Corpus ID: 45631775

Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm

@article{Kavitha2018DetectionOI,
  title={Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm},
  author={P. Kavitha and R. Mukesh},
  journal={Int. J. Netw. Secur.},
  year={2018},
  volume={20},
  pages={381-389}
}
Secure routing among multiple routers become a complex process in Mobile Ad-hoc NETworks (MANETs) due to the presence of adversary nodes. [...] Key Method To provide the personal key with less key storage overhead, the clusters network based on the flexible weight clustering algorithm.Expand
A Survey on Security in VANETs
  • Pavithra T, B. Nagabhushana
  • Computer Science
  • 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA)
  • 2020

References

SHOWING 1-10 OF 29 REFERENCES
Securing AODV routing protocol in MANET using NMAC with HBKS technique
Preventing impersonation attacks in MANET with multi-factor authentication
Secure data transfer in MANET using symmetric and asymmetric cryptography
  • Raj Kamal Kapur, S. Khatri
  • Computer Science
  • 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
  • 2015
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
A survey of routing attacks in mobile ad hoc networks
To detect malicious nodes in the Mobile Ad-hoc Networks using soft computing technique
  • P. Kavitha, R. Mukesh
  • Computer Science
  • 2015 2nd International Conference on Electronics and Communication Systems (ICECS)
  • 2015
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges
A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks
CBSRP: Cluster based secure routing protocol
...
1
2
3
...