References
[1]. Ad hoc On-Demand Distance Vector Routing. (n.d).
In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Ad_hoc_On-Demand_Distance_Vector_Routing#
[2]. Bhalaji, N., Banerjee, S., & Shanmugam, A. (2008). A
novel routing technique against packet dropping attack
in adhoc networks. Journal of Computer Science, 4, 538-544.
[3]. Deswal, S., & Singh, S. (2010). Implementation of
routing security aspects in AODV. International Journal of
Computer Theory and Engineering, 2(1), 135-138.
[4]. Hamma, T., Katoh, T., Bista, B. B., & Takata, T. (2006,
September). An efficient zhls routing protocol for mobile
ad hoc networks. In 17th International Workshop on
Database and Expert Systems Applications (DEXA'06),
(pp. 66-70). IEEE. https://doi.org/10.1109/DEXA.2006.24
[5]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015,
January). Energy efficient routing protocol with ad hoc
on-demand distance vector for MANET. In 2015 IEEE 9th
International Conference on Intelligent Systems and
Control (ISCO), (pp. 1-6). IEEE. https://doi.org/10.1109/ISCO.2015.7282309
[6]. Mohebi, A., Kamal, E., & Scott, S. (2013). Simulation and Analysis of AODV and DSR Routing Protocol under
Black Hole Attack. International Journal of Modern
Education & Computer Science, 5(10), 19-26. https://doi.org/10.5815/ijmecs.2013.10.03
[7]. Raj, P. N., & Swadas, P. B. (2009). Dpraodv: A dyanamic
learning system against blackhole attack in aodv based
manet. International Journal of Computer Science
Issues, 2, 54-59. https://doi.org/10.48550/arXiv.0909.2371
[8]. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon,
J., & Nygard, K. E. (2003, June). Prevention of cooperative
black hole attack in wireless ad hoc networks. In
International Conference on Wireless Networks, 2003,
570-575.
[9]. Saini, A., & Kumar, H. (2010, March). Comparison
between various black hole detection techniques in
MANET. In National Conference on Computational
Instrumentation, Chandigarh, India, (pp. 19-20).
[10]. Singh, R. K., Joshi, R., &Singhal, M. (2013). Analysis of
security threats and vulnerabilities in mobile ad hoc
network (Manet). International Journal of Computer
Applications, 68(4),25-29.
[11]. Thamizhmaran, K., Mahto, R. S. K., &Tripathi, V. S. K.
(2012). Performance analysis of secure routing protocols
in MANET. International Journal of Advanced Research in
Computer and Communication Engineering, 1(9), 651-654.
[12]. Toh, C. K. (2002). Ad Hoc Mobile Wireless Networks: Protocols & Systems. 2nd Edition, Prentice Hall, Inc.
[13]. Yau, P. W., & Mitchell, C. J. (2003, October).
Reputation methods for routing security for mobile ad hoc
networks. In SympoTIC'03. Joint 1st Workshop on Mobile
Future and Symposium on Trends in Communications,
(pp. 130-137). IEEE. https://doi.org/10.1109/TIC.2003.1249106
[14]. Yu, C. W., Wu, T. K., Cheng, R. H., Yu, K. M., & Chang,
S. C. (2009). A distributed and cooperative algorithm for
the detection and elimination of multiple black hole
nodes in ad hoc networks. IEICE Transactions on
Communications, 92(2), 483-490. https://doi.org/10.1587/transcom.E92.B.483