2015
DOI: 10.1504/ijnvo.2015.073856
|View full text |Cite
|
Sign up to set email alerts
|

Study of various routing protocols in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…According to [15], the absence of infrastructure and unified control in MANET technology exposes MANET to Black hole attacks. As a result, the authors suggested a method focused on weighted binary relational fuzzy trust to protect the AODV protocol from black hole attacks.…”
Section: Related Workmentioning
confidence: 99%
“…According to [15], the absence of infrastructure and unified control in MANET technology exposes MANET to Black hole attacks. As a result, the authors suggested a method focused on weighted binary relational fuzzy trust to protect the AODV protocol from black hole attacks.…”
Section: Related Workmentioning
confidence: 99%