[1]
Aamir M, Zaidi MA. A buffer management scheme for packet queues in MANET. Sci Technol 2013; 18(6): 543-53.
[2]
Sreedevi M, Narasimha C, Seshadri R. Efficient data delivery over MANET’s through secured EGMP. Adv Asian Social Sci 2012; 2(3): 512-6.
[3]
Lou W, Liu W, Zhang Y, Fang Y. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wireless Netw 2009; 15: 279-94.
[4]
Lee HO, Nam JS, Jeon JH. Cluster and location based overlay multicast in mobile ad hoc and sensor networks. Int J Distr Sensor Network 2014; 6: 1-10.
[5]
Bohra S, Choudhary N. An efficient misbehaving node detection algorithm in MANET. Global J Comp Sci Technol 2015; 15(2): 17-23.
[6]
Kumar R, Sharma SK. A relative speed based route selection in AODV to reduce packet drop in MANET. Int J Em Technol Adv Eng 2014; 4(5): 576-9.
[7]
Manish VM, Vaijayanthimala J. Diminution of packet drop by efficient selection of network route in MANET. Int J Comp Sci Info Technol 2014; 5(2): 1852-5.
[8]
Agrawal N, Choubey N, Mishra P. Energy efficient route selection in MANET. Int J Comp Sci Info Technol 2014; 5(3): 3267-73.
[9]
Talwar KA, Benakappa SM. An efficient route selection in MANETs by intelligent AODV. Int J Innov Res Comp Commun Eng 2014; 2(6): 4541-55.
[10]
Gupta N, Gupta R. LAR-1: affirmative influences on energy conservation and network lifetime in MANET. Int J Comp Commun Contr 2014; 9: 284-91.
[11]
Nayak P, Agrawal R, Verma S. Energy aware routing scheme for mobile ad hoc network using variable range transmission. Int J Ad Hoc 2012; 3(4): 53-63.
[12]
Jani HB, Prajapati H. Detection of black hole attack on MANET. Int J Curr Eng Sci Res 2016; 3(4): 31-5.
[13]
Yaser K, Ruba AS, Muneer BY. Malicious nodes detection in MANETs: behavioral analysis approach. J Network 2012; 7(1): 116-25.
[14]
Khattak H. Nizamuddin, Khurshid F, Amin N. Preventing black and gray hole attacks in AODV using optimal path routing and hash. IEEE Int Conf Net 2013; 13(4): 645-8.
[15]
Elboukhari M, Azizi M, Abdelmalek A. Impact analysis of black hole attacks on mobile ad hoc networks performance. Int J Grid Comp Appl 2015; 6: 1-2.
[16]
Gupta A. Mitigation algorithm against black hole attack using real time monitoring for AODV routing protocol in MANET. Int Conf Comp Develop 2015; pp. 134-8.
[17]
Mahmood MSAA, Hasan TM, Ibrahim MSDS. Modified AODV routing protocol to detect the black hole attack in MANET. Int J Adv Res Comp Sci Eng 2015; 5(7): 173-8.
[18]
Gopalakrishnan S, Mohan P. Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuit Syst 2016; 13: 748-58.
[19]
Rathiga P, Sathappan J. Hybrid detection of black hole and gray hole attackers in MANET. Int Conf Comput Syst Info 2016; 12: 135-40.
[20]
Sasilatha T, Vidhya P, Suresh MK. Detection and elimination of black hole and gray hole attack in MANET. Int J Pure Appl Math 2017; 116(24): 235-42.
[23]
Johnson DB, Maltz DA, Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Network 2001; 11: 139-72.
[24]
Perkins CE, Royer EM. Ad hoc on demand distance vector routing. 2nd IEEE workshop on Mobile Computing Systems and Applications 1999; 90-100.
[25]
Marina MK, Das SR. Ad hoc on-demand multipath distance vector routing. Wireless Commun Mob Comp 2006; 6(7): 969-88.
[26]
Gopinath S, Sureshkumar N, Vijayalakshmi G, Natraj AN, Senthil T, Prabu P. Energy efficient routing protocol for MANET. Int J Comp Sci 2012; 9(2): 292-8.
[27]
Zhu J, Wang X. Model and protocol for energy-efficient routing over mobile ad hoc networks. IEEE Trans Mob Comp 2011; 10(11): 1546-57.
[28]
Rashmi A, Seehra A. A novel approach for preventing black-hole attack in MANETs. Int J Syst Appl 2014; 2(3): 1-9.
[29]
Khin EE, Phyu T. Impact of black hole attack on AODV routing protocol. Int J Info Technol Model Comp 2014; 2(2): 9-17.
[30]
Kumar J, Kulkarni M, Gupta D. Effect of black hole attack on MANET routing protocols. Int J Comp Network Info Sec 2013; 5: 64-72.
[31]
Rajaraman A, Palaniswami S. Malicious node detection system for mobile ad hoc networks. Int J Comp Sci Technol 2010; 1(2): 77-85.