References
[1]. Arivazhagan, A., & Thamizhmaran, K. (2015).
Performance comparison of proactive and reactive
routing protocol under wormhole for MANET. International
Journal of Applied Engineering Research, 10(46), 32193-32198.
[2]. Baliga, J., Ayre, R., Hinton, K., & Tucker, R. S. (2011).
Energy consumption in wired and wireless access
networks. IEEE Communications Magazine, 49(6), 70-77.
https://doi.org/10.1109/MCOM.2011.5783987
[3]. Borsc, M., & Shinde, H. (2005, January). Wireless
security & privacy. In 2005, IEEE International Conference
on Personal Wireless Communications, 2005. ICPWC
2005, (pp. 424-428). IEEE. https://doi.org/10.1109/ICPWC.2005.1431380
[4]. Clausen, T., & Jacquet, P. (2003). Optimized Link State
Routing Protocol (OLSR) (No. rfc3626). Retrieved from
https://www.rfc-editor.org/rfc/rfc3626
[5]. Feng, D., Jiang, C., Lim, G., Cimini, L. J., Feng, G., & Li,
G. Y. (2012). A survey of energy-efficient wireless
communications. IEEE Communications Surveys &
Tutorials, 15(1), 167-178. https://doi.org/10.1109/SURV.2012.020212.00049
[6]. Kargl, F., Geis, A., Schlott, S., & Weber, M. (2005,
Januar y). Secure dynamic source routing. In
Proceedings of the 38th Annual Hawaii International
Conference on System Sciences, (pp. 320c-320c). IEEE.
https://doi.org/10.1109/HICSS.2005.531
[7]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015,
January). Energy efficient routing protocol with ad hoc
on-demand distance vector for MANET. In 2015. IEEE 9th
International Conference on Intelligent Systems and
Control (ISCO), (pp. 1-6). IEEE. https://doi.org/10.1109/ISCO.2015.7282309
[8]. Lee, C. C. (2020). Security and privacy in wireless
sensor networks: Advances and challenges. Sensors,
20(3), 744. https://doi.org/10.3390/s20030744
[9]. Nedić, A., Olshevsky, A., & Rabbat, M. G. (2018).
Network topology and communication-computation
tradeoffs in decentralized optimization. Proceedings of
the IEEE, 106(5), 953-976. https://doi.org/10.1109/JPROC.2018.2817461
[10]. Shandilya, S. K., & Sahu, S. (2010). A trust based
security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5(12),
4-8.
[11]. Thamizhmaran, K. & Girishkumar, G. (2019). ACO of
energy efficient clustering routing method. Journal of
Gujarat Research Society, 21(7), 66-71.
[12]. Thamizhmaran, K. (2018). Comparison of AODV and
M-AODV in MANET. IOSR Journal of Engineering, 8(5), 11-14.
[13]. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K.
(2012). Performance analysis of secure routing protocols
in MANET. International Journal of Advanced Research in
Computer and Communication Engineering, 1(9), 651-654.
[14]. Tsitsigkos, A., Entezami, F., Ramrekha, T. A., Politis, C.,
& Panaousis, E. (2012, April). A case study of internet of
things based on wireless sensor networks and smart phones. In 28th Wireless World Research Forum Meeting,
(pp. 1-10).
[15]. Wu, J., & Fan, P. (2016). A survey on high mobility
wireless communications: Challenges, opportunities and
solutions. IEEE Access, 4, 450-476. https://doi.org/10.1109/ACCESS.2016.2518085