Author:
Chawla Kitti,Gill Jasmeen,Singh Mohanjeet
Reference29 articles.
1. Ghorale MMG, Bang AO (2015) Wireless ad-hoc networks: types, applications, security goals. In: National conference convergence, vol 2015, pp. 28.
2. Hadi TH (2017) MANET and WSN: what makes them different. Int J Comput Netw Wirel Commun (IJCNWC) 7(6):23–26
3. Hinds A, Ngulube M, Zhu S, Al-Aqrabi H (2013) A review of routing protocols for mobile ad-hoc networks (manet). Int J Inf Educ Technol 3(1):1
4. Dhaka A, Nandal A, Dhaka RS (2015) Gray and black hole attack identification using control packets in MANETs. Procedia Comput Sci 54:83–91
5. Ali Zardari Z, He J, Zhu N, Mohammadani KH, Pathan MS, Hussain MI, Memon MQ (2019) A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3):61