Journal articles on the topic 'Security in MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security in MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Murugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Full textNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Full textA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textDhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.
Full textL. Esteban, Allen Paul. "Anomaly Recognition in Wireless Ad-hoc Network by using Ant Colony Optimization and Deep Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (2023): 395–403. http://dx.doi.org/10.17762/ijritcc.v11i5.6692.
Full textDr., Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." International Journal of Advance and Applied Research 10, no. 3 (2023): 107–12. https://doi.org/10.5281/zenodo.7583280.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full textRAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.
Full textVikas and Dr. Shashiraj Teotia. "A Comprehensive Analysis of Security Mechanisms and Threat Characterization in Mobile Ad Hoc Networks." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 5 (2025): 732–37. https://doi.org/10.51583/ijltemas.2025.140500079.
Full textDhende, Sandeep, and Suresh Shirbahadurkar. "MACO-DHKE Based Secure Data Transmission in MANETs." International journal of electrical and computer engineering systems 13, no. 4 (2022): 245–52. http://dx.doi.org/10.32985/ijeces.13.4.1.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Full textSrividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full textJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Full textMOHANRAJ, E., K. DURAISWAMY, and K. PRASANTH. "SECURE QoS-BASED ROUTING USING HIERARCHICAL KEY RANKING MODEL IN MANET." Journal of Circuits, Systems and Computers 23, no. 09 (2014): 1450128. http://dx.doi.org/10.1142/s021812661450128x.
Full textRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Full textPatel, Rajan, and Pariza Kamboj. "A Survey on Contemporary MANET Security: Approaches for Securing the MANET." International Journal of Engineering and Technology 9, no. 1 (2017): 98–112. http://dx.doi.org/10.21817/ijet/2017/v9i1/170901413.
Full textSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Full textShankar, K., and Mohamed Elhoseny. "Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES." JUCS - Journal of Universal Computer Science 25, no. (10) (2019): 1221–39. https://doi.org/10.3217/jucs-025-10-1221.
Full textFarooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.
Full textKadhum, Aseel Nadhum. "Improved Digital Security Applications for Smart Card." Feb-Mar 2024, no. 42 (February 1, 2024): 11–18. http://dx.doi.org/10.55529/ijrise.42.11.18.
Full textGottron, Christian, André König, and Ralf Steinmetz. "A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches." Future Internet 2, no. 4 (2010): 505–32. http://dx.doi.org/10.3390/fi2040505.
Full textBronikovskii, E. A., та V. I. Nikonov. "АСTUAL SECURITY ASPECTS IN MANET'S". Dynamics of Systems, Mechanisms and Machines 8, № 4 (2020): 113–19. http://dx.doi.org/10.25206/2310-9793-8-4-113-119.
Full textBiswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.
Full textM. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.
Full textHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Full textN, Chaitanya Kumar, Basit Abdul, Singh Priyadarshi, and Ch. Venkaiah V. "Lightweight Cryptography for Distributed PKI Based MANETS." International Journal ofComputer Networks & Communications (IJCNC) 10, no. 2 (2018): 69–83. https://doi.org/10.5281/zenodo.1226445.
Full textSwain, Jhum, Binod Kumar Pattanayak, and Bibudhendu Pati. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks." International Journal of Information Security and Privacy 12, no. 2 (2018): 38–45. http://dx.doi.org/10.4018/ijisp.2018040103.
Full textSirajuddin, Mohammad, Ch Rupa, Surbhi Bhatia, R. N. Thakur, and Arwa Mashat. "Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–8. http://dx.doi.org/10.1155/2022/9134036.
Full textWang, Pengkun, Momiao Zhou, and Zhizhong Ding. "A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks." Sensors 21, no. 7 (2021): 2355. http://dx.doi.org/10.3390/s21072355.
Full textRajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.
Full textBhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textAbdourahime, GAYE, and KONATE Karim. "The Nash'S Balance in the Theory of Games for A Secure Model Mechanism in Routing Protocol of Manet." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 1–12. https://doi.org/10.5281/zenodo.3351937.
Full textPrasanna, D. S. John Deva, Dr D. John Aravindhar, and Dr P. Sivasankar. "Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud - MANET." Webology 18, SI01 (2021): 88–106. http://dx.doi.org/10.14704/web/v18si01/web18025.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textRakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.
Full textAdjih, Cedric, Pascale Minet, Paul Muhlethaler,, Emmanuel Baccelli, and Thierry Plesse. "Quality of service support, security and OSPF interconnection in a MANET using OLSR." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 70–76. http://dx.doi.org/10.26636/jtit.2008.2.874.
Full textM. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.
Full textA., Yashwanth Reddy, Rakesh Chowdary M., and Krishna A. "AUTHENTICATED ANONYMOUS SECURE ROUTING STRATEGY FOR HIGH SPEED NETWORKS." International Journal of Applied and Advanced Scientific Research 2, no. 2 (2017): 196–201. https://doi.org/10.5281/zenodo.1034459.
Full textRakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "AN ARTIFICIAL INTELLIGENCE BASED LIGHT WEIGHT CRYPTOGRAPHIC ADDRESS GENERATION (LW-CGA) USING OPTIMIZATION FOR IPv6 BASED MANETs." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 251–61. https://doi.org/10.5281/zenodo.1345600.
Full textTongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.
Full textDrishya, Sr, and Vaidehi Vijayakumar. "A REVIEW ON SECURITY ENHANCEMENT THROUGH ANONYMOUS ROUTING IN MANET." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 166. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19629.
Full textAshish, kumar khare1 Dr. R. C. Jain2 and Dr. J. L. Rana3. "A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET." Informatics Engineering, an International Journal (IEIJ), 03, sep (2015): 01–10. https://doi.org/10.5121/ieij.2015.3301.
Full textS, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.
Full textSangheethaa, S. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems (IJANS) 13, no. 3 (2023): 7. https://doi.org/10.5281/zenodo.8170599.
Full text