Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Security in MANETs"

ADD TO MY LIST
 
Trust-based Routing Security in MANETS

Author(s): R.Balakrishna, | U.Rajeswar Rao | G.A.Ramachandra | M.S.Bhagyashekar
Performance Comparison of TCP Variants in Mobile Ad- Hoc Networks

Author(s): Mandakini Tayade | Sanjeev Sharma
Clustering in Mobile Ad hoc Networks: A Review

Author(s): Meenu Chawla | Jyoti Singhai | J L Rana
A Trust Based Security Scheme for RREQ Flooding Attack in MANET

Author(s): Shishir K. Shandilya | Sunita Sahu
A Council-based Distributed Key Management Scheme for MANETs

Author(s): Abdelmajid HAJAMI | Mohammed ELKOUTBI
Network Layer Attacks and Defense Mechanisms in MANETS- A Survey

Author(s): G.S. Mamatha | Dr. S.C. Sharma
Intrusion Detection Techniques for Detecting Misbehaving Nodes

Author(s): Farzaneh Pakzad | Marjan Kuchaki Rafsanjani
LOSAD-A Location Service Based on MANET for Mobile Police Officers

Author(s): G.CHARLES BABU, | PVRD PRASADA RAO | J SRINIVAS | DR.A.GOVARDHAN, | DR.A.YESU BABU
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures

Author(s): Ms. Preetee K. Karmore, | Ms. Sonali T. Bodkhe
A New Region based Group Key Management Protocol for MANETs

Author(s): N. Vimala | R. Balasubramanian
New trust based security method for mobile ad-hoc networks

Author(s): Renu Mishra, Inderpreet Kaur & Sanjeev sharma
Secure Source Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
A Specific Replication Strategy of Middleware Resources in Dense MANETs

Author(s): Anil Kumar, Parveen Gupta, Pankaj Verma & Vijay Lamba
Design of Scheduling Algorithm for Ad hoc Networks with Capability of Differential Service

Author(s): Seyed Hossein Hosseini Nazhad Ghazani, Jalil Jabari Lotf ,Mahsa Khayyatzadeh, R.M. Alguliev
Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

Author(s): Monika | Mukesh Kumar | Rahul Rishi
Routing Fairness in Mobile Ad-Hoc Networks: Analysis and Enhancement

Author(s): M. Shiraz Ahmed | Haji Moinuddin | Fazeelatunnisa
Trust Based Security Routing in Mobile Adhoc Networks

Author(s): K.Seshadri Ramana, | Dr. A.A. Chari | Prof. N.Kasiviswanth
A Survey of Mobile Ad Hoc Network Attacks

Author(s): PRADIP M. JAWANDHIYA, | MANGESH M. GHONGE, | DR. M.S.ALI | PROF. J.S. DESHPANDE
A Survey on Trust Management for Mobile Ad Hoc Networks

Author(s): K.Seshadri Ramana | A.A. Chari | N.Kasiviswanth
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

Author(s): Emmanouil A. Panaousis | Tipu A. Ramrekha | Grant P. Millar | Christos Politis
A survey of DDoS Service Attacks in Collaborative Intrusion Detection System

Author(s): J.Manikandan | S.Vijayaragavan | R.Madhavi
Efficient Certification Path Discovery for MANET

Author(s): Georgios Kambourakis | Elisavet Konstantinou | Anastasia Douma | Marios Anagnostopoulos | Georgios Fotiadis
Malicious Node Detection System for Mobile Ad hoc Networks

Author(s): Rajaram.A | Dr. S. Palaniswami
ISOR: Intelligent Secure On-Demand Routing Protocol

Author(s): Moitreyee Dasgupta | Gaurav Sandhu | Usha Banerjee
Secured and QoS based multicast routing in MANETs

Author(s): Maya Mohan | S.Mary Saira Bhanu
An Efficient Trust Establishment Framework for MANETs

Author(s): Mohammad Karami | Mohammad Fathian
Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms

Author(s): B. Ananda Krishna | S. Radha | K. Chenna Keshava Reddy
Group Key Management in MANETs

Author(s): Mohamed Salah Bouassida | Isabelle Chrisment | Olivier Festor
Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Author(s): Manoj Kumar Mishra | Binod Kumar Pattanayak | Alok Kumar Jagadev | Manojranjan Nayak
A Review of Routing Protocols of Heterogeneous Networks

Author(s): Samad Baseer | Muhammad.Ibrahim Channa | Kazi Ahmed
Quality of Service Enhanced Routing in Mobile Ad Hoc Networks

Author(s): D.S. Thenmozhi | R. Lakshmipathi
Convergence Time Evaluation of AODV and AODV+G in MANETs

Author(s): Annapurna P Patil | Harish. R
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks

Author(s): Emmanouil A. Panaousis | George Drew | Grant P. Millar | Tipu A. Ramrekha | Christos Politis
An Efficient Intrusion Detection System for Mobile Ad Hoc Networks

