@incollection{, 9B7C76956BAD815AAB1B418245DA25E7 , author={{Ephantus G.Mwangi} and {Geoffrey MuchiriMuketha} and {Gabriel Ndung?uKamau} and {Muranga University of Technology}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2033954 } @incollection{b0, , title={{A Novel Solution for Gray hole Attack in AODV Based MANETs}} , author={{ HRutvij } and { JJhaveri } and { PSankita } and { CDJinwala }} , booktitle={{Proc. of Third International Conference on Advances in Communication, Network and Computing}} of Third International Conference on Advances in Communication, Network and Computing , publisher={Springer} , year={2012} } @book{b1, , title={{Routing protocols in Ad-hoc networks: a survey of Computer Networks}} , author={{ ABoukerche }} , year={2011} 55 } @book{b2, , title={{Securing AOMDV Protocol in Mobile Ad-hoc Network with Elliptic Curve Cryptography}} , author={{ SJeenat } and { ATasnuva }} , note={International Conference on} } @incollection{b3, , title={{AODV-Based Secure Routing Against Blackhole Attack in MANET}} , author={{ RDSagar } and { PNChatur } and { BBNikhil }} , booktitle={{IEEE International Conference on Recent Trends in Electronics Information Communication Technology}} , publisher={IEEE} , year={2016} } @incollection{b4, , title={{Mitigating Packet Dropping Problem in Mobile Ad-hoc Networks: Proposals and Challenges}} , author={{ DSoufiene } and { NFarid } and { ZZonghua }} , journal={{IEEE Communications Surveys & Tutorials}} 13 4 , year={2011} } @book{b5, , author={{ MAAbdelshafy } and { PJ BKing }} , title={{Resisting Blackhole Attacks on MANETs', 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)}} , publisher={IEEE} , year={2016} } @book{b6, , title={{Energy Efficient Malicious Node Detection Scheme in Wireless Networks}} , author={{ RSukanesh } and { EEdsor } and { MAarthylakshmi }} , year={2016} , publisher={IEEE} } @incollection{b7, , title={{A mechanism for detection of Co-operative Black hole attack in Mobile Ad-hoc networks}} , author={{ JSen } and { SKoilakonda } and { AUkil }} , booktitle={{Second International Conference on Intelligent Systems, Modeling and Simulation}} , publisher={IEEE} , year={2011} } @book{b8, , title={{Improving AODV Protocol against Blackhole Attacks', International Multiconference of Engineers and Computer Scientists}} , author={{ NMistry } and { DCJinwala } and { MZaveri }} , year={2010} 2 } @book{b9, , author={{ M-YSu } and { K-LChiang } and { W-CLiao }} 10.1109/ISPA.2010.74 , title={{Mitigation of Black-Hole Nodes in Mobile Ad-hoc Networks', International Symposium on Parallel and Distributed Processing with Applications}} , publisher={IEEE} , year={2010} } @incollection{b10, , title={{BAAP: Blackhole Attack Avoidance Protocol for Wireless Network}} , author={{ SGupta } and { SKar } and { SDhararaja }} , booktitle={{International Conference on Computer & Communication Technology (ICCCT)}} , publisher={IEEE} , year={2011} } @book{b11, , title={{Two-level Secure Re-routing (TSR) in Mobile Ad-hoc Networks}} , author={{ HNSaha }} 10.1109/MNCApps.2012.31 , year={2012} , publisher={IEEE} } @incollection{b12, , title={{Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET}} , author={{ AABhosle } and { TPThosar } and { SMehatre }} , journal={{International Journal of Computer Science, Engineering and Applications (IJCSEA)}} 2012 1 } @incollection{b13, , title={{A trust-based approach for AODV protocol to mitigate Black hole attack in MANET}} , author={{ FThachil } and { KCShet }} , booktitle={{International Conference on Computing Sciences}} , publisher={IEEE} , year={2012} } @book{b14, , title={{Detection and Removal of Cooperative Blackhole and Gray hole