References
- G. Jayakumar and G. Gopinath, "Ad Hoc Wireless Networks Routing Protocols - A Review," Journal of Computer Science, vol. 3, no. 8. pp. 574-582, 2007. https://doi.org/10.3844/jcssp.2007.574.582
- A. Hinds, M. Ngulube, S. Zhu, and H. Al-Aqrabi, "A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)," Int. J. Inf. Educ. Technol., vol. 3, no. 1, pp. 1-5, 2013. https://doi.org/10.7763/IJIET.2013.V3.223
- A. Gupta, "Review of Various Routing Protocols for MANETs," Int. J. Inf. Electron. Eng., vol. 1, no. 3, 2011.
- S. Prakash, R. Kumar, B. Nayak, and M. K. Yadav, "A Survey on Reactive Protocols for Mobile Ad Hoc Networks ( MANET )," Proc. 5th Natl. Conf. INDIACom-2011, 2011.
- S. Kumar, M. Goyal, D. Goyal, and R. C. Poonia, "Routing protocols and security issues in MANET," 2017 Int. Conf. Infocom Technol. Unmanned Syst. Trends Futur. Dir. ICTUS 2017, vol. 2018-Janua, no. 4, pp. 818-824, 2018
- A. Bhattacharyya, A. Banerjee, D. Bose, H. N. Saha, and D. Bhattacharjee, "Different types of attacks in Mobile ADHOC Network: prevention and mitigation techniques," Dep. Comput. Sci. Eng. Inst. Eng. Manag. Saltlake, vol. 1, no. 1, 2011.
- P. Manickam and T. G. Baskar, "P ERFORMANCE C OMPARISONS OF R OUTING P ROTOCOLS IN M OBILE A D H OC N ETWORKS," vol. 3, no. 1, pp. 98-106, 2011. https://doi.org/10.5121/ijwmn.2011.3109
- M. K. Gulati and K. Kumar, "Performance Comparison of Mobile Ad Hoc Network Routing Protocols," Int. J. Comput. Networks Commun., vol. 6, no. 2, pp. 127-142, 2014. https://doi.org/10.5121/ijcnc.2014.6211
- H. Narra, Y. Cheng, E. Cetinkaya, J. Rohrer, and J. Sterbenz, "Destination-Sequenced Distance Vector (DSDV) Routing Protocol Implementation in ns-3," no. March, 2012.
- K. E. Kannammal and T. Purusothaman, "An efficient routing protocol for wireless sensor networks," Life Sci. J., vol. 10, no. 2, pp. 1650-1653, 2013.
- C. Cheng, R. Riley, S. P. R. Kumar, and J. J. Garcia-Luna-Aceves, "Loop-free extended Bellman-Ford routing protocol without bouncing effect," pp. 224-236, 1989.
- X. Hong, K. Xu, and M. Gerla, "Scalable routing protocols for mobile ad hoc networks," IEEE Netw., vol. 16, no. 4, pp. 11-21, 2002. https://doi.org/10.1109/MNET.2002.1020231
- R. V Boppana and A. Mathur, "Analysis of the Dynamic Source Routing Protocol for Ad Hoc Networks," Computer (Long. Beach. Calif)., no. December, pp. 1-8, 2005.
- N. Beijar, "Zone Routing Protocol ( ZRP )," Netw. Lab. Helsinki Univ. Technol. Finl., pp. 1-12, 2002.
- S. Barakovi, S. Kasapovi, and J. Barakovi, "Comparison of MANET Routing Protocols in Different Traffic and Mobility Models," Telfor J., vol. 2, no. 1, pp. 8-12, 2010.
- S. Gandhi, N. Chaubey, N. Tada, and S. Trivedi, "Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET," 2012 Int. Conf. Comput. Commun. Informatics, ICCCI 2012, pp. 0-4, 2012.
- A. U. Salleh, Z. Ishak, N. M. Din, and M. Z. Jamaludin, "Trace analyzer for NS-2," SCOReD 2006 - Proc. 2006 4th Student Conf. Res. Dev. "Towards Enhancing Res. Excell. Reg., no. SCOReD, pp. 29-32, 2006.
- K. Rampurkar, N. Lavande, S. Shilgire, and S. N. Mane, "Study of Routing Overhead and its Protocols," Int. J. Adv. Eng. Manag., vol. 2, no. 2, p. 52, 2017.
- D. Kaur and N. Kumar, "Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks," Int. J. Comput. Netw. Inf. Secur., vol. 5, no. 3, pp. 39-46, 2012. https://doi.org/10.5815/ijcnis.2013.03.05
- S. N. Mohammad, "Security Attacks in MANETS (Survey Prospective)," Int. J. Eng. Adv. Technol., no. 3, pp. 2249-8958, 2017.
- T. P. Venkatesan, "Security Attacks and Detection Techniques for MANET," no. April 2014, 2017.
- P. Panda, K. K. Gadnayak, and N. Panda, "SURVEY ARTICLE MANET Attacks and their Countermeasures : A Survey," vol. 2, pp. 319-330, 2013.
- A. Aashima and V. K. Arora, "Detection and Prevention of Wormhole Attack in MANET Using DSR Protocol," IOSR J. Comput. Eng., vol. 16, no. 6, pp. 44-47, 2014. https://doi.org/10.9790/0661-16684447
- R. Sharma, "Gray-hole Attack in Mobile Ad-hoc Networks : A Survey," vol. 7, no. 3, pp. 1457-1460, 2016.
- J. Sen, M. G. Chandra, S. G. Harihara, H. Reddy, and P. Balamuralidhar, "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks," pp. 0-4, 2007.
- M. G. Pineda, J. Lloret, S. Papavassiliou, S. Ruehrup, and C. B. Westphall, "Ad-hoc networks and wireless: ADHOCNOW 2014 International workshops ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN Benidorm, Spain, June 22-27, 2014 revised selected papers," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8629, no. June, pp. 5-6, 2015.
- A. Rana, V. Rana, and S. Gupta, "EMAODV : TECHNIQUE TO PREVENT COLLABORATIVE ATTACKS IN MANETs," vol. 70, pp. 137-145, 2015. https://doi.org/10.1016/j.procs.2015.10.060
- N. Gupta and S. N. Singh, "WORMHOLE," pp. 3-6, 2016.
- S. U. Patil, "Gray hole attack detection in MANETs," 2017 2nd Int. Conf. Converg. Technol. I2CT 2017, vol. 2017-Janua, pp. 20-26, 2017.
- S. Dhende, S. Musale, S. Shirbahadurkar, and A. Najan, "SAODV: Black hole and gray hole attack detection protocol in MANETs," Proc. 2017 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2017, vol. 2018-Janua, no. March, pp. 2391-2394, 2018.