[6] Malik, N.A. and Rai, M., 2020, April.
Enhanced secure and efficient key
management algorithm and fuzzy with
trust management for MANETs.
In Proceedings of the International
Conference on Innovative Computing &
Communications (ICICC).
[7] Panwar, A., Panwar, B., Rao, D.S. and
Sriram, G., 2020. A trust based approach
for avoidance of wormhole attack in
Manet. International Journal of Computer
Science and Mobile Computing, 9, pp.47-
57.
[8] Thapar, S. and Sharma, S.K., 2020,
November. Direct Trust-based Detection
Algorithm for Preventing Jellyfish Attack
in MANET. In 2020 4th International
Conference on Electronics,
Communication and Aerospace
Technology (ICECA) (pp. 749-753).
IEEE.
[9] Gomathy, V., Padhy, N., Samanta, D.,
Sivaram, M., Jain, V. and Amiri, I.S.,
2020. Malicious node detection using
heterogeneous cluster based secure routing
protocol (HCBS) in wireless adhoc sensor
networks. Journal of Ambient Intelligence
and Humanized Computing, 11(11),
pp.4995-5001.
[10] Gupta, M., Garg, P., Gupta, S. and Joon,
R., 2020. A Novel Approach for Malicious
Node Detection in Cluster-Head Gateway
Switching Routing in Mobile Ad Hoc
Networks. International Journal of Future
Generation Communication and
Networking, 13(4), pp.99-111.
[11] Hassan, K.L., Mandal, J.K. and Mondal,
S., 2020. A Dynamic Threshold-Based
Trust-Oriented Intrusion Detection System
in MANET. In Proceedings of the Global
AI Congress 2019 (pp. 699-711). Springer,
Singapore.
[12] Fatemidokht, H. and Rafsanjani, M.K.,
2020. QMM-VANET: An efficient
clustering algorithm based on QoS and
monitoring of malicious vehicles in
vehicular ad hoc networks. Journal of
Systems and Software, 165, p.110561.
[13]Gu, K., Dong, X. and Jia, W., 2020.
Malicious node detection scheme based on
correlation of data and network topology
in fog computing-based VANETs. IEEE
Transactions on Cloud Computing.
[14] Ghaleb, S.A.M. and Vasanthi, V., 2020.
Energy Efficient Multipath Routing Using
Multi-Objective Grey Wolf Optimizer
based Dynamic Source Routing Algorithm
for MANET. International Journal of
Advanced Science and Technology, 29(3),
pp.6096-6117.
[15] Chen, Z., Zhou, W., Wu, S. and Cheng,
L., 2020. An adaptive on-demand
multipath routing protocol with QoS
support for high-speed MANET. IEEE
Access, 8, pp.44760-44773.
[16] Balshetwar, S.V., Tugnayat, R.M. 2015.
Techniques for Analyzing Framed Data,
Global Journal of Engineering Science and
Researches, 2(8), 80-83.
[17] Aruna, R., Subramanian, R.,
Sengottuvelan, P. and Shanthini, J., 2019.
Optimized energy efficient route assigning
method using related node discovery
algorithm in MANET. Cluster
Computing, 22(1), pp.469-479.
[18] Anugraha, M. and Krishnaveni, S.H.,
2022. SRTE: Security Resource Allocation
for Trust Model in Evaluate the Strong
Node. Webology, 19(1).
[19] Das, M.V., Premchand, P. and Raju, L.R.,
2021. Security Enhancing based on Node
Authentication and Trusted Routing in
Mobile Ad Hoc Network
(MANET). Turkish Journal of Computer
and Mathematics Education
(TURCOMAT), 12(14), pp.5199-5211.
[20] Sirajuddin, M., Rupa, C., Iwendi, C. and
Biamba, C., 2021. TBSMR: a trust-based
secure multipath routing protocol for
enhancing the QoS of the mobile ad hoc
network. Security and Communication
Networks, 2021..
[21] Jari, H., Alzahrani, A. and Thomas, N.,
2021, November. A Novel Indirect Trust
Mechanism for Addressing Black hole
Attacks in MANET. In Proceedings of the
11th ACM Symposium on Design and
Analysis of Intelligent Vehicular Networks
and Applications (pp. 27-34).
WSEAS TRANSACTIONS on COMMUNICATIONS
DOI: 10.37394/23204.2023.22.7