119
Views
36
CrossRef citations to date
0
Altmetric
Articles

Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (23)

Orchu Aruna & Amit Sharma. (2022) An adaptive routing protocol in flying ad hoc networks. Journal of Discrete Mathematical Sciences and Cryptography 25:3, pages 757-770.
Read now
S. Gnana Sanga Mithra & V. Vijayalaskmi. (2022) A mathematical model for breaching the blockades-mainstreaming transwomen and transmen in Chennai by using block fuzzy cognitive. Journal of Interdisciplinary Mathematics 25:3, pages 827-838.
Read now
Santosh Kumar, Neha Janu, Linesh Raja & Ankit Kumar. (2022) A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs). Journal of Interdisciplinary Mathematics 25:3, pages 815-825.
Read now
Osama R. Shahin, Rasha M. Abd El-Aziz & Ahmed I. Taloba. (2022) Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques. Journal of Interdisciplinary Mathematics 25:3, pages 791-813.
Read now
Anjali Meena, Anima Vaish, Shweta Meena, Ramesh Chand Meena & Santosh Kumar. (2022) A mathematical model for analysing the significance of information technology resources in school education during pandemic. Journal of Interdisciplinary Mathematics 25:3, pages 741-752.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2022) End-to-end authentication based secure communication in vehicular ad hoc networks (VANET). Journal of Discrete Mathematical Sciences and Cryptography 25:1, pages 219-229.
Read now
Richa Rawal, Devesh Kumar Bandil & Srawan Nath. (2021) Data sparsity for twitter sentiment analysis in real-time from biased and noisy data. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2403-2413.
Read now
Ramesh Chand Meena, Keshav Meena, Ankit Kumar, Mukesh Gupta & Santosh Kumar. (2021) Status of address spoofing attack prevention techniques in software-defined networking (SDN). Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2341-2351.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2021) Improving security and privacy in VANET network using node authentication. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2471-2480.
Read now
C. Praveen Kumar & K. Rajendra Prasad. (2021) Multi-ROI segmentation for effective texture features of mammogram images. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2461-2469.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Blockchain-based cryptography model to preserve privacy for smart contracts. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2279-2289.
Read now
Osama R. Shahin & Rady El Rwelli. (2021) Part of speech tagging for Arabic text based radial basis function. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2443-2459.
Read now
Anu Pius & D. R. Kirubaharan. (2021) Application of cryptography in data privacy using fuzzy graph theory. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2389-2401.
Read now
Alanazi Rayan & Hamoud Alshammari. (2021) Personal phone number privacy-preserving models for public use. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2377-2388.
Read now
Aakriti Sharma, Bright Keswani & Anjana Sangwan. (2021) Optimization of docker container security and its performance evaluation. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2365-2375.
Read now
Anjana Sangwan, Bright Keswani & Aakriti Sharma. (2021) Optimization of secure communication channel over the volunteer cloud and cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2257-2266.
Read now
Neha Janu, Ankit Kumar, Linesh Raja, Vaibhav Bhatnagar, Abhishek Kumar, Santosh Kumar & Ramesh Chandra Poonia. (2021) Development of an efficient real-time H.264/AVC advanced video compression encryption scheme. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2245-2255.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Assimilation of blockchain over cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2267-2277.
Read now
Arvind Kumar, Deepti & Sushil Kumar. (2021) Fuzzy based energy optimized routing for lifetime maximization in mobile ad hoc networks. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1439-1455.
Read now
Babu Ram & Neelendra Badal. (2019) Latency estimation based routing (LEBR) protocol in vehicular adhoc networks (VANETs). Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1517-1531.
Read now
Sunil Kumar & Karan Singh. (2019) A keyless secure data aggregation mechanism. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1533-1548.
Read now
Subrata Sahana & Karan Singh. (2019) Fuzzy based energy efficient underwater routing protocol. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1501-1515.
Read now
Gopal Singh Rawat & Karan Singh. (2019) Beacon inter-reception time based adaptive beaconing (BIRA) for congestion-aware vehicular networks. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1477-1487.
Read now

Articles from other publishers (13)

Jyothi N & Rekha Patil. (2023) Enhanced Machine Learning Based Techniques for Security in Vehicular Ad-Hoc Networks. Enhanced Machine Learning Based Techniques for Security in Vehicular Ad-Hoc Networks.
Ahmed M. Eltahlawy, Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut & Marianne A. Azer. (2023) A Survey on Parameters Affecting MANET Performance. Electronics 12:9, pages 1956.
Crossref
S. Lakshmi, E. A. Mary Anita & J. Jenefa. (2023) A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility. IEEE Access 11, pages 91595-91603.
Crossref
Besma Zeddini, Mohamed Maachaoui & Youssef Inedjaren. (2022) Security Threats in Intelligent Transportation Systems and Their Risk Levels. Risks 10:5, pages 91.
Crossref
Sahabuddin, Andani Achmad & Syafruddin Syarif. (2021) Optimization of the 5G VANET Routing Protocol On AODV Communication with Static Intersection Node. Optimization of the 5G VANET Routing Protocol On AODV Communication with Static Intersection Node.
Neha Janu, Ankit Kumar, Pankaj Dadheech, Gajanand Sharma, Ashutosh Kumar & Linesh Raja. (2021) Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. IOP Conference Series: Materials Science and Engineering 1131:1, pages 012020.
Crossref
Sanwta Ram Dogiwal, Pankaj Dadheech, Ankit Kumar, Linesh Raja, Abhishek Kumar & Mahender Kumar Beniwal. (2021) An Automated Optimize Utilization of Water and Crop Monitoring in Agriculture Using IoT. IOP Conference Series: Materials Science and Engineering 1131:1, pages 012019.
Crossref
Syeda M. Muzammal, Raja Kumar Murugesan & N. Z. Jhanjhi. (2021) A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet of Things Journal 8:6, pages 4186-4210.
Crossref
Chhutten Singh Yadav, Abhishek Kumar, Ankit Kumar & Pankaj Dadheech. (2021) Design and Analysis of an Efficient Multi-Relational Decision Tree Learning Algorithm. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012075.
Crossref
Pankaj Dadheech, Ankit Kumar, Vijander Singh, Linesh Raja & Ramesh C. Poonia. 2021. Smart Agricultural Services Using Deep Learning, Big Data, and IoT. Smart Agricultural Services Using Deep Learning, Big Data, and IoT 1 31 .
Ankit Kumar, Pankaj Dadheech, Vijander Singh & Linesh Raja. 2021. Data Deduplication Approaches. Data Deduplication Approaches 255 279 .
Ankit Kumar, Pankaj Dadheech & Utpaladitya Chaudhary. (2020) Energy Conservation in WSN: A Review of Current Techniques. Energy Conservation in WSN: A Review of Current Techniques.
Sumit Kumar, Madan Lal Saini & Sandeep Kumar. 2020. Microservices in Big Data Analytics. Microservices in Big Data Analytics 29 38 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.