2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015
DOI: 10.1109/cscesm.2015.7331887
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of security attacks and improvements of routing protocols in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Researchers are drawn to MANET because of its unique qualities, but the technology is beset by drawbacks and obstacles that restrict its overall performance and security. Figure 2 shows an example of MANET in action [20] [21]. Fig.…”
Section: Figure 1 Randomness Of the Nodes' Movementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers are drawn to MANET because of its unique qualities, but the technology is beset by drawbacks and obstacles that restrict its overall performance and security. Figure 2 shows an example of MANET in action [20] [21]. Fig.…”
Section: Figure 1 Randomness Of the Nodes' Movementsmentioning
confidence: 99%
“…Nevertheless, using digital signatures and exchanging encounter information among nodes results in a large network overhead and power expenditure [34] [35]. The authors Tsiota et al, in [20] they proposed that several techniques have been implemented as a corrective to a flooding assault security worthy based scheme, FAP scheme, and effective filtering approach. Each method has a different strategy for dealing with opponents [36] [37].…”
Section: Related Workmentioning
confidence: 99%