To see the other types of publications on this topic, follow the link: Security of routing in MANETs.

Journal articles on the topic 'Security of routing in MANETs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of routing in MANETs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Abdourahime, GAYE, and KONATE Karim. "The Nash'S Balance in the Theory of Games for A Secure Model Mechanism in Routing Protocol of Manet." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 1–12. https://doi.org/10.5281/zenodo.3351937.

Full text
Abstract:
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a p
APA, Harvard, Vancouver, ISO, and other styles
2

Dr., Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." International Journal of Advance and Applied Research 10, no. 3 (2023): 107–12. https://doi.org/10.5281/zenodo.7583280.

Full text
Abstract:
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the
APA, Harvard, Vancouver, ISO, and other styles
3

Versha Matre, Et al. "Trust-Based Routing Selection Policy on Mobile Ad-Hoc Network Using Aodv Routing Protocol." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 4575–80. http://dx.doi.org/10.17762/ijritcc.v11i9.9972.

Full text
Abstract:
This study presents an enhanced Ad-hoc On-demand Distance Vector (AODV) routing protocol, termed Proposed_TAODV, designed to improve security in Mobile Ad-Hoc Networks (MANETs) of 150 nodes by incorporating trust-based mechanisms. Through a comprehensive simulation, the Proposed_TAODV is evaluated against existing AODV and Dynamic Source Routing (DSR) protocols under conditions of increasing malicious node presence. The results reveal that Proposed_TAODV maintains a higher Packet Delivery Ratio, experiences lower Average End-to-End Delay, and achieves greater Throughput compared to the benchma
APA, Harvard, Vancouver, ISO, and other styles
4

Murugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) are susceptible to various security threats due to their decentralized and dynamic nature. Among these threats, Distributed Denial of Service (DDoS) and sibling attacks pose significant challenges to the integrity and availability of network services. This paper presents a novel approach for securing MANETs against DDoS and sibling attacks through a robust Intrusion Prevention System (IPS) integrated with a secured routing mechanism. The proposed methodology leverages residual transfer learning to adapt a pre-trained model for intrusion detection to the MANET en
APA, Harvard, Vancouver, ISO, and other styles
5

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols ar
APA, Harvard, Vancouver, ISO, and other styles
6

RAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.

Full text
Abstract:
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a s
APA, Harvard, Vancouver, ISO, and other styles
7

Rajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.

Full text
Abstract:
The procession in the area of internet due to wireless networking technologies gives rise to multiple new applications. In the past few decades, we have found many advance developments in wireless networks. With these developments and large number of applications that are being provided by MANETs, we still face some challenges that have to be overcome. The baseless and active nature of these networks demand new set of networking schemes that should be implemented to provide effective peer-to-peer communication. MANETs hire traditional TCP/IP structure to provide this peer-to-peer communication
APA, Harvard, Vancouver, ISO, and other styles
8

Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.

Full text
Abstract:
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the
APA, Harvard, Vancouver, ISO, and other styles
9

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.

Full text
Abstract:
MANETs (Mobile Ad hoc Networks) had become the most important next generation wireless network technologies. It is made up of self-configurable mobile nodes, Intruders mieght decrease MANET functionality due to the dispersed and wireless nature of MANETs, and therefore they were vulnerable to numerous attacks at different levels. The important challenges for MANET were the security and routing protocols. This paper examined the impact of Jammer which it was a kind of DoS attack which interfere with the normal operation of network and show how the Jammer increased the delay and data dropped and
APA, Harvard, Vancouver, ISO, and other styles
10

A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.

Full text
Abstract:
Mobile Ad hoc Networks are widely used in defense applications where traditional wireless network is difficult to implement as the network is formed by autonomous and decentralized wireless nodes. Privacy and Security in MANET are the most important disquiet for basic functionality of the network. Security is the major challenge in MANETs because of its characteristics like resource constraints, open medium, lack of fixed infrastructure, dynamism of topology and no clear security mechanism. As the topology is dynamic, routing process is very difficult. So MANET often suffers from routing attac
APA, Harvard, Vancouver, ISO, and other styles
11

Rakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.

