Journal articles on the topic 'Security of routing in MANETs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of routing in MANETs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abdourahime, GAYE, and KONATE Karim. "The Nash'S Balance in the Theory of Games for A Secure Model Mechanism in Routing Protocol of Manet." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 1–12. https://doi.org/10.5281/zenodo.3351937.
Full textDr., Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." International Journal of Advance and Applied Research 10, no. 3 (2023): 107–12. https://doi.org/10.5281/zenodo.7583280.
Full textVersha Matre, Et al. "Trust-Based Routing Selection Policy on Mobile Ad-Hoc Network Using Aodv Routing Protocol." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 4575–80. http://dx.doi.org/10.17762/ijritcc.v11i9.9972.
Full textMurugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textRAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.
Full textRajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.
Full textBhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.
Full textNourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.
Full textA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Full textRakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.
Full textMohammed, Aziz Ahmed*1 Mohammed Sirajuddin2 &. Nazia Kouser3. "REDUCING THE NETWORK OVERHEAD BY IMPLEMENTING DISTRIBUTED KEY MECHANISM IN MANETS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 8 (2018): 104–10. https://doi.org/10.5281/zenodo.1342512.
Full textSahu, Dr Rani, Vinay Sahu, Dr Pushplata Chouksey, and Sourabh Jain. "SecureZone: Secure and Efficient Multipath Routing for Mobile Ad Hoc Networks." International Journal of Advanced Networking and Applications 15, no. 06 (2024): 6182–93. http://dx.doi.org/10.35444/ijana.2024.15605.
Full textTongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.
Full textKONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.
Full textPatel, Ibrahim, Aisha Ruman Patel, S. Saravanan, D. Ganeshaperumal, and Kedarnath B. "Pre-Existing Mobile Ad Hoc Network Routing Protection." ECS Transactions 107, no. 1 (2022): 395–404. http://dx.doi.org/10.1149/10701.0395ecst.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textBiswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.
Full textFarooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.
Full textAmit, Kumar, K. Katiyar Vijay, and Kumar Kamal. "SECURE ROUTING PROPOSALS IN MANETS: A REVIEW." International Journal on Foundations of Computer Science & Technology (IJFCST) 6, no. 1 (2023): 15. https://doi.org/10.5281/zenodo.7594301.
Full textPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Full textPrasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.
Full textR. O, RAJI, and Akinyemi Moruff OYELAKIN. "APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW." Journal of Information Technology and Computing 4, no. 2 (2023): 20–30. http://dx.doi.org/10.48185/jitc.v4i2.930.
Full textS, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.
Full textSangheethaa, S. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems (IJANS) 13, no. 3 (2023): 7. https://doi.org/10.5281/zenodo.8170599.
Full textBondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (2022): 1041. http://dx.doi.org/10.3390/app12031041.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textSheela, M. Sahaya, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. Jeevana Jyothi, and K. Ramamoorthy. "Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm." Babylonian Journal of Networking 2024 (June 15, 2024): 78–87. http://dx.doi.org/10.58496/bjn/2024/009.
Full textChugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (2021): 1635. http://dx.doi.org/10.3390/electronics10141635.
Full textA., Yashwanth Reddy, Rakesh Chowdary M., and Krishna A. "AUTHENTICATED ANONYMOUS SECURE ROUTING STRATEGY FOR HIGH SPEED NETWORKS." International Journal of Applied and Advanced Scientific Research 2, no. 2 (2017): 196–201. https://doi.org/10.5281/zenodo.1034459.
Full textP. Saranya, Dr. A. Nithya. "Reputation-Based Opportunistic Routing Protocol Using Q-Learning For Manet Attacked By Malicious Nodes: A Survey." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 5195–204. http://dx.doi.org/10.52783/tjjpt.v44.i4.1874.
