[1] | Rutvij, H., Jhaveri, J., Sankita, P., and Jinwala, C. D., 2012, A Novel Solution for Gray hole Attack in AODV Based MANETs, In Proc. of Third International Conference on Advances in Communication, Network and Computing: Springer, 60-67. |
[2] | Boukerche, A., Turgut, B., Aydin, N., Ahmad, M., B¨ol¨oni, L. and Turgut, D., 2011, Routing protocols in Ad-hoc networks: a survey of Computer Networks, 55(13), 3032–3080. |
[3] | Jeenat, S. and Tasnuva, A., 2017, Securing AOMDV Protocol in Mobile Ad-hoc Network with Elliptic Curve Cryptography, International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 539-543. |
[4] | Sagar, R. D., Chatur, P. N. and Nikhil, B. B., 2016, AODV-Based Secure Routing Against Black hole Attack in MANET, IEEE International Conference on Recent Trends in Electronics Information Communication Technology, IEEE, 319-326. |
[5] | Soufiene, D., Farid, N. and Zonghua, Z., 2011, Mitigating Packet Dropping Problem in Mobile Ad-hoc Networks: Proposals and Challenges”, IEEE Communications Surveys & Tutorials, 13(4), 658 - 672. |
[6] | Abdelshafy, M. A. and King, P. J. B., 2016, Resisting Black hole Attacks on MANETs, 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 1048 - 1053. |
[7] | Sukanesh, R. Edsor, E. and Aarthylakshmi, M., 2016, Energy Efficient Malicious Node Detection Scheme in Wireless Networks, IEEE, 307-312. |
[8] | Sen, J., Koilakonda, S. and Ukil, A., 2011, A mechanism for detection of Co-operative Black hole attack in Mobile Ad-hoc networks, Second International Conference on Intelligent Systems, Modeling and Simulation, IEEE, 338-343. |
[9] | Mistry, N. Jinwala, D. C. and Zaveri, M., 2010, Improving AODV Protocol against Black hole Attacks, International Multiconference of Engineers and Computer Scientists, 2,(6), 1-6. |
[10] | Su, M-Y., Chiang, K-L., and Liao, W-C., 2010, Mitigation of Black-Hole Nodes in Mobile Ad-hoc Networks. International Symposium on Parallel and Distributed Processing with Applications, IEEE, DOI: 10.1109/ISPA.2010.74, 105-113. |
[11] | Gupta, S., Kar, S. and Dhararaja, S., 2011, BAAP: Black hole Attack Avoidance Protocol for Wireless Network”, International Conference on Computer & Communication Technology (ICCCT), IEEE, 1-6. |
[12] | Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K. and Banerjee, P. K., 2012, Two-level Secure Re-routing (TSR) in Mobile Ad-hoc Networks, IEEE, 119-122, DOI 10.1109/MNCApps.2012.31. |
[13] | Bhosle, A. A., Thosar, T. P. and Mehatre, S., 2012, Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET, International Journal of Computer Science, Engineering and Applications (IJCSEA), 2(1), 45-54. |
[14] | Thachil, F. and Shet, K. C., 2012, A trust based approach for AODV protocol to mitigate Black hole attack in MANET, International Conference on Computing Sciences, IEEE, 312-325. |
[15] | Bindra, G. S., Kapoor, A. Narang, A. and Agrawal, A., 2012, Detection and Removal of Co-operative Black hole and Gray hole Attacks in MANETs, IEEE, 3(11), 207-212. |
[16] | Ukey, A. S. A., Chawla, M. and Singh, V. P., 2013, I-2ACK: Preventing Routing Misbehavior in Mobile Ad-hoc Networks, International Journal of Computer Applications (0975 – 8887), 62(12), 345-353. |
[17] | Hiremani, V. A. and Jadhao, M. M., 2013, Eliminating Co-operative Black hole and Gray hole Attacks Using Modified EDRI Table in MANET, IEEE, 944-948, DOI: 10.1109/ICGCE.2013.6823571. |
[18] | Gaikwad, V. and Ragha, L., 2015, Security Agents for Detecting and Avoiding Cooperative Black hole Attacks in MANET, International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), IEEE, 306-311. |
[19] | Dumne, P. R. and Manjaramkar, A., 2016, Cooperative Bait Detection Scheme to prevent Collaborative Black hole or Gray hole Attacks by Malicious Nodes in MANETs, 5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), IEEE, 486-490. |
[20] | Emimajuliet, P. and Thirilogasundari, V., 2016, Defending Collaborative Attacks in MANETs Using Modified Cooperative Bait Detection Scheme, International Conference On Information Communication And Embedded System (ICICES), ISSN: 978-1-5090-2552-7, 819-826. |
[21] | Allard, G., Minet, P., Nguyen, D. Q. and Shresta, N., 2006, Evaluation of the energy consumption in MANET”, Adhoc-Now, Ottawa, Canada, 41-51. |
[22] | Bheemalingaiah, M. Naidu, M. M. and Rao, D.S., 2017, Energy aware Clustered based Multipath Routing in Mobile Ad-hoc Networks, International Journal of Communications, Network and System Sciences, 2(5), 1-24. |
[23] | Cao, L., Dahlberg, T. and Wang, Y., 2007, Performance evaluation of energy efficient Ad-hoc routing protocols, Proc. IPCCC, IEEE, 306-313. |
[24] | Rango, F., Guerriero, F., and Fazio, P., 2012, Link-Stability and Energy aware Routing Protocol in Distributed Wireless Networks. Journal of IEEE Transaction on Parallel and Distributed Systems, 347-362. |
[25] | Dorri, A., Kamel, S. R., and Kheyrkhah, E., 2015, Security Challenges in Mobile Ad-hoc Networks: A Survey, International Journal of Computer Science & Engineering Survey (IJCSES), 6(1), 15-29, DOI: 10.5121/ijcses.2015.6102. |
[26] | Guo, Z. and Malakooti, B., 2007, Energy Aware Proactive MANET Routing with Prediction on Energy Consumption, International Conference on Wireless Algorithms, Systems and Applications, IEEE, 287-292, DOI: 10.1109/WASA.2007.151. |
[27] | Shabbir, A., Khalid, F., Shaheed, S.M., Abbas, J. and Zia-Ul-Haq, M., 2015, Security: A Core Issue in Mobile Ad-hoc Networks. Journal of Computer and Communications, 3(3), 41-66, http://dx.doi.org/10.4236/jcc.2015.312005. |
[28] | Toh, C. K., 2001, Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad-hoc Networks, Communication Magazine, 10th International Conference on Practical Applications of Agents and Multi-Agent Systems, IEEE, 39(6), 174-186. |