References
[1]. Bai, F., Sadagopan, N., Krishnamachari, B., & Helmy,
A. (2004). Modeling path duration distributions in MANETs
and their impact on reactive routing protocols. IEEE
Journal on Selected Areas in Communications, 22(7),
1357-1373.
[2]. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005).
TWOACK: Preventing selfishness in mobile ad hoc
networks. In Wireless Communications and Networking
Conference, 2005 IEEE (Vol. 4, pp. 2137-2142). IEEE.
[3]. Basabaa, A., Sheltami, T., & Shakshuki, E. (2014).
Implementation of A3ACKs intrusion detection system
under various mobility speeds. Procedia Computer
Science, 32, 571-578.
[4]. Bulut, E., Geyik, S. C., & Szymanski, B. K. (2010, June).
Conditional shortest path routing in delay tolerant
networks. In World of Wireless Mobile and Multimedia
Networks (WoWMoM), 2010 IEEE International Symposium
on a (pp. 1-6). IEEE.
[5]. Choi, J., Cha,
[5]. Choi, J., Cha, S. H., Park, G., & Song, J. (2005).
Malicious nodes detection in AODV-Based Mobile Ad Hoc
Networks. GESTS Trans. Comp. Science and Engg, 18(1),
49-55.
[6]. Gayathri, A., & Narayanasamy, P. (2015). Security in
MANET's by using detective signature techniques. Journal
of Computer Science, 11(3), 526-533.
[7]. Janzadeh, H., Fayazbakhsh, K., Dehghan, M., &
Fallah, M. S. (2009). A secure credit-based cooperation
stimulating mechanism for MANETs using hash chains.
Future Generation Computer Systems, 25(8), 926-934.
[8]. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for
[9]. Liang, G., Agarwal, R., & Vaidya, N. (2010, March).
When watchdog meets coding. In INFOCOM, 2010
Proceedings IEEE (pp. 1-9). IEEE.
[10]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K.
(2007). An acknowledgment-based approach for the
detection of routing misbehavior in MANETs. IEEE
Transactions on Mobile Computing, 6(5), 536-550.
[11]. Prabu, K., & Subramani, A. (2012). Performance
comparison of routing protocol in MANET. Int. J. of Adv.
Research in Com. Sci. and Soft Engineering, 2(9), 388-
392.
[12]. Prabu, K., & Subramani, A. (2014). Energy efficient
routing in MANET through edge node selection using ESPR
algorithm. International Journal of Mobile Network
Design and Innovation, 5(3), 166-175.
[13]. Sahadevaiah, K., & PVGD, P. R. (2011). Impact of
security attacks on a new security protocol for mobile ad
hoc networks. Network Protocols and Algorithms, 3(4),
122-140.