Login / Signup
Retraction Note: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET.
R. Thiagarajan
R. Ganesan
V. Anbarasu
Manickam Baskar
K. Arthi
J. Ramkumar
Published in:
Wirel. Pers. Commun. (2023)
Keyphrases
</>
mobile ad hoc networks
malicious behavior
malicious nodes
wireless medium
routing protocol
network nodes
peer to peer
real time
social networks
wireless sensor networks
mobile phone
ad hoc networks
security requirements
multipath routing