Full text
Abstract:
The Mobile ad hoc networks (MANET) have become most significant and are being used widely in many applications. Generally, these applications require low cost, low energy and low data nodes that communicating over multiple hop to cover a large geographical area. In internet protocol version (IPv6) based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through auto configuration so the chances of energy consumption and security of network become high. This paper presents a survey of different routing protocols of IPv6 based MANET to minimize the
APA, Harvard, Vancouver, ISO, and other styles
12

Mohammed, Aziz Ahmed*1 Mohammed Sirajuddin2 &. Nazia Kouser3. "REDUCING THE NETWORK OVERHEAD BY IMPLEMENTING DISTRIBUTED KEY MECHANISM IN MANETS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 8 (2018): 104–10. https://doi.org/10.5281/zenodo.1342512.

Full text
Abstract:
In the wireless sensor networks, the Mobile Ad hoc Networks (MANETs) is a type of networks. The difference between wireless network and MANETs is, in the wireless network the nodes are stable and in MANETs no one node is stable which means these are mobile nodes. Generally, any network hasinformation security breaches.The closing purpose of the security answers for MANETs is to provide protection offerings, which includes authentication, confidentiality, integrity, anonymity, and availability, to cellular user. In order to acquire this goal, the security solution required to provide complete p
APA, Harvard, Vancouver, ISO, and other styles
13

Sahu, Dr Rani, Vinay Sahu, Dr Pushplata Chouksey, and Sourabh Jain. "SecureZone: Secure and Efficient Multipath Routing for Mobile Ad Hoc Networks." International Journal of Advanced Networking and Applications 15, no. 06 (2024): 6182–93. http://dx.doi.org/10.35444/ijana.2024.15605.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent collaborative networks formed by mobile nodes without a centralized infrastructure, finding application across diverse domains including military and security-sensitive operations. However, securing the routing process within MANETs poses significant challenges due to the absence of a central authority and the dynamic nature of the network. Existing routing protocols suffer from limitations such as bandwidth consumption and route request delays. In response, this paper introduces the Secure and Energy-efficient Zone-based Multipath Routing Protocol (SE
APA, Harvard, Vancouver, ISO, and other styles
14

Tongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) have become indispensable in modern military operations; they provide decentralized, adaptive, and resilient communication frameworks in dynamic battlefield environments. This paper presents a comprehensive review of MANET innovations, challenges, and research gaps, focusing on advancements in security mechanisms, energy efficiency, routing optimization, interoperability, and AI-driven management systems. MANETs enhance military communication by enabling self-forming and self-healing networks, improving situational awareness, tactical coordination, and mission s
APA, Harvard, Vancouver, ISO, and other styles
15

KONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.

Full text
Abstract:
The present work is dedicated to study attacks and countermeasures in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a table which summarizes the advantages and the disadvantages of the mechanisms proposed were presented. 
APA, Harvard, Vancouver, ISO, and other styles
16

Patel, Ibrahim, Aisha Ruman Patel, S. Saravanan, D. Ganeshaperumal, and Kedarnath B. "Pre-Existing Mobile Ad Hoc Network Routing Protection." ECS Transactions 107, no. 1 (2022): 395–404. http://dx.doi.org/10.1149/10701.0395ecst.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) versatility and portability have made them well known across a wide range of uses. Security conventions for protecting steering and device details have been established to ensure these systems. Those conventions, however, simply secure courses or correspondence, not both. To offer complete protection, both stable steering and communication safety conventions need to be performed. Using communication security conventions which were originally developed for, and Wi-Fi systems, may also place an enormous weight on a MANET's restricted network property. A new protec
APA, Harvard, Vancouver, ISO, and other styles
17

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Full text
Abstract:
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
APA, Harvard, Vancouver, ISO, and other styles
18

Biswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.

Full text
Abstract:
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET  is  particularly  vulnerable  to  security attacks  in  comparison  to  wired  network  or infrastructure-based  wireless  network  due  to  its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and   transmi
APA, Harvard, Vancouver, ISO, and other styles
19

Farooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.

