Acknowledgement
This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
References
- A. S. V. Rao and C. Siddhartha, "Two-Step Verification Technique for Isolation of Black hole Attack in MANETs," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, pp. 491-495, 2019. https://doi.org/10.35940/ijrte.D7107.118419
- A. Vijaya Krishna and S. Naseera, "A comprehensive and proportional analysis of course-plotting algorithms in MANETs," ARPN Journal of Engineering and Applied Sciences, vol. 13, pp. 3770-3781, 2018.
- L. Raja and S. S. Baboo, "An overview of MANET: Applications, attacks and challenges," International Journal of Computer Science and Mobile Computing, vol. 3, pp. 408-417, 2014.
- I. Sumra, P. Sellappan, A. Abdullah, and A. Ali, "Security issues and challenges in Manet-Vanet-Fanet: A Survey," EAI Endorsed Transactions on Energy Web, vol. 5, pp. 1-6, 2018. https://doi.org/10.4108/eai.10-4-2018.155884
- M. Tariq, H. Fareed, and R. Alsaqour, "Performance analysis of reactive routing protocols in mobile ad hoc network using NS2," ARPN Journal of Engineering and Applied Sciences, vol. 11, pp. 4267-4271, 2016.
- H. Alani and R. Alsaqour, "Routing discovery scheme for high mobility in MANET," ARPN Journal of Engineering and Applied Sciences, vol. 12, pp. 536-543, 2017.
- A. Al Sharah, M. Alhaj, and F. Al Naimat, "Trade-off between Energy Consumption and Transmission Rate in Mobile Ad-Hoc Network," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, pp. 245-252, 2121. https://doi.org/10.14569/IJACSA.2021.0120330
- B. U. I. Khan, R. F. Olanrewaju, F. Anwar, A. R. Najeeb, and M. Yaacob, "A survey on MANETs: architecture, evolution, applications, security issues and solutions," Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, pp. 832-842, 2018. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842
- E. M. Royer and C. E. Perkins, "Ad-hoc on-demand distance vector routing," in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, pp. 90-100, 1999.
- M. T. Sultan and S. M. Zaki, "Evaluation of energy consumption of reactive and proactive routing protocols in MANET," arXiv preprint arXiv:1706.06322, 2017.
- S. M. Alkahtani and F. Alturki, "Performance Evaluation of Different Mobile Ad-hoc Network Routing Protocols in Difficult Situations," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, pp. 158-167, 2021. https://doi.org/10.14569/IJACSA.2021.0120119
- M. S. Abdelhaq, R. A. Alsaqour, M. Al-Hubaishi, T. Alahdal, and M. Uddin, "The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing," IJ Network Security, vol. 16, pp. 376-381, 2014.
- R. van Rijswijk-Deij, A. Sperotto, and A. Pras, "DNSSEC and its potential for DDoS attacks: a comprehensive measurement study," in Proceedings of the 2014 Conference on Internet Measurement Conference, 2014, pp. 449-460.
- A. Dhanapal and P. Nithyanandam, "The Slow HTTP DDoS Attacks: Detection, Mitigation and Prevention in the Cloud Environment," Scalable Computing: Practice and Experience, vol. 20, pp. 669-685, 2019. https://doi.org/10.12694/scpe.v20i4.1569
- Y. Bai, Y. Mai, and N. Wang, "Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs," in 2017 Wireless Telecommunications Symposium (WTS), Chicago, IL, 2017, pp. 1-5.
- T. Issariyakul and E. Hossain, "Introduction to network simulator 2 (NS2)," in Introduction to network simulator NS2, 1st ed: Springer, Boston, MA, 2009, pp. 1-18.
- S. Garg, "Performance analysis of AODV and TORA under DDoS attack in MANETs," IJSR International journal of science and research, vol. 3, pp. 297-304, 2014.
- R. Singh and T. P. Sharma, "Present Status of Distributed Denial of service (DDoS) attacks in internet world," International Journal of Mathematical, Engineering and Management Sciences, vol. 4, pp. 1008-1017, 2019.
- P. Oberoi, S. Mittal, and R. K. Gujral, "ADRCN: A framework to detect and mitigate malicious insider attacks in cloud-based environment on IaaS," International Journal of Mathematical, Engineering and Management Sciences, vol. 4, pp. 654-670, 2019. https://doi.org/10.33889//IJMEMS.2019.4.3-052
- A. A. Ajibesin, M. M. Kah, A. T. Ishaq, and C. A. Ajibesin, "Performance Analysis of Topology and Destination Based Routing Protocols in Mobile Ad-Hoc Network Using NS2," in 2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT), 2019, pp. 1-6.
- A. Alsumayt, J. Haggerty, and A. Lotfi, "Evaluation of detection method to mitigate DoS attacks in MANETs," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-5.
- A. Sahoo, A. Shreya, C. S. Dash, I. Priyadarshini, S. Sobhanayak, S. S. Panda, et al., "Performance Evaluation of AODV, DSDV and DSR Routing Protocol For Wireless Adhoc Network," in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2018, pp. 348-351.
- D. Gao, H. Lin, Y. Liu, and A. Jiang, "Minimizing End-to-End Delay Routing Protocol for Rechargeable Wireless Sensor Networks," Adhoc & Sensor Wireless Networks, vol. 34, pp. 77-98, 2016.
- N. Muthukumaran, "Analyzing throughput of MANET with reduced packet loss," Wireless Personal Communications, vol. 97, pp. 565-578, 2017. https://doi.org/10.1007/s11277-017-4520-9