A Better Approach towards Securing Mobile Adhoc Network
Author(s): Amit Chauhan | Arti Patle | Anita Mahajan

Intrusion Detection for Routing Attacks in Sensor Networks
Author(s): Chong Eik Loo | Mun Yong Ng | Christopher Leckie | Marimuthu Palaniswami

A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks
Author(s): M.Rajesh Babu, Dr.S.Selvan

Network Layer Attacks and Defense Mechanisms in MANETS- A Survey
Author(s): G.S. Mamatha | Dr. S.C. Sharma

A Literature Review of Security Attack in Mobile Ad-hoc Networks
Author(s): Priyanka Goyal | Sahil Batra | Ajit Singh

Security in Wireless Sensor Networks using Frequency Hopping
Author(s): Gaurav Sharma | Suman Bala | A. K. Verma | Tej Singh

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Author(s): SHEENU SHARMA | ROOPAM GUPTA

Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network
Author(s): Virendra Singh Kushwah | Gaurav Sharma

SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS
Author(s): A.Senthilkumar, | Dr.C.Chandrasekar

Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network
Author(s): Virendra Singh Kushwah & Gaurav Sharma

Multicast Routing Authentication System using Advanced Tesla
Author(s): V. Ganesh Babu | T. Senthil Kumar

A Secure Cluster-Based Multipath Routing Protocol for WMSNs
Author(s): Islam T. Almalkawi | Manel Guerrero Zapata | Jamal N. Al-Karaki

Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol
Author(s): Appavoo Paramasiven

A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
Author(s): Ms. Preetee K. Karmore, | Ms. Sonali T. Bodkhe

Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks
Author(s): P. Samundiswary | D.Sathian | P. Dananjayan

Secure Route Path Formation in Ad hoc On-demand Distance Vector Routing Protocol
Author(s): Muhammad Asfand-e-Yar | Muhammad Sher

Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network
Author(s): D. Kothandaraman | A. Amuthan | Dr. C. Chellappan | Dr. N. Sreenath

A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance
Author(s): Palvinder Singh Mann | Dinesh Kumar

A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS
Author(s): NALLAMALA SRI HARI | , DR. N. SRINIVAS RAO | DR. N. SATYANARAYANA

A New Approach to Prevent Black Hole Attack in AODV
Author(s): M. R. Khalili Shoja | Hasan Taheri | Shahin Vakilinia

A VIEW ON SECURE ROUTING IN ADHOC NETWORKS
Author(s): V. Venkata Ramana, | K.K.Basheer | P.Srinivasa Rao

Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks
Author(s): Ipsa De | Debdutta Barman Roy

Design and Implementation of EAR Algorithm for Detecting Routing Attacks in WSN
Author(s): Dimple Juneja | Sandhya Bansal | Gurpreet Kaur | Neha Arora

A System of Umpires for Security of Wireless Mobile Ad Hoc Network
Author(s): Ayyaswamy Kathirvel | Rengaramanujam Srinivasan

Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Author(s): Asad Amir Pirzada | Chris McDonald

Providing Routing Security Using ROS Protocol in MANET and Performance Comparison with AODV
Author(s): J. Martin Leo Manickam | S. Shanmugavel

The Impact of Window’s Size in DWSIGF Routing Protocol
Author(s): Z.M. Hanapi | M. Ismail | K. Jumari | M. Mahdavi | H. Mirvaziri

Secure Banking: Authenticating Peer-to-Peer Ad Hoc Interactions
Author(s): Khalid Mahmood | Imran Hameed | Khalid Rashid | Amir Qayyum

A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks
Author(s): A. Rajaram | S. Palaniswami

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
Author(s): Manoj Kumar Mishra | Binod Kumar Pattanayak | Alok Kumar Jagadev | Manojranjan Nayak

Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
Author(s): Eyad Taqieddin | S. Jagannathan | Ann Miller

A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks)
Author(s): Rakesh Kumar Jha | Suresh V. Limkar | Dr. Upena D. Dalal

Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment
Author(s): D.Jeyabharathi | D.Sasireka | D.Kesavaraja

A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection
Author(s): Yuxin Mao | Guiyi Wei

Performance Evaluation and Comparison of On Demand Multicast Reactive Routing Protocols under Black Hole Attack in MANET
Author(s): Mary Anita. E.A | V. Vasudevan

Potential Security Attacks on Wireless Networks and their Countermeasure
Author(s): Sreedhar. C | S. Madhusudhana Verma | N. Kasiviswanath

An Efficient Intrusion Detection System for Mobile Ad Hoc Networks
Author(s): B.V. Ram Naresh Yadav, B.Satyanarayana, O.B.V.Ramanaiah

A Mechanism for detecting Wormhole Attacks on Wireless Ad Hoc Network
Author(s): Ajit Singh, Kunwar Singh Vaisla

Performance Evaluation of MANET Routing Protocols Under Black Hole Attack
Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese

Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs
Author(s): K.Selvavinayaki | K.K.Shyam Shankar | Dr.E.Karthikeyan

