MANET is a kind of wireless ad hoc networks, in which mobile nodes operate in dynamic, distributed, and cooperative environment. Open nature of MANET makes it vulnerable to various kinds of attacks. Of these, the most severe are the packet drop attacks such as Blackhole attack, Cooperative Blackhole, and Grayhole attacks. The malicious nodes drop the packets as these packets are routed through them in accordance with the malefic strategy of the particular packet drop attack, which adversely affects the network performance. A substantial amount of research papers focus on dealing with packet drop attacks in the last few years, but security is still an impending issue. In this paper, we have presented the systematic review of the literature of last 6 years on all variants of packet drop attacks. We have classified these techniques into four categories, namely, mathematical based, monitoring based, network dependent, and amalgamation based which are further sub divided into 12 categories. These papers are categorized in a well-defined structure to bring out their contribution, to underline the left-out things, and to foreground the emerging issues for future research. Detailed observations are recorded following a panoptic study in order to identify and divulge more eligible and effective mitigation techniques in a particular environment.
Certification is a technique that plays a vital role in endorsing software components. It helps in increasing the importance of software components. It tries to validate the quality of components and makes it reliable for reuse. This increases the probability of software components to be reused. The study presented the framework for certification of reusable software components. While presenting the framework the study stated about the certifiable artifacts and certifying authority. It also stated the methods of certification, certification practices to be followed, and the certification services. The certification process actually ratifies the quality of software components. The certification methods involve the request for certification, processing the request, and issuance of certificates. The certification practices are categorized into 'for reuse' and 'with reuse'. The certification services stated about the services provided in relation to certificates. It is easy to rely on products with valid certificates. The software components without certification do not guarantee the quality aspects. It may then be able to compromise the quality of software products, which in turn, can vitiate the reliability of software components and consequently, the software products.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.