References
[1]. Umesh Kumar Singh, Kailash Phuleriya, Shailja Sharma, D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 8, pp.183-187, August 2014.
[2]. Umesh Kumar Singh, Lokesh Laddhani and Kailash Chandra Phuleriya, An Analysis of MANET Routing Protocols with Effective Resource Management, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, pp. 724-729, June 2014.
[3]. Umesh Kumar Singh, Kailash Chandra Phuleriya, Shailja Sharma, and D.N. Goswami, On Protocols to Prevent Black Hole Attacks in Mobile Ad Hoc Networks, International Journal of Electronics Communication and Computer Engineering Volume 6, Issue 1, pp. 55-60, year 2015.
[4]. Pooja Jaiswal and Dr. Rakesh Kumar, Prevention of Black Hole Attack in MANET, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.2, No5, pp. 599-606, October 2012.
[5]. Hongmei Deng, Wei Li, and Dharma P. Agarwal, “Routing Security in Wireless Ad Hoc Networks”, University of Cincinnati, IEEE Communications magazine,Vol.40, no.10, October 2002.
[6]. S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255–265, 2000.
[7]. P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
[8]. Deng H., Li W. and Agrawal, D. P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.
[9]. Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
[10]. Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” Internet Draft, November 2002.
[11]. C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, pp. 234-244, October 1994.
[12]. D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007.
[13]. Perkins C.E., Elizabeth M., Royer & Samir R., “Ad hoc On- Demand Distance Vector Routing, IEFT MANET Draft, Charles E. Perkins, Ad Hoc Networking, ISBN 0-201-30976-9, 2003.
[14]. Raja L., & Santhosh B., “Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET”, International Journal of Engineering and Computer Science, Volume 2 Issue 3, PP. 707-718, 2013.
[15]. Bing Wu, Jianmin Chen, Jie Wu & Mihaela Cardei, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Springer, pp. 1-38, 2006.
[16]. Nagpal C., Kumar C., Bhushan B. & Gupta S., A Study of Black Hole Attack on MANET Performance, I. J. Modern Education and Computer Science, pp. 47-53, 2012.
[17]. Manickam P. ,Baskar T &.Manimegalai D., “Performance Comparisons Of Routing Protocols In Mobile Ad Hoc Networks”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1, pp. 98-106, 2011.
[18]. Johnson D. B., Maltz D. & Broch J., “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Network”, C.E. Perkins, Ed., Addison-Wesley, pp.139-172, 2001.
[19]. Prateek K., Arvind N.& Alaria S., “MANET-Evaluation of DSDV, AODV andDSR Routing Protocol”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1, pp.-99-104, 2013.
[20]. The network simulator. (http://www.isi.edu/nsnam/ns/).
[21].Umesh Kumar Singh, Kailash Chandra Phuleriya and Rakhi Sunhare, Wireless Sensor Networks: Comparative Study and Analysis of MAC Protocols, International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), Vol. 4, Issue 2, pp. 107-114, Apr 2014.