References
[1]. Basabaa, A., Sheltami, T., & Shakshuki, E. (2014).
Implementation of A3ACKs intrusion detection system
under various mobility speeds. Procedia Computer
Science, 32, 571-578. https://doi.org/10.1016/j.procs.2014.05.462
[2]. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for
wireless mesh networks. International Journal of Network
Security, 13(2), 109-120.
[3]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K.
(2007). An acknowledgment-based approach for the
detection of routing misbehavior in MANETs. IEEE
Transactions on Mobile Computing, 6(5), 536-550. https://doi.org/10.1109/TMC.2007.1036
[4]. Prabu, K., & Subramani, A. (2014). Energy efficient
routing in MANET through edge node selection using ESPR
algorithm. International Journal of Mobile Network
Design and Innovation, 5(3), 166-175.
[5]. Thamizhmaran, K. (2012). Secure Routing Protocol in
MANET–A Survey. International Journal of Advance
Research in Technologs, 3(3), 9-14.
[6]. Thamizhmaran, K. (2016). Performance Evaluation of
EA3ACK in different topologies Using EAACK for MANET. imanager's
Journal on Information Technology, 5(4), 5-10.
https://doi.org/10.26634/jit.5.4.10332
[7]. Thamizhmaran, K. (2020). Cluster based data
collection scheme for VANET. Journal on Software
Engineering, 14(4), 34-38.
[8]. Thamizhmaran, K. Anitha, M. & Nachippan, A. (2017). Comparison and parameter adjustment of topology
based (S-EA3ACK) for MANETs. International Journal of
Control Theory and Application, 10(30), 423-436.
[9]. Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement
based scheme in MANET. IJCSI International Journal of
Computer Science Issues, 7(4), 12-17.