MOSAODV: Solution to Secure AODV against Blackhole Attack
Author(s): N. H. Mistry, D. C. Jinwala and M. A. Zaveri

Design and Development of a Secured Routing Scheme for Mobile Adhoc Network
Author(s): Rakesh Kumar | Dr. Piush Verma | Dr. Yaduvir Singh

Analyzing security of Authenticated Routing Protocol (ARAN)
Author(s): Seema Mehla | Bhawna Gupta | Preeti Nagrath

CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Author(s): Dr.G.Padmavathi | Dr.P.Subashini | Ms.D.Devi Aruna

An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
Author(s): Pooja Sharma, | Pawan Bhadana

A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
Author(s): P. Kalyani | Dr.C.Chellappan

Prevention Of WormholeAttacks In Geographic Routing Protocol
Author(s): E.Poornima, | C.Shoba Bindhu

Multihost ad-hoc network with the clustered Security networks
Author(s): J.Manikandan, | S.Vijayaragavan.

Modified AODV Protocol against Blackhole Attacks in MANET
Author(s): K. Lakshmi | S.Manju Priya, | A.Jeevarathinam, | K.Rama, | K. Thilagam

Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2
Author(s): S.Vijayalakshmi, | S.Albert Rabara,

REMOVAL OF BLACK HOLE ATTACK IN AD HOC W IRELESS NETWORKS TO PROVIDE CONFIDENTIALITY SECURITY SERVICE
Author(s): A.VANI, | Dr.D.SREENIVASA RAO

A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks
Author(s): K.P.Manikandan | Dr.R.Satyaprasad | Dr.K.Rajasekhararao

SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network
Author(s): Rajender Nath | Pankaj Kumar Sehgal

A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network
Author(s): Anupriya Sharma | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta

Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks
Author(s): Raj Shree | Sanjay Kr. Dwivedi | Ravi Prakash Pandey

A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
Author(s): S.S. Chopade | N.N. Mhala

DPA to Rectify Transient Faulty Nodes in Effective Manner
Author(s): P. S. Balamurugan | K.Thanushkodi

Security Measures for Black Hole Attack in MANET: An Approach
Author(s): Rajib Das, | Dr. Bipul Syam Purkayastha, | Dr. Prodipto Das

Multicast Security Attacks and Its Counter Measures for Puma Protocol
Author(s): A. Amuthan | D. Nagamani Abirami

A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)
Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla

Implementation of Direct Processor Access in Transient Faulty Nodes
Author(s): P. S. Balamurugan | K.Thanushkodi

Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks
Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim

Path Selection Technique for Highly Transmission Ratio and Reliable Routing in Manet
Author(s): H. Sh. Jassim | S. Yussof | S.K. Tiong | K.H. Chong | S.P. Koh

Secure Mechanism for DYMO Routing Protocol by using Elliptic Curve Cryptography in Mobil Adhoc Networks
Author(s): Rayala Upendar Rao | Daranasi Veeraiah

An Efficient and Secured AOMDV Routing Protocol with Shamir's Secret Sharing Scheme
Author(s): Lt.Dr. S. Santhosh Baboo | C. Chandrasekar

A Survey on Black Hole Attacks on AODV Protocol in MANET
Author(s): Madhusudhananagakumar KS | G. Aghila

An Overview of Routing and Allocation of Equalized Wavelength or Power Distribution in Optical Network Security
Author(s): Suresh K.

Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee

IMPROVED BOOTSTRAP SECURITY WITH CONSISTENT CACHE IN MOBILE AD HOC NETWORK ROUTING
Author(s): P. Parameswari

Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network
Author(s): P.Karunakaran | C.Venkatesh

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Author(s): Sridhar Subramanian | Baskaran Ramachandran

A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing
Author(s): G.S. Mamatha

Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3
Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji

MODELLING OF A SECURE MECHANISM IN ROUTING PROTOCOL OF MANETS: APPLICATION OF THEORY OF GAMES
Author(s): Karim KONATE | Abdourahime GAYE

A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis
Author(s): Jonny Karlsson | Laurence S. Dooley | Göran Pulkkis

Authentication Based on Multilayer Clustering in Ad Hoc Networks
Author(s): Lee Keun-Ho | Han Sang-Bum | Suh Heyi-Sook | Lee Sang Keun | Hwang Chong-Sun

Attack Distribution Modeling and Its Applications in Sensor Network Security
Author(s): Chen Xiangqian | Makki Kia | Yen Kang | Pissinou Niki

Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks
Author(s): García-Otero Mariano | Zahariadis Theodore | Álvarez Federico | Leligou HelenC | Población-Hernández Adrián | Karkazis Panagiotis | Casajús-Quirós FranciscoJ

Cautious Rating for Trust-Enabled Routing in Wireless Sensor Networks
Author(s): Maarouf Ismat | Baroudi Uthman | Naseer AR

Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation
Author(s): R. Villalpando-Hernández | C. Vargas-Rosales | D. Muñoz-Rodríguez | J. R. Rodríguez