Full text
Abstract:
Abstract: A mobile ad hoc network is made up of portable wireless nodes (MANET). The communication between these mobile nodes is not managed centralized. A self-organizing, self-configuring network known as MANET allows mobile nodes to roam around at whim. The mobile nodes can act as a router by receiving and sending packets. Due to the significance of routing in MANET, this thesis also evaluates several routing systems' efficacy. We compared the three routing protocols AODV, DSR, OLSR, and DSDV. Throughput, network load, and latency are the three metrics used to gauge how well-performing diff
APA, Harvard, Vancouver, ISO, and other styles
20

Amit, Kumar, K. Katiyar Vijay, and Kumar Kamal. "SECURE ROUTING PROPOSALS IN MANETS: A REVIEW." International Journal on Foundations of Computer Science & Technology (IJFCST) 6, no. 1 (2023): 15. https://doi.org/10.5281/zenodo.7594301.

Full text
Abstract:
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for testing dynamics and applications. Wireless medium as medium for communication and lack of centralized control renders MANETs a favorable victim of hackers and intruders. Other features like change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of propos
APA, Harvard, Vancouver, ISO, and other styles
21

Prasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.

Full text
Abstract:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
APA, Harvard, Vancouver, ISO, and other styles
22

Prasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.

Full text
Abstract:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
APA, Harvard, Vancouver, ISO, and other styles
23

R. O, RAJI, and Akinyemi Moruff OYELAKIN. "APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW." Journal of Information Technology and Computing 4, no. 2 (2023): 20–30. http://dx.doi.org/10.48185/jitc.v4i2.930.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) have been very popular for some years now owing to their ability to allow communication in dynamic and infrastructure-less environments. However, the unique characteristics of MANETs, such as node mobility, limited power resources, and absence of centralized infrastructure, pose challenges in ensuring efficient routing and robust security. This paper presents a review of the existing techniques aimed at improving routing protocols and security in MANETs. Scholarly articles, conference papers, and technical reports published in notable research outlets were sourc
APA, Harvard, Vancouver, ISO, and other styles
24

S, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.

Full text
Abstract:
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for communication. In this network, nodes are self-organized and can act as router. They are battery operated and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible application of Block chain in many sectors including MANETs. This paper surveys the existing researches done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for improving security while routing packets from one node to another. Some researchers have proposed trust model
APA, Harvard, Vancouver, ISO, and other styles
25

Sangheethaa, S. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems (IJANS) 13, no. 3 (2023): 7. https://doi.org/10.5281/zenodo.8170599.

Full text
Abstract:
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for communication. In this network, nodes are self-organized and can act as router. They are battery operated and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible application of Block chain in many sectors including MANETs. This paper surveys the existing researches done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for improving security while routing packets from one node to another. Some researchers have proposed trust model
APA, Harvard, Vancouver, ISO, and other styles
26

Bondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (2022): 1041. http://dx.doi.org/10.3390/app12031041.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involve
APA, Harvard, Vancouver, ISO, and other styles
27

Punya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.

Full text
Abstract:
Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first and then some protection mechanisms against those attacks are discussed. Comparisons
APA, Harvard, Vancouver, ISO, and other styles
28

Sheela, M. Sahaya, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. Jeevana Jyothi, and K. Ramamoorthy. "Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm." Babylonian Journal of Networking 2024 (June 15, 2024): 78–87. http://dx.doi.org/10.58496/bjn/2024/009.

Full text
Abstract:
Mobile Ad-hoc Network (MANET) autonomous operation can be multi-hop it is the infrastructure-less wireless network. Security is one of the biggest challenges in Mobile Adhoc Network. The MANETs security there are considerations must be so that the routing protocol in order to protect the secure data transmission. In the routing and security that is an important aspect for in a MANETs, existing method routing protocol, however, is not enough to security requirements. The proposed method using Fast Recursive Transmission Algorithm (FRTA) used designed to maximize the data security, routing optim
APA, Harvard, Vancouver, ISO, and other styles
29

Chugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (2021): 1635. http://dx.doi.org/10.3390/electronics10141635.

Full text
Abstract:
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing pro
APA, Harvard, Vancouver, ISO, and other styles
30

A., Yashwanth Reddy, Rakesh Chowdary M., and Krishna A. "AUTHENTICATED ANONYMOUS SECURE ROUTING STRATEGY FOR HIGH SPEED NETWORKS." International Journal of Applied and Advanced Scientific Research 2, no. 2 (2017): 196–201. https://doi.org/10.5281/zenodo.1034459.

