1.
S. Uppalapati, ‘‘Energy-efficient heterogeneous optimization routing protocol for wireless sensor network,’’ Instrum. Mesure Metrol., vol. 19, no. 5, pp. 391–397, Nov. 2020.
2.
S. Bharany, S. Sharma, S. Badotra, O. I. Khalaf, Y. Alotaibi, S. Alghamdi, and F. Alassery, ‘‘Energy-efficient clustering scheme for flying Ad-Hoc networks using an optimized LEACH protocol,’’ Energies, vol. 14, no. 19, p. 6016, Sep. 2021.
3.
U. Srilakshmi, N. Veeraiah, Y. Alotaibi, S. A. Alghamdi, O. I. Khalaf, and B. V. Subbayamma, ‘‘An improved hybrid secure multipath routing protocol for MANET,’’ IEEE Access, vol. 9, pp. 163043–163053, 2021.
4.
B. Rajkumar and G. Narsimha, ‘‘Secure multipath routing and data transmission in MANET,’’ Int. J. Netw. Virtual Organisations, vol. 16, no. 3, pp. 236–252, 2016.
5.
G. Anjaneyulu, V. M. Viswanatham, and B. Venkateswarlu, ‘‘Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks,’’ Adv. Appl. Sci. Res., vol. 2, no. 4, pp. 177–186, 2011.
6.
R. Prasad P and S. Shankar, ‘‘Efficient performance analysis of energy aware on demand routing protocol in mobile Ad Hoc network,’’ Eng. Rep., vol. 2, no. 3, p. e12116, Mar. 2020.
7.
S. V. Kumar and V. AnurathaEnergy, ‘‘Efficient routing for MANET using optimized hierarchical routing algorithm (Ee-Ohra),’’ Int. J. Sci. Technol. Res., vol. 9, no. 2, pp. 2157–2162, Feb. 2020.
8.
N.-C. Wang and Y.-L. Su, ‘‘A power-aware multicast routing protocol for mobile Ad Hoc networks with mobility prediction,’’ presented at the IEEE Conf. Local Comput. Netw. 30th Anniversary (LCN)l, Sydney, NSW, Australia, Nov. 17, 2005, p. 8 and 417.
9.
R. Rout, P. Parida, Y. Alotaibi, S. Alghamdi, and O. I. Khalaf, ‘‘Skin lesion extraction using multiscale morphological local variance reconstruction-based watershed transform and fast fuzzy C-Means clustering,’’ Symmetry, vol. 13, no. 11, p. 2085, Nov. 2021.
10.
U. Venkanna, J. K. Agarwal, and R. L. Velusamy, ‘‘A cooperative routing for MANET based on distributed trust and energy management,’’ Wireless Pers. Commun., vol. 81, no. 3, pp. 961–979, Apr. 2015.
11.
M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), 2022, pp. 384-387, doi: 10.1109/ICDCS54290.2022.9780760.
12.
M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 384-387, doi: 10.1109/ICDCS54290.2022.9780760.
13.
R. I. Al-Essa and G. A. Al-Suhail, "Mobility and Transmission Power of AODV Routing Protocol in MANET," 2022 2nd International Conference on Computing and Machine Intelligence (ICMI), 2022, pp. 1-5, doi: 10.1109/ICMI55296.2022.9873686.
14.
M. D. Chawhan, K. Karmarkar, G. Almelkar, D. Borkar, K. D. Kulat and B. Neole, "Identification and prevention of Gray hole attack using IDS mechanism in MANET," 2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22), 2022, pp. 1-6, doi: 10.1109/ICETET-SIP-2254415.2022.9791594.
15.
M. M. Hamdi et al., "A study review on Gray and Black Hole in Mobile Ad Hoc Networks (MANETs)," 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022, pp. 1-6, doi: 10.1109/HORA55278.2022.9800011.
16.
M. P. Kumar, M. M. Kumar, S. Shobana, L. Padmanaban, A. Nageswaran and R. Krishnamoorthy, "Enhanced Secure Routing in MANET using Collaborative Machine Learning Approach," 2022 8th International Conference on Smart Structures and Systems (ICSSS), 2022, pp. 1-6, doi: 10.1109/ICSSS54381.2022.9782205.
17.
D. N. M. Hoang, J. M. Rhee and S. Y. Park, "Fault-Tolerant Ad Hoc On-Demand Routing Protocol for Mobile Ad Hoc Networks," in IEEE Access, vol. 10, pp. 111337-111350, 2022, doi: 10.1109/ACCESS.2022.3216066.
18.
P. Upadhyay, V. Marriboina, S. Kumar, S. Kumar and M. A. Shah, "An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks," in IEEE Access, vol. 10, pp. 110136-110148, 2022, doi: 10.1109/ACCESS.2022.3211653.
19.
U. Srilakshmi, S. A. Alghamdi, V. A. Vuyyuru, N. Veeraiah and Y. Alotaibi, "A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks," in IEEE Access, vol. 10, pp. 14260-14269, 2022, doi: 10.1109/ACCESS.2022.3144679.
20.
