1.
B. Salah Eddine, S. Omar, B. Meftah, M. Rabbah, and B. Cousin, "An efficient energy-aware link stable multipath routing protocol for mobile ad hoc networks in urban areas," Telford Journal, vol. 12, pp. 2–7, 01 2020.
2.
S. K. Singh and J. Prakash, “Energy efficiency and load balancing in manet: A survey,” in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020, pp. 832–837.
3.
A. Parveen and Y. V. S. Sai Pragathi, “A study of routing protocols for energy conservation in manets,” in Advances in Decision sciences, Image Processing, Security and Computer Vision, S. C. Satapathy, K. S. Raju, K. Shyamala, D. R. Krishna, and M. N. Favorskaya, Eds. Cham: Springer International Publishing, 2020, pp. 641–647.
4.
Z. Chen, W. Zhou, S. Wu, and L. Cheng, “An adaptive on-demand multipath routing protocol with QoS support for high-speed manet," IEEE Access, vol. 8, pp. 44 760–44 773, 2020.
5.
M. Anand and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (manet) using better-quality aodv protocol,” Cluster Computing, vol. 22, 09 2019.
6.
L. Atzori, A. Iera, and G. Morabito, ?The internet of things: A survey,? Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
7.
P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, ?Convergence of MANET and WSN in IoT urban scenarios,? IEEE Sens. J., vol. 13, no. 10,pp. 3558–3567, Oct. 2013.
8.
Mohit K. and Rashmi Mishra. An Overview of MANET: History, Challenges and Applications. International Journal of Engineering Research and Technology. (2012). vol. 3, no.1.
9.
Pravin Ghosekar. 2010. Mobile Ad Hoc Networking: Imperatives and Challenges. In proceedings of IJCA, Special issues on “Mobile Ad-hoc Networks” (MANET).
10.
N. Sah, N. R. Prakash, and D. Bagai “QoS Analysis in Mobile AdHoc Networks Using Bandwidth Utilization Technique”, Dec 2014.
11.
Karlsson, Jonny, Laurence S. Dooley, and Goran P. Pulkkis. "Secure Routing for MANET Connected Internet of Things Systems." (2018).
12.
Alameri, I. A. "MANETS and internet of things: the development of a data routing algorithm." Engineering, Technology & Applied Science Research 8, no. 1 (2018): 2604-2608.
13.
Mohammed Shabaz Hussain and Khaleel Ur Rahman Khan, "Network-based Anomaly Intrusion Detection System in MANETS," Proceedings of the Fourth International Conference on Inventive Systems and Control (ICISC 2020, IEEE Xplore Part Number: CFP20J06-ART; ISBN: 978-1-7281-2813-9
14.
Hui Lin, Jia Hu, Xiaoding Wang, Mohammed F. Alhamid and Md. Jalil Piran "Towards Secure Data Fusion in Industrial IoT using Transfer Learning", IEEE Transactions on Industrial Informatics 2020, DOI 10.1109/TII.2020.3038780, IEEE
15.
SIVASHANKARI RAJADURAI, MAMOUN ALAZAB, NEERAJ KUMAR AND THIPPA REDDY GADEKALLU, "Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata", IEEE Acess July 2020, Digital Object Identifier 10.1109/ACCESS.2020.3013013
16.
Mohammad Sirajuddin, Ch. Rupa , Celestine Iwendi and Cresantus Bamba, "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network",Hindawi Security and Communication Networks Volume 2021, Article ID 5521713, 9 pages https://doi.org/10.1155/2021/5521713
17.
P. Sathyaraj and D. Rukmani Devi, "Designing the routing protocol with secured IoT devices and QoS over Manet using trust?based performance evaluation method", Springer-Verlag GmbH Germany, part of Springer Nature 2020, Journal of Ambient Intelligence and Humanized Computing https://doi.org/10.1007/s12652-020-02358-4
18.
Swetha MS (2019) A novel approach to secure mysterious location based routing for Manet. IJITEE 8(7):2587–2591
19.
Belgaum MM (2019) Secured approach towards reactive routing protocols using triple factor in mobile ad hoc networks. AETiC 3(2):32–40
20.
Guaya-Delgado L (2019) A novel dynamic reputation-based source routing protocol for mobile ad hoc networks, vol 77. Springer, New York
21.
Mukhedkar MM (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545
22.
Veeraiah N, Krishna BT (2020) An approach for optimal-secure multipath routing and intrusion detection in MANET. Evolutionary intelligence. Springer, New York
23.
Singh, K., & Gupta, R. (2021). SO-AODV: A Secure and Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol Over AODV With Quality Assurance Metrics for Disaster Response Applications. Journal of Information Technology Research (JITR), 14(3), 87-103. http://doi.org/10.4018/JITR.202107010
24.
H. Kathiriya, A. Pandya, V. Dubay, and A. Bavaria, "State of art: energy-efficient protocols for self-powered wireless sensor network in IIoT to support industry 4.0,” in Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1311–1314, Noida, India, June 2020.
25.
V. V. Sarbhukan and L. Ragha, “establishing secure routing path using trust to enhance security in MANET,” Wireless Personal Communications, vol. 110, no. 1, pp. 245–255, 2020
26.
M. S. Hussain and K. U. R. Khan, “Network-based anomaly intrusion detection system in MANETS,” in Proceedings of the ICISC, pp. 881–886, Coimbatore, India, December 2020.
27.
H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
28.
H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
29.
D. Vasan, M. Alazab, S. Wassan, H. Naeem, B. Safaei, and Q. Zheng, “IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture,” Computer Networks, vol. 171, Article ID 107138, 2020.
30.
S. Rajadurai, M. Alazab, N. Kumar, and T. R. Gadekallu, “Latency evaluation of SDFGs on heterogeneous processors using timed automata,” Institute of Electrical and Electronics Engineers Access, vol. 8, pp. 140171–140180, 2020.
31.
C. Iwendi, S. Khan, J. H. Anajemba, M. Mittal, M. Alenezi, and M. Alazab, “)e use of ensemble models for multiple class and binary class classification for improving intrusion detection systems,” Sensors, vol. 20, no. 9, Article ID 2559, 2020
32.
M. Mittal, C. Iwendi, S. Khan, and J. A. Rehman, “Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system,” Transactions on Emerging Telecommunications Technologies, 32.6, e3997, 2021.