Full text
Abstract:
MANETs operates in different propagation and network operating conditions. For security purpose MANET operates on many security protocols, power/energy-efficient protocol. Many of an existing routing protocol for security enhancement is based on location based routing and some gets attack from the attacker and also provide delay in packet transmission. In this paper proposal routing protocol method is Trust model Authenticated Anonymous Secure Routing (TAASR). Group Signature and Onion Routing with the trust model increases the efficiency of routing in MANET. Group signature in this secure rou
APA, Harvard, Vancouver, ISO, and other styles
31

P. Saranya, Dr. A. Nithya. "Reputation-Based Opportunistic Routing Protocol Using Q-Learning For Manet Attacked By Malicious Nodes: A Survey." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 5195–204. http://dx.doi.org/10.52783/tjjpt.v44.i4.1874.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) have emerged as a viable paradigm for creating dynamic communication between mobile nodes in the absence of a permanent infrastructure. However, since MANETs are inherently decentralized and self-organizing, they are vulnerable to a variety of security concerns, especially when hostile nodes seek to interrupt communication and undermine network operations. As a consequence, developing efficient and robust routing protocols is critical to ensuring dependable and secure data transmission in MANETs. This review study gives an in-depth look into Reputation-Based Opp
APA, Harvard, Vancouver, ISO, and other styles
32

Arvind, S.Nagrik, B.S.Sonawane, and Kasar Smita. "Strengthening CGA Security in MANETs with Modified AES for IPv6." Journal of Advance Research in Mobile Computing 6, no. 2 (2024): 7–15. https://doi.org/10.5281/zenodo.10851646.

Full text
Abstract:
<em>Mobile Ad Hoc Networks (MANETs) are susceptible to various security threats due to their dynamic and decentralized nature. This paper presents a comprehensive overview of security challenges and solutions in MANETs, drawing from recent surveys and research studies. The surveyed literature covers a wide range of topics, including authentication protocols, routing attacks, secure routing mechanisms, trust and reputation management, and general security issues. The findings highlight the importance of addressing these security concerns to ensure the reliable and secure operation of MANETs in
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be d
APA, Harvard, Vancouver, ISO, and other styles
34

Cai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.

Full text
Abstract:
A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly an
APA, Harvard, Vancouver, ISO, and other styles
35

Thamizhmaran, K. "Secure efficient communication in routing protocol in MANETs using ECC-EA3ACKa." i-manager's Journal on Mobile Applications and Technologies 10, no. 1 (2023): 12. http://dx.doi.org/10.26634/jmt.10.1.20125.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are dynamic, self-organizing networks that lack a fixed infrastructure, making them highly vulnerable to various security threats. One of the critical aspects in MANETs is the establishment of efficient and secure communication among mobile nodes. Routing protocols play a pivotal role in ensuring reliable data transmission in such environments. This paper presents a comprehensive overview of the challenges and solutions related to achieving secure and efficient communication within MANET routing protocols. The main objective of this paper is to define the path f
APA, Harvard, Vancouver, ISO, and other styles
36

Vikas and Dr. Shashiraj Teotia. "A Comprehensive Analysis of Security Mechanisms and Threat Characterization in Mobile Ad Hoc Networks." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 5 (2025): 732–37. https://doi.org/10.51583/ijltemas.2025.140500079.

Full text
Abstract:
Abstract: Mobile Ad Hoc Networks (MANETs) represent a critical advancement in wireless communication, enabling dynamic, infrastructure-less networking suitable for various applications, including military, disaster recovery, and remote sensing. However, their decentralized architecture, dynamic topology, and constrained resources expose them to a wide range of security challenges. This research paper presents a comprehensive evaluation of existing security mechanisms designed to protect MANETs, encompassing cryptographic protocols, intrusion detection systems, secure routing techniques, and tr
APA, Harvard, Vancouver, ISO, and other styles
37

Gandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.

Full text
Abstract:
There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly iden
APA, Harvard, Vancouver, ISO, and other styles
38

Moumen, Idriss, Najat Rafalia, Jaafar Abouchabaka, and Youssef Chatoui. "AODV-based Defense Mechanism for Mitigating Blackhole Attacks in MANET." E3S Web of Conferences 412 (2023): 01094. http://dx.doi.org/10.1051/e3sconf/202341201094.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) are decentralized and self-configuring networks composed of mobile devices that communicate without a fixed infrastructure. However, the open nature of MANETs makes them vulnerable to various security threats, including blackhole attacks, where malicious nodes attract and discard network traffic without forwarding it to its intended destination. Mitigating blackhole attacks is crucial to ensure the reliability and security of communication in MANETs. This paper focuses on the development and evaluation of AODV (Ad hoc On-Demand Distance Vector)-based defence mec
APA, Harvard, Vancouver, ISO, and other styles
39

Shankar, K., and Mohamed Elhoseny. "Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES." JUCS - Journal of Universal Computer Science 25, no. (10) (2019): 1221–39. https://doi.org/10.3217/jucs-025-10-1221.