Author(s): B.V. Ram Naresh Yadav, B.Satyanarayana, O.B.V.Ramanaiah
Performance Evaluation of MANET Routing Protocols Under Black Hole Attack

Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
High Performance Certificate Authority Scheme in Manet

Author(s): A.Rajaram and Dr.S.Palaniswami
Resource Allocation in Wireless Networks

Author(s): Manish Varshney, Dr Yashpal Singh, Vidushi Gupta
Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs

Author(s): K.Selvavinayaki | K.K.Shyam Shankar | Dr.E.Karthikeyan
Intrusion Response System in AODV for MANET

Author(s): Manoj Kumar | Akshay Girdhar
MOSAODV: Solution to Secure AODV against Blackhole Attack

Author(s): N. H. Mistry, D. C. Jinwala and M. A. Zaveri
SECURITY MECHANISM FOR MANETS

Author(s): YASIR ABDELGADIR MOHAMED | AZWEEN B. ABDULLAH
Performance Evaluation of Mobility Speed over MANET Routing Protocols

Author(s): Yasser Kamal Hassan | Mohamed Hashim Abd El-Aziz | Ahmed Safwat Abd El-Radi
Detection of Routing Misbehavior in MANETs with 2ACK scheme

Author(s): Chinmaya Kumar Nayak | G K Abani Kumar Dash | Kharabela parida | Satyabrata Das
THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET

Author(s): A.Rajaram, | Dr.S.Palaniswami
A QoS Based MAC Protocol For Wireless Ad-hoc Network

Author(s): Vandana khare | D. SrinivasRao | Y. Madhavee Latha
ESAC Based Channel Aware Routing Using Route Handoff

Author(s): Dr. V.Kavitha, | S.Balaji
A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

Author(s): K.P.Manikandan | Dr.R.Satyaprasad | Dr.K.Rajasekhararao
Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks

Author(s): Raj Shree | Sanjay Kr. Dwivedi | Ravi Prakash Pandey
Secure Measures for the Vulnerabilities in MAODV

Author(s): P. Bharathi | A. Amuthan
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
A Dynamic Approach for Anomaly Detection in AODV

Author(s): P.VIGNESHWARAN | R. DHANASEKARAN
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Author(s): Sridhar Subramanian | Baskaran Ramachandran
Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Bandwidth Estimation For Mobile Ad hoc Network (MANET)

Author(s): Rabia Ali | Dr. Fareeha Zafar
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

Author(s): Novarun Deb | Manali Chakraborty | Nabendu Chaki
QoS enabled Cluster Based Routing Protocols in MANETs

Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs

Author(s): Jin Xin | Zhang Yaoxue | Pan Yi | Zhou Yuezhi
HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

Author(s): Campos Javier | Calafate CarlosT | Nácher Marga | Manzoni Pietro | Cano Juan-Carlos
A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Author(s): Masdari Mohammad | Jabbehdari Sam | Ahmadi Mohammad | Hashemi Seyyed | Bagherzadeh Jamshid | Khadem-Zadeh Ahmad
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Author(s): Askoxylakis IoannisG | Tryfonas Theo | May John | Siris Vasilios | Traganitis Apostolos
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

Author(s): Conti Mauro | Di Pietro Roberto | Mancini LuigiV | Mei Alessandro
Efficient Certification Path Discovery for MANET

Author(s): Kambourakis Georgios | Konstantinou Elisavet | Douma Anastasia | Anagnostopoulos Marios | Fotiadis Georgios
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
An Enhanced Secured Dynamic Source Routing Protocol for MANETS

Author(s): G.Lavanya | A. Ebenezer Jeyakumar
MADSN: Mobile Agent Based Detection of Selfish Node in MANET

Author(s): Debdutta Barman Roy | Rituparna Chaki
A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

Author(s): Atul Patel | Ruchi Kansara | Dr. Paresh Virparia
Comparison study on AAMRP and IODMRP in MANETS

Author(s): Tanvir Kahlon | Sukesha Sharma
Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs

Author(s): D.Srinivasa Rao | T. Pandurang Vital | T.V.S. Sriram
SECURE AND ROBUST IPV6 AUTOCONFIGURATION PROTOCOL FOR MOBILE ADHOC NETWORKS UNDER STRONG ADVERSARIAL MODEL

Author(s): Zohra Slimane | Abdelhafid Abdelmalek | Mohamed Feham | Abdelmalik Taleb-Ahmed
Guard against cooperative black hole attack in Mobile Ad-Hoc Network

Author(s): Harsh Pratap Singh | Sanjeev Sharma
Sec.AODV for MANETs using MD5 with Cryptography

Author(s): Suketu D. Nayak | Ravindra K. Gupta
Security Enhancement in MANET with 4G

Author(s): Deepak Chayal | Dr. Vijay Singh Rathore
Providing of Secure Routing against Attacks in MANETs

Author(s): A.Vani | D.Sreenivasa Rao
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

Author(s): Edna E. Nallathambi | Radha Sankararajan | Vaithiyanathan Sundaram | Gracelin Sheeba
Why do you need a reservation system?      Affiliate Program