Open Access
Issue
E3S Web Conf.
Volume 412, 2023
International Conference on Innovation in Modern Applied Science, Environment, Energy and Earth Studies (ICIES’11 2023)
Article Number 01094
Number of page(s) 11
DOI https://doi.org/10.1051/e3sconf/202341201094
Published online 17 August 2023
  1. N. Goyal, A. J. I. J. o. C. T. Gaba, and Applications, “A new approach of location aided routing protocol using minimum bandwidth in mobile ad-hoc network,” vol. 4, no. 4, p. 653, 2013. [Google Scholar]
  2. A. Vinay, K. Hansitha, N. Jayanth, and S. P. Sreeja, “PREVENTION OF BLACKHOLE ATTACK IN MANET’S.” [Google Scholar]
  3. A. M. Eltahlawy, H. K. Aslan, E. G. Abdallah, M. S. Elsayed, A. D. Jurcut, and M. A. J. E. Azer, “A Survey on Parameters Affecting MANET Performance,” vol. 12, no. 9, p. 1956, 2023. [Google Scholar]
  4. R. Gotti, A. Polagani, G. S. L. Posina, S. Veerapaneni, and T. Prasanth, “Detection and Analysis of Single Blackhole Node with TCP Connection in MANETs using Machine Learning Algorithms,” in 2023 International Conference on Inventive Computation Technologies (ICICT), 2023, pp. 1704-1710: IEEE [Google Scholar]
  5. S. Shafi, S. Mounika, and S. J. P. C. S. Velliangiri, “Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET,” vol. 218, pp. 2309-2318, 2023. [Google Scholar]
  6. S. Lu, L. Li, K.-Y. Lam, and L. Jia, “SAODV: a MANET routing protocol that can withstand black hole attack,” in 2009 international conference on computational intelligence and security, 2009, vol. 2, pp. 421-425: IEEE [Google Scholar]
  7. P. Kamboj, N. J. I. J. O. E. R. I. M. Goyal, and Technology, “Survey of various keys management techniques in MANET,” vol. 4, no. 6, 2015. [Google Scholar]
  8. D. G. Fragkoulis, N. D. Kouvakas, F. N. Koumboulis, N. I. J. A.-I. J. o. E. Georgiou, and Communications, “Modelling and Modular Supervisory Control for the AODV Routing Protocol,” p. 154761, 2023. [Google Scholar]
  9. B. Patel and R. Patel, “Study of Denial of Service Attack On AODV Routing Protocol in Mobile Ad-hoc Network,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), 2023, pp. 66-77: IEEE [Google Scholar]
  10. N. Shanthi, L. Ganesan, K. J. J. O. T. Ramar, and A. I. Technology, “Study of different attacks on multicast mobile ad hoc network,” vol. 6, 2009. [Google Scholar]
  11. E. M. Royer and C.-K. J. I. p. c. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” vol. 6, no. 2, pp. 46-55, 1999. [Google Scholar]
  12. D. B. Roy, R. Chaki, and N. J. a. p. a. Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks,” 2010. [Google Scholar]
  13. S. Vijayalakshmi, S. Bose, G. Logeswari, T. J. C. S. Anitha, and Applications, “Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory,” vol. 1, p. 100011, 2023. [Google Scholar]
  14. T. Bhatia and A. J. I. J. Verma, “Security issues in MANET: a survey on attacks and defense mechanisms,” vol. 3, no. 6, 2013. [Google Scholar]
  15. S. Banerjee, “Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks,” in proceedings of the world congress on engineering and computer science, 2008, vol. 2008 [Google Scholar]
  16. F. Samad, Q. Abu Ahmed, A. Shaikh, and A. Aziz, “Jam: mitigating jellyfish attacks in wireless ad hoc networks,” in Emerging Trends and Applications in Information Communication Technologies: Second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings 2, 2012, pp. 432-444: Springer [Google Scholar]
  17. T. S. Vamsi, E. P. Kumar, T. J. I. J. o. E. R. Sruthi, and Applications, “Performance Analysis of Aodv Routing Protocol in Manet under Blackhole Attack,” vol. 9, no. 5, pp. 58-63, 2019. [Google Scholar]
  18. K. Sivakumar, D. G. J. I. J. o. C. S. Selvaraj, and M. Research, “Overview of various attacks in manet and countermeasures for attacks,” vol. 2, no. 1, 2013. [Google Scholar]
  19. A. Perrig and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” in IEEE INFOCOM, 2003, pp. 1976-1986 [Google Scholar]
  20. Y.-C. Hu, D. B. Johnson, and A. J. A. h. n. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” vol. 1, no. 1, pp. 175-192, 2003. [Google Scholar]
  21. K. Saravanan, S. Anthoniraj, S. Kumarganesh, T. S. Kumar, and K. M. Sagayam, “WMLP: Web-based Multi-Layer protocols for Emergency Data Transmission in Mobile Ad Hoc Network,” in E3S Web of Conferences, 2021, vol. 297, p. 01065: EDP Sciences [CrossRef] [EDP Sciences] [Google Scholar]
  22. M. A. Hidayat, A. Sofwan, and A. B. Prasetijo, “Gaussian Prediction Method to Enhance Energy Efficient in Energy Aware AODV,” in E3S Web of Conferences, 2019, vol. 125, p. 23005: EDP Sciences [CrossRef] [EDP Sciences] [Google Scholar]
  23. I. P. Tummala and S. B. Ramya, “Dynamic Address Routing for Adhoc & Mesh Networks using MANETs,” in E3S Web of Conferences, 2021, vol. 309, p. 01188: EDP Sciences [CrossRef] [EDP Sciences] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.