Full text
Abstract:
In wireless communication, Mobile Ad Hoc Network (MANET) consists of a number of mobile nodes which are communicated with each other without any base station. One of the security attacks in MANETs is Packet forwarding misbehaviour attack; this makes MANETs weak by showing message loss behavior. For securing message transmission in MANET, the work proposes Energy Efficient Clustering Protocol (EECP) with Radial Basis Function (RBF) based CH is elected for formed Clusters. Moreover, here some Network measures are considered to detect the malicious nodes and CH model that is speed, mobility, trus
APA, Harvard, Vancouver, ISO, and other styles
40

Mahdi, M. A., T. C. Wan, A. Mahdi, M. A. G. Hazber, and B. A. Mohammed. "A Multipath Cluster-Based Routing Protocol For Mobile Ad Hoc Networks." Engineering, Technology & Applied Science Research 11, no. 5 (2021): 7635–40. http://dx.doi.org/10.48084/etasr.4259.

Full text
Abstract:
A MANET (Mobile Ad-hoc Network) is a group of mobile network nodes dynamically forming a network without any pre-existing infrastructure. Multi-path routing protocols in MANETs try to discover and use multiple routes between source and destination nodes. Multipath routing is typically used to reduce average delay, increase transmission reliability, provide load balancing among multiple routes, and improve security and overall QoS (Quality of Service). In this paper, the Cluster-Based Routing Protocol (CBRP), which is a single path MANET protocol is enhanced to use multiple paths. The traffic w
APA, Harvard, Vancouver, ISO, and other styles
41

T, Ramya. "Prevention of Cooperative E Black Hole Attacks and Emerging efficient in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 58–60. https://doi.org/10.5281/zenodo.1410971.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are extensively used in military and civilian&nbsp;applications. The dynamic topology of MANETs allows nodes to join and leave the&nbsp;networks at any point in time. The generic characteristic of MANET has rendered it&nbsp;vulnerable to security attacks. In this paper, we address the problem of coordinated&nbsp;attack by multiple black holes acting a group. We present a technique to identify&nbsp;several black holes cooperating with each other and a solution to discover a safe&nbsp;route avoiding cooperative black hole attack.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
42

Chitra, D., K. Divya, and Vijay Nath. "EIGRP-Based Hybrid Routing Approach for MANETs." International Journal of Microsystems and IoT 2, no. 4 (2024): 706–13. https://doi.org/10.5281/zenodo.11208955.

Full text
Abstract:
In a MANET (mobile ad-hoc network), several mobile nodes are wirelessly linked to each other, but there is no central network infrastructure. The topological changes that occur often, the efficient use of the energy resources that are available, the associated routing overheads, and susceptibility to assaults are the main challenges encountered in the design of routing protocols for MANETs. This article presents a more secure and efficient routing method that makes use of modified EAACK when used with hybrid EIGRP. EIGRP uses the DUAL, an enhanced distance vector protocol, to establish the opt
APA, Harvard, Vancouver, ISO, and other styles
43

Adjih, Cedric, Pascale Minet, Paul Muhlethaler,, Emmanuel Baccelli, and Thierry Plesse. "Quality of service support, security and OSPF interconnection in a MANET using OLSR." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 70–76. http://dx.doi.org/10.26636/jtit.2008.2.874.

Full text
Abstract:
The MANET networks are of prime interest for military networks. One of the proeminent routing protocols for MANET is OLSR, and indeed, OLSR has been used in many evaluations and experiments of MANETs. As OLSR is on its way to standardization, there are still a number of extensions that are useful and sometimes necessary for practical use of OLSR networks: such extensions are quality of service support, security, and OSPF interconnection. In this paper, we present the architecture, design, specifications and implementations that we made to integrate these features in a military test-bed. This t
APA, Harvard, Vancouver, ISO, and other styles
44

Kaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.

