References
[1]. Alappatt, V., & Prathap, P. J. (2020). Hybrid
cryptographic algorithm based key management
scheme in MANET. Materials Today: Proceedings.
[2]. Arivazhagan, A. K., Thamizhmaran., & Thamilselvi, N.
(2015). Performance Comparison of on Demand Routing
Protocols under Back whole For MANET. Advance
Research in Computer Science and Software
Engineering, 5(3), 407–411.
[3]. Husain, R., Khan, R., & Tyagi, R. K. (2019). Comparitive
Evaluation of Security Algorithms for Ad Hoc Wireless
Networks in an Energy Constrained Environment.
i-manager's Journal on Wireless Communication
Networks, 8(2), 1-7. https://doi.org/10.26634/jwcn.8.2.16788
[4]. Joshi, V. B., & Goudar, R. H. (2017, August). Intrusion
detection systems in MANETs using hybrid techniques. In
2017, International Conference on Smart Technologies
For Smart Nation (SmartTechCon) (pp. 534-538). IEEE.
[5]. K. Thamizhmaran (2016). “Performance Evaluation of
EA3ACK in different topology's Using EAACK for MANET, imanager
Journal of Information Technology , Vol. 5, No.4, pp. 5-10.
[6]. K. Thamizhmaran (2020). Acknowledgement based
Topology Control using Hybrid Cryptography for MANETs. imanager's
Journal on Information Technology, 9(2),
36-40.
[7]. K. Thamizhmaran, M. Anitha. & Alamelunachippan.
(2017). Comparison and Parameter Adjustment of
Topology Based (S-EA3ACK) for MANETs. International
Journal of Control Theory and Application, Vol. 10, No. 30, pp. 423-436.
[8]. K. Thamizhmaran, M. Anitha & Alamelunachippan
(2017). Performance Analysis of On-demand Routing
Protocol for MANET Using EA3ACK Algorithm. International
Journal of Mobile Network Design and Innovation
(Inderscience), Vol. 7, No. 2, pp. 88-100.
[9]. K. Thamizhmaran, M. Anitha & Alamelunachippan
(2018). Reduced End-To-End delay for MANETS using SHSPEA3ACK
algorithm. Journal on Communication
Engineering and System, Vol. 7, No. 3, pp. 8-15.
[10]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015,
January). Energy efficient routing protocol with ad hoc
on-demand distance vector for MANET. In 2015, IEEE 9th
International Conference on Intelligent Systems and
Control (ISCO) (pp. 1-6). IEEE.
[11]. Marahatta, A., & Babu, K. S. (2014). Enhanced
intrusion detection system with on-demand routing
protocol using hybrid cryptographic technique for
MANETs. International Journal of Scientific & Engineering Research, 5(8), 125,133.
[12]. Prabu, K., & Subramani, A. Performance
comparison of routing protocol in MANET, IJARCSSE, Vol. 2,
Issue. 9, pp. 388-392.K.
[13]. Prabu, K., & Subramani, A. Energy efficient routing in
MANET through edge node selection using ESPR
algorithm, IJMNDI, Vol. 5, Issue. 3, pp. 166-175.
[14]. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols
in MANET. International Journal of Advanced Research in
Computer and Communication Engineering, 1(9), 651-654.
[15]. Yavuz, A. A., Alagöz, F., & Anarim, E. (2010). A new
multi-tier adaptive military MANET security protocol using
hybrid cryptography and signcryption. Turkish Journal of
Electrical Engineering and Computer Sciences, 18(1), 1-22.