Author:
Sairam Vamsi T.,Sudheer Kumar T.,Vamsi Krishna M.
Reference11 articles.
1. Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International conference on electrical and information technologies (ICEIT), tangiers, pp 536–542
2. Ramya P, SairamVamsi T (2018) Impact analysis of blackhole, flooding, and grayhole attacks and security enhancements in mobile ad hoc networks using SHA3 algorithm. In: Anguera J, Satapathy S, Bhateja V, Sunitha K (eds) Microelectronics, electromagnetics and telecommunications. Lecture notes in electrical engineering, vol 471. Springer, Singapore
3. Fahmy AHH, Bahaa-Eldin A (2015) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21(2):467-483
4. Mane Dadaso, Gothwal Deepali (2013) Improved security for attacks in MANET using AODV. Int J Innov Eng Technol (IJIET) 2(3):37–44
5. Mahmoud MMEA, Shen XS (2014) Secure routing protocols. Security for multi-hop wireless networks. Springer, New York, pp 63–93
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献