Full textArvind, S.Nagrik, B.S.Sonawane, and Kasar Smita. "Strengthening CGA Security in MANETs with Modified AES for IPv6." Journal of Advance Research in Mobile Computing 6, no. 2 (2024): 7–15. https://doi.org/10.5281/zenodo.10851646.
Full textSingh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.
Full textCai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.
Full textThamizhmaran, K. "Secure efficient communication in routing protocol in MANETs using ECC-EA3ACKa." i-manager's Journal on Mobile Applications and Technologies 10, no. 1 (2023): 12. http://dx.doi.org/10.26634/jmt.10.1.20125.
Full textVikas and Dr. Shashiraj Teotia. "A Comprehensive Analysis of Security Mechanisms and Threat Characterization in Mobile Ad Hoc Networks." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 5 (2025): 732–37. https://doi.org/10.51583/ijltemas.2025.140500079.
Full textGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Full textMoumen, Idriss, Najat Rafalia, Jaafar Abouchabaka, and Youssef Chatoui. "AODV-based Defense Mechanism for Mitigating Blackhole Attacks in MANET." E3S Web of Conferences 412 (2023): 01094. http://dx.doi.org/10.1051/e3sconf/202341201094.
Full textShankar, K., and Mohamed Elhoseny. "Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES." JUCS - Journal of Universal Computer Science 25, no. (10) (2019): 1221–39. https://doi.org/10.3217/jucs-025-10-1221.
Full textMahdi, M. A., T. C. Wan, A. Mahdi, M. A. G. Hazber, and B. A. Mohammed. "A Multipath Cluster-Based Routing Protocol For Mobile Ad Hoc Networks." Engineering, Technology & Applied Science Research 11, no. 5 (2021): 7635–40. http://dx.doi.org/10.48084/etasr.4259.
Full textT, Ramya. "Prevention of Cooperative E Black Hole Attacks and Emerging efficient in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 58–60. https://doi.org/10.5281/zenodo.1410971.
Full textChitra, D., K. Divya, and Vijay Nath. "EIGRP-Based Hybrid Routing Approach for MANETs." International Journal of Microsystems and IoT 2, no. 4 (2024): 706–13. https://doi.org/10.5281/zenodo.11208955.
Full textAdjih, Cedric, Pascale Minet, Paul Muhlethaler,, Emmanuel Baccelli, and Thierry Plesse. "Quality of service support, security and OSPF interconnection in a MANET using OLSR." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 70–76. http://dx.doi.org/10.26636/jtit.2008.2.874.
Full textKaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.
Full textOmer, Khaled Ahmed Abood. "Impact of Jellyfish attack on routing protocols in TCP-based MANETs." University of Aden Journal of Natural and Applied Sciences 27, no. 1 (2023): 139–50. http://dx.doi.org/10.47372/uajnas.2023.n1.a09.
Full textU., Kumaran, Ramachandran A., Jegan J., and K. Subramanian E. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 2 (2020): 949–56. https://doi.org/10.11591/ijeecs.v19.i2.pp949-956.
Full textMOHANRAJ, E., K. DURAISWAMY, and K. PRASANTH. "SECURE QoS-BASED ROUTING USING HIERARCHICAL KEY RANKING MODEL IN MANET." Journal of Circuits, Systems and Computers 23, no. 09 (2014): 1450128. http://dx.doi.org/10.1142/s021812661450128x.
Full textMs. S. Kalaichelvi and Dr. K. R. Ananth. "A Comprehensive Review on the Impact of 5G Technologies on Mobile Ad-Hoc Networks." International Journal of Advanced Networking and Applications 16, no. 06 (2025): 6699–704. https://doi.org/10.35444/ijana.2025.16611.
Full textK.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.
Full textAbdullah, Cheman Mohammed, and Ibrahim Mahmood Ibrahim. "A Survey on Binary Tree-Based Approaches for Data Transmission in Mobile Ad Hoc Networks." Asian Journal of Research in Computer Science 18, no. 3 (2025): 176–89. https://doi.org/10.9734/ajrcos/2025/v18i3585.
Full text