无线自组网中的信任建立机制相关问题研究 Researches on Trust Building Scheme Relevant Issues in Wireless Self-Organizing Network
Author(s): 王海涛

Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks
Author(s): Tejpal Singh | Vinod Kumar | Khushboo Saxena | Akanksha Saxena

An Enhanced Secured Dynamic Source Routing Protocol for MANETS
Author(s): G.Lavanya | A. Ebenezer Jeyakumar

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
Author(s): Preeti Sachan | Pabitra Mohan Khilar

A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
Author(s): Hossein Jadidoleslamy

Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack
Author(s): Vikram Singh | Vatika

A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL
Author(s): Mohammed ERRITALI | Oussama Mohamed Reda | Bouabid El Ouahidi

Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks
Author(s): Hamed Jalali Qomi | Mohammad Hesam Tadayon

Secure Routing Protocol for Multi-hop Wireless Networks
Author(s): Nagaraju Jampani | B.Premamayudu | A.Raghunath

Investigation of Blackhole Attack on AODV in MANET
Author(s): Anu Bala | Raj Kumari | Jagpreet Singh

Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET
Author(s): N. Bhalaji | A. Shanmugam

Resisting Malicious Attacks via Secure Network Coding and Incentive Compatible Mechanism in Multihop Wireless Networks
Author(s): Siguang Chen | Meng Wu | Weifeng Lu

MADSN: Mobile Agent Based Detection of Selfish Node in MANET
Author(s): Debdutta Barman Roy | Rituparna Chaki

AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes
Author(s): Mohammad Abu Obaida | Shahnewaz Ahmed Faisal | Md. Abu Horaira | Tanay Kumar Roy

An Approach to Secure Hierarchical Network using Joint Security and Routing Analysis
Author(s): Shivamalini L | Manjunath S S

DEPLOYMENT ISSUES OF SBGP, SOBGP AND pSBGP: A COMPARATIVE ANALYSIS
Author(s): Naasir Kamaal Khan | Gulabchand K. Gupta

Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network
Author(s): Himadri Nath Saha | Dr. Debika Bhattacharyya | Dr. P. K.Banerjee

TRIUMF-Trust Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack
Author(s): Ahmed M Abd El-Haleem | Ihab A Ali

SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK
Author(s): FARAZ AHSAN | ALI ZAHIR | SAJJAD MOHSIN | KHALID HUSSAIN

A Comparative Study of various Secure Routing Protocols based on AODV
Author(s): Dalip Kamboj | Pankaj Kumar Sehgal

A Behavioral Study of Wormhole Attack in Routing for MANET
Author(s): Amrit Suman | Praneet Saurabh | Bhupendra Verma

Minimized Overhead and Administrator based Secure Routing Protocol
Author(s): Himadri Nath Saha | Debika Bhattacharyya | P. K.Banerjee

Performance Analysis of Malicious Node Aware Routing for MANET using TwoHop Authentication
Author(s): Sanjeev Rana | Manpreet Singh

Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
Author(s): Hichem Sedjelmaci | Mohamed Feham

THE IMAGE LEVEL TAINTING: A NEW APPROACH FOR PREVENTING SQL INJECTION ATTACKS
Author(s): MR. P. NARESH KUMAR | MR .YUGANDHAR .G | MS. N. SOUJANYA | MR. K.NAGESWARA RAO

Encryption Scheme for Secure Routing in Ad Hoc Networks
Author(s): Sunil Taneja | Ashwani Kush | Sima Singh

A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)
Author(s): Shaik Sahil Babu | Arnab Raha | Mrinal Kanti Naskar

Classification and Review of Security Schemes in Mobile Computing
Author(s): Sathish Alampalayam Kumar

Research on the Active DDoS Filtering Algorithm Based on IP Flow
Author(s): Rui GUO | Hao YIN | Dongqi WANG | Bencheng ZHANG

Comparison of Secure OLSR Routing Protocol
Author(s): KUNWAR PAL, | Prof. SANJEEV SOFAT, | Prof. DIVYA BANSAL

A new approach for Evolution of end to end Security in Wireless Sensor Network
Author(s): S. Anjali Devi, | R. Venu Babu, | B. Srinivasa Rao

A Simple Hybrid Wormhole Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
Author(s): A.VANI, | D.Sreenivasa Rao

A Secure and Power Efficient Routing Scheme for Ad Hoc Networks
Author(s): Ashwani Kush | Divya Sharma | Sunil Taneja

Preventing AODV Routing Protocol from Black Hole Attack
Author(s): Lalit Himral, | Vishal Vig, | Nagesh Chand

Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks
Author(s): Shyamala Ramachandran | Valli Shanmugan

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm
Author(s): Kalyani Palanisamy | Chellappan

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network
Author(s): Edna E. Nallathambi | Radha Sankararajan | Vaithiyanathan Sundaram | Gracelin Sheeba

An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks
Author(s): S. Mangai | A. Tamilarasi

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks
Author(s): R. Murugan | A. Shanmugam
