Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of their constituent wireless nodes, which are expected to forward packets for other nodes in a benign manner. The Dynamic Source Routing (DSR) protocol is one such protocol that helps to create and maintain routes in an ad-hoc network in spite of the dynamic topology. The accurate execution of this protocol requires sustained benevolent behaviour by all participating nodes in the network. This is generally not possible to achieve and so a number of attacks may be launched against the DSR protocol, which lead to the malfunction of the network usually at a critical point...
Survivable routing protocols are able to provide service in the presence of attacks and failures. Th...
AbstractEffective mitigation against the security attacks in the mobile adhoc network is a challengi...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...
In this paper, a new approach based on the extent of friendship between the nodes is proposed which ...
An ad-hoc network is a set of mobile nodes in which it is required that each node performs cooperati...
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specif...
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense import...
Current ad-hoc network protocols are designed for host similar to those used in fixed networks. Thos...
Wireless ad hoc network is a dynamically organized network on emergency situations, in which a group...
There can be several sophisticated attacks motivated by selfish, resource saving nature of nodes in ...
In a large dynamic network, data can be copied anywhere to make it fault tolerant and easy accessed ...
Abstract- Securing the routing procedure is an important issue in wireless sensor network. Previousl...
Ad-hoc routing protocols are challenging to design and the need for security services further compli...
Abstract — In this paper, we propose an attack model against DSR ad hoc network routing protocol and...
The solutions may not always be sufficient, as ad hoc networks have their own vulnerabilities that c...
Survivable routing protocols are able to provide service in the presence of attacks and failures. Th...
AbstractEffective mitigation against the security attacks in the mobile adhoc network is a challengi...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...
In this paper, a new approach based on the extent of friendship between the nodes is proposed which ...
An ad-hoc network is a set of mobile nodes in which it is required that each node performs cooperati...
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specif...
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense import...
Current ad-hoc network protocols are designed for host similar to those used in fixed networks. Thos...
Wireless ad hoc network is a dynamically organized network on emergency situations, in which a group...
There can be several sophisticated attacks motivated by selfish, resource saving nature of nodes in ...
In a large dynamic network, data can be copied anywhere to make it fault tolerant and easy accessed ...
Abstract- Securing the routing procedure is an important issue in wireless sensor network. Previousl...
Ad-hoc routing protocols are challenging to design and the need for security services further compli...
Abstract — In this paper, we propose an attack model against DSR ad hoc network routing protocol and...
The solutions may not always be sufficient, as ad hoc networks have their own vulnerabilities that c...
Survivable routing protocols are able to provide service in the presence of attacks and failures. Th...
AbstractEffective mitigation against the security attacks in the mobile adhoc network is a challengi...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...