[3] Kant Vishwakarma, E.R., Sahu, M. and
Sharma, D., Performance Evaluation of
MAC Protocol in Mobile Ad-Hoc Wireless
Network. Journal homepage:
www.ijrpr.com ISSN, 2582, p.7421.
[4] HAMAMREH, R.A., 2019. SDCM: Secure
Dynamic End-To-End Congestion
Avoidance Protocol for MANET. Journal
of Theoretical and Applied Information
Technology, 97(21).
[5] Kanellopoulos, D.N., 2019. Recent
progress on QoS scheduling for mobile ad
hoc networks. Journal of Organizational
and End User Computing (JOEUC), 31(3),
pp.37-66.
[6] Nasralla, M.M., García-Magariño, I. and
Lloret, J., 2021. MASEMUL: A simulation
tool for movement-aware MANET
scheduling strategies for multimedia
communications. Wireless
Communications and Mobile
Computing, 2021.
[7] Nithyapriya, J., Jothi, R.A. and Palanisamy,
V., 2019, May. Protecting Messages Using
Selective Encryption Based ESI Scheme for
MANET. In 2019 TEQIP III Sponsored
International Conference on Microwave
Integrated Circuits, Photonics and Wireless
Networks (IMICPW) (pp. 50-54). IEEE.
[8] Singha, S., 2021. Design of an effective
Congestion Control Routing Protocol for
Mobile-Ad-Hoc Network (Doctoral
dissertation, Vidyasagar University,
Midnapore, West Bengal, India,).
[9] Yazdinejad, A., Kavei, S. and Razaghi
Karizno, S., 2019. Increasing the
performance of reactive routing protocol
using the load balancing and congestion
control mechanism in MANET. Computer
and Knowledge Engineering, 2(1), pp.33-
42.
[10]Suraki, M.Y., Haghighat, A.T. and
Gholipour, M., 2018. FCLCC: fuzzy cross-
layer congestion control in mobile ad hoc
networks. IJCSNS, 18(1), p.155.
[11]Alappatt, V. and PM, J.P., 2021. Trust-
based energy efficient secure multipath
routing in MANET using LF-SSO and
SH2E. Int. J. Comput. Netw. Appl., 8(4),
p.400.
[12]Anbarasan, M., Prakash, S., Antonidoss, A.
and Anand, M., 2020. Improved encryption
protocol for secure communication in
trusted MANET against denial of service
attacks. Multimedia Tools and
Applications, 79(13), pp.8929-8949.
[13]Appaji, V.V. and Srinivas, J.V.S., Cross
Layer Congestion Control Mechanism for
MANET using CSPA algorithm.
[14]Kashid, M.T.S.V., Patidar, M. and Sharma,
H.M.K., 2021. Multipath Congestion
Control and Predication and Detection of
Attacks in MANET.
[15]Miriyala, S. and Sairam, M.S., 2020.
Improving privacy in SDN-based MANET
using hybrid encryption and decryption
algorithm. Microprocessors and
Microsystems, p.103501.
[16]Sumathi, K. and Kumar, D.V., Ambient
Intelligence-Based Fish Swarm
Optimization Routing Protocol for
Congestion Avoidance in Mobile Ad-Hoc
Network. Networks, 6, p.15.
[17]Thanappan, R. and Perumal, T., 2022.
Congestion Aware MANET Routing Using
Evolutionary Game Theory and Cross-
Layer Design. ECS Transactions, 107(1),
p.1699.
[18]Reddy, V.S.N. and Mungara, J., 2021.
Machine Learning-Based Efficient
Clustering and Improve Quality of Service
in Manet. Indian Journal of Computer
Science and Engineering, 12(5), pp.1392-
1399.
[19]Phakathi, T., Esiefarienrhe, B.M. and
Lugayizi, F., 2021. Comparative analysis of
quality of service scheduling classes in
mobile ad-hoc networks. ArXiv preprint
arXiv:2106.07051.
[20]Usturge, S. and Pavan Kumar, T., 2022.
DEroute: trust-aware data routing protocol
based on encryption and fuzzy concept for
MANET secure communication in
IoT. Information Security Journal: A
Global Perspective, pp.1-16.
[21]Ravi, S., Matheswaran, S., Perumal, U.,
Sivakumar, S. and Palvadi, S.K., 2022.
Adaptive trust-based secure and optimal
route selection algorithm for MANET using
WSEAS TRANSACTIONS on COMMUNICATIONS
DOI: 10.37394/23204.2023.22.6