Full text
Abstract:
&lt;p&gt;This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimistic responses. In this study, the author proposes a novel security solution, the K-AOMDV (KNN- Ad Hoc On-Demand Multi-Path Routing protocol) that uses K-means clustering to prevent routing misbehaviour. The efficiency of the proposed K-AOMDV ro
APA, Harvard, Vancouver, ISO, and other styles
45

Omer, Khaled Ahmed Abood. "Impact of Jellyfish attack on routing protocols in TCP-based MANETs." University of Aden Journal of Natural and Applied Sciences 27, no. 1 (2023): 139–50. http://dx.doi.org/10.47372/uajnas.2023.n1.a09.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are self-organized infrastructure-less network of mobile wireless devices that could be deployed for communication. Due to the insecure wireless communication medium, multi-hop routing communication process, and dynamic behavior of the nodes in MANETs, routing protocols are vulnerable to various security attacks, such as Jellyfish attacks. A Jellyfish node targets TCP-based MANET and exploits its working mechanism to degrade the communication performance. This attack is hard to detect since it is a TCP protocol compliant methodology.In this paper, we evaluate th
APA, Harvard, Vancouver, ISO, and other styles
46

U., Kumaran, Ramachandran A., Jegan J., and K. Subramanian E. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 2 (2020): 949–56. https://doi.org/10.11591/ijeecs.v19.i2.pp949-956.

Full text
Abstract:
A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile adhoc network). Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in pac
APA, Harvard, Vancouver, ISO, and other styles
47

MOHANRAJ, E., K. DURAISWAMY, and K. PRASANTH. "SECURE QoS-BASED ROUTING USING HIERARCHICAL KEY RANKING MODEL IN MANET." Journal of Circuits, Systems and Computers 23, no. 09 (2014): 1450128. http://dx.doi.org/10.1142/s021812661450128x.

Full text
Abstract:
Quality of service (QoS) and security have been considered as two competent units to govern and administer end-to-end traffic across network. A mobile ad hoc network (MANET) is a type of wireless communication, every node can act as a router or base station. Secure QoS-based routing is an important problem in MANET. A hierarchical key ranking (HKR) model is presented here for secure group communications in MANETs. To enhance the security, one-to-one random mapping is performed using hash-based message authentication code (HashMAC). Due to the dynamic nature and topological changes in MANET, gr
APA, Harvard, Vancouver, ISO, and other styles
48

Ms. S. Kalaichelvi and Dr. K. R. Ananth. "A Comprehensive Review on the Impact of 5G Technologies on Mobile Ad-Hoc Networks." International Journal of Advanced Networking and Applications 16, no. 06 (2025): 6699–704. https://doi.org/10.35444/ijana.2025.16611.

Full text
Abstract:
This paper provides an extensive review of the role of 5G technologies in improving the performance of Mobile Ad-Hoc Networks(MANETs). The novelty of this study lies in the development of a Brown Boosted Expectation Maximization ensemble node clustering based energy-efficient and reliable data routing(BBEMENC) framework designed for 5th Generation(5G) enabled technologies on MANETs. By intelligently grouping nodes based on energy, trust, and signal metrics, and dynamically adjusting routing decisions, the model achieves substantial improvements in reliability and power efficiency. The study de
APA, Harvard, Vancouver, ISO, and other styles
49

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Full text
Abstract:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to ch
APA, Harvard, Vancouver, ISO, and other styles
50

Abdullah, Cheman Mohammed, and Ibrahim Mahmood Ibrahim. "A Survey on Binary Tree-Based Approaches for Data Transmission in Mobile Ad Hoc Networks." Asian Journal of Research in Computer Science 18, no. 3 (2025): 176–89. https://doi.org/10.9734/ajrcos/2025/v18i3585.

Full text
Abstract:
A thorough analysis of the current binary tree-based data distribution techniques in MANETs is the goal of this paper. MANET communication is highly dynamic, necessitating effective data transmission methods to improve network stability while also saving energy. Binary tree topologies work in tandem with routing and data aggregation to improve scalability, reduce latency, and increase energy economy. The paper investigates several binary tree algorithms that are appropriate for data and security structures, as well as routing techniques. Similar to previous MANETs, the network has three main i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!