X. Chen, G. Sun, T. Wu, L. Liu, H. Yu and M. Guizani, "RANCE: A Randomly Centralized and On-Demand Clustering Protocol for Mobile Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23639-23658, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3188679.
21.
M. Sharma, P. Kumar and R. S. Tomar, "Weight-Based Clustering Algorithm for Military Vehicles Communication in VANET," in SAIEE Africa Research Journal, vol. 114, no. 1, pp. 25-34, March 2023, doi: 10.23919/SAIEE.2023.9962790.
22.
M. M. Gaber and M. A. Azer, "Blackhole Attack effect on MANETs' Performance," 2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), 2022, pp. 397-401, doi: 10.1109/MIUCC55081.2022.9781680.
23.
N. Veeraiah, O. I. Khalaf, C. V. Prasad, Y. Alotaibi, A. Alsufyani, S. A. Alghamdi, and N. Alsufyani, ‘‘Trust aware secure energy efficient hybrid protocol for MANET,’’ IEEE Access, vol. 9, pp. 120996–121005, 2021.
24.
A. Mallikarjuna and V. C. Patil, ‘‘PUSR: Position update secure routing protocol for MANET,’’ Int. J. Intell. Eng. Syst., vol. 14, no. 1, pp. 93–102, Feb. 2021.
25.
M. Rajashanthi and K. Valarmathi, ‘‘A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs,’’ Wireless Pers. Commun., vol. 112, no. 1, pp. 75–90, May 2020.
26.
R. Nithya, K. Amudha, A. S. Musthafa, D. K. Sharma, E. H. Ramirez-Asis, P. Velayutham, V. Subramaniyaswamy, and S. Sengan, ‘‘An optimized fuzzy based ant colony algorithm for 5G-MANET,’’ CMC-Comput., Mater. Continua, vol. 70, no. 1, pp. 1069–1087, 2022
27.
S. R. Halhalli, S. R. Sugave, and B. N. Jagdale, ‘‘Optimisation driven-based secure routing in MANET using atom whale optimisation algorithm,’’ Int. J. Commun. Netw. Distrib. Syst., vol. 27, no. 1, p. 77, 2021.
28.
V. Alappatt and J. P. P. M., ‘‘Trust-based energy efficient secure multipath routing in MANET using LF-SSO and SH2E,’’ Int. J. Comput. Netw. Appl., vol. 8, no. 4, p. 400, Aug. 2021.
29.
K. K. Thangadorai et al., "Intelligent and Adaptive Machine Learning-based Algorithm for Power Saving in Mobile Hotspot," 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), 2020, pp. 1-6, doi: 10.1109/CCNC46108.2020.9045535.
30.
Jie Gu, Shan Lu,An effective intrusion detection approach using SVM with naïve Bayes feature embedding, Computers & Security,Volume 103,2021,102158,ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.102158.
31.
J. Ryu and S. Kim, "Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes," in IEEE Access, doi: 10.1109/ACCESS.2023.3242608.
32.
N. Veeraiah and B. T. Krishna, ‘‘An approach for optimal-secure multi-path routing and intrusion detection in MANET,’’ Evol. Intell., vol. 5, pp. 1–15, Mar. 2020.
33.
S. Palanisamy, B. Thangaraju, O. I. Khalaf, Y. Alotaibi, S. Alghamdi, and F. Alassery, ‘‘A novel approach of design and analysis of a hexagonal fractal antenna array (HFAA) for next-generation wireless communication,’’ Energies, vol. 14, no. 19, p. 6204, Sep. 2021.
34.
Sampada H K, Dr. Shobha K R.: Performance Analysis of Energy Efficient MANETs- using MODIFIED AODV (M-AODV). In: © Springer Nature Singapore Pte Ltd. 2019.S. Lecture Notes on Data Engineering and Communications Technologies 15, https://doi.org/10.1007/978-981-10-8681-6_9.
35.
Sampada H K, Shobha K R., “Cluster-Based – Multiple Malicious Node Detection using Honeypot AODV (H-AODV) in MANETs”, Int. J. of Communication Networks and Distributed Systems, 30 (1), PP:1-29, 2023.
36.
S. K. Prasad, S. Gupta, R. B. Singh and T. Sharma, "Performance Testing of AODV using Channel Fading for MANETs," 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022, pp. 811-816, doi: 10.1109/COM-IT-CON54601.2022.9850951.
37.
A. Jain, U. Prajapati and P. Chouhan, "Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-4, doi: 10.1109/CDAN.2016.7570866.
38.
Naseeruddin and V. C. Patil, "Performance evaluation of MANET protocols: A propagation model perspective," 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016, pp. 55-61, doi: 10.1109/ICATCCT.2016.7911965.
39.
Altaf Hussain, “ERWPM-MANET: Evaluation of Radio Wave Propagation Models in Mobile Ad Hoc Network by using Distance Scenario”, Romanian Journal of Information Technology and Automatic Control, Vol. 32, No. 2, 35-50, 2022.
40.
P. Ghosh and D. Verma, "An Improved Reputation Based Approach for Malicious Node Detection System in Manet," 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 2022, pp. 275-277, doi: 10.1109/ICACITE53722.2022.9823753.