Attacks in MANETs}} , author={{ GSBindra }} , year={2012} , publisher={IEEE} 3 } @incollection{b15, , title={{I-2ACK: Preventing Routing Misbehavior in Mobile Ad-hoc Networks}} , author={{ AS AUkey } and { MChawla } and { VPSingh }} , journal={{International Journal of Computer Applications}} 62 12 , year={2013} } @book{b16, , title={{Eliminating Cooperative Blackhole and Gray hole Attacks Using Modified EDRI Table in MANET}} , author={{ VAHiremani } and { MMJadhao }} 10.1109/ICGCE.2013.6823571 , year={2013} , publisher={IEEE} } @book{b17, , author={{ VGaikwad } and { LRagha }} , title={{Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)}} , publisher={IEEE} , year={2015} } @incollection{b18, , title={{Cooperative Bait Detection Scheme to prevent Collaborative Blackhole or Gray hole Attacks by Malicious Nodes in MANETs}} , author={{ PRDumne } and { AManjaramkar }} , booktitle={{5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO)}} , publisher={IEEE} , year={2016} } @incollection{b19, , title={{Defending Collaborative Attacks in MANETs Using Modified Cooperative Bait Detection Scheme}} , author={{ PEmimajuliet } and { VThirilogasundari }} , booktitle={{International Conference On Information Communication And Embedded System (ICICES)}} , year={2016} } @incollection{b20, , title={{Evaluation of the energy consumption in MANET}} , author={{ GPAllard }} , journal={{Adhoc-Now}} , year={2006} } @incollection{b21, , title={{Energy-aware Clustered based Multipath Routing in Mobile Ad-hoc Networks}} , author={{ MBheemalingaiah } and { ,M MNaidu } and { DSRao }} , journal={{International Journal of Communications}} 2 5 , year={2017} , note={Network and System Sciences} } @incollection{b22, , title={{Performance evaluation of energy-efficient Ad-hoc routing protocols}} , author={{ LCao } and { TDahlberg } and { YWang }} , booktitle={{Proc. IPCCC}} IPCCC , publisher={IEEE} , year={2007} } @incollection{b23, , title={{Link-Stability and Energy-aware Routing Protocol in Distributed Wireless Networks}} , author={{ FRango } and { FGuerriero } and { PFazio }} , journal={{Journal of IEEE Transaction on Parallel and Distributed Systems}} , year={2012} } @incollection{b24, , title={{Security Challenges in Mobile Ad-hoc Networks: A Survey}} , author={{ ADorri } and { SRKamel } and { EKheyrkhah }} 10.5121/ijcses.2015.6102 , journal={{International Journal of Computer Science & Engineering Survey (IJCSES)}} 6 1 , year={2015} } @book{b25, , author={{ ZGuo } and { BMalakooti }} 10.1109/WASA.2007.151 , title={{Energy-Aware Proactive MANET Routing with Prediction on Energy Consumption, International Conference on Wireless Algorithms, Systems and Applications', IEEE}} , year={2007} } @incollection{b26, , title={{Security: 'A Core Issue in Mobile Ad-hoc Networks}} , author={{ AShabbir }} 10.4236/jcc.2015.312005 , journal={{Journal of Computer and Communications}} 3 3 , year={2015} } @incollection{b27, , title={{Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad-hoc Networks, Communication Magazine}} , author={{ CKToh }} , booktitle={{10th International Conference on Practical Applications of Agents and Multi-Agent Systems}} , year={2001} } @incollection{b28, , title={{Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol}} , author={{ EGMwangi } and { GMMuketha } and { GNKamau }} 10.5923/j.ijnc.20201001.01.2020 , journal={{International Journal of Networks and Communications}} 10 1 , year={2020} } @incollection{b29, , title={{Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3}} , author={{ EGMwangi } and { GMMuketha } and { GNKamau }} 10.5923/j.ijnc.20201001.02.2020 , journal={{International Journal of Networks and Communications}} 10 1 }