET." International Journal of Computer Applications 111, no. 12 (2015): 42–46. http://dx.doi.org/10.5120/19594-1383.
Full textZhao, Ziming, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu. "Risk-Aware Mitigation for MANET Routing Attacks." IEEE Transactions on Dependable and Secure Computing 9, no. 2 (2012): 250–60. http://dx.doi.org/10.1109/tdsc.2011.51.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Full textJatmika, Andy Hidayat, I. Made Windra Yudistiana, and Ariyan Zubaidi. "Analisis Optimasi Kinerja Protokol Routing AODV dan AOMDV dengan Menggunakan Metode RFAP untuk Mencegah RREQ Flooding Attacks pada Jaringan MANET." Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) 1, no. 1 (2019): 9–18. http://dx.doi.org/10.29303/jtika.v1i1.13.
Full textRam Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.
Full textBabu, M. Rajesh, S. Moses Dian, Siva Chelladurai, and Mathiyalagan Palaniappan. "Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/715820.
Full text