Cite this paper
Gopalakrishnan, S. and Kumar, P. (2016) Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET. Circuits and Systems
, 748-758. doi: 10.4236/cs.2016.76064
 Nguyen, H.L. and Nguyen, U.T. (2008) A Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks. Ad Hoc Networks, 6, 32-46. http://dx.doi.org/10.1016/j.adhoc.2006.07.005
 Karmore, P. and Bodkhe, S. (2011) A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, Chennai.
 Rai, A.K., Tewari, R.R. and Upadhyay, S.K. (2010) Different Types of Attacks on Integrated MANET. Internet Communication. International Journal of Computer Science and Security, 4.
 Chand, K.K., Bharati, P.V. and Ramanjaneyulu, B.S. (2012) Optimized Energy Efficient Routing Protocol for Life- Time Improvement in Wireless Sensor Networks. Proc. Int. Conf. Adv. Eng., Sci. Manage. (ICAESM), 345-349.
 Singh, S.K., Singh, M.P. and Singh, D.K. (2010) Routing Protocols in Wireless Sensor Networks—A Survey. International Journal of Computer Science and Engineering Survey, 1, 63-83. http://dx.doi.org/10.5121/ijcses.2010.1206
 Abidoye, A.P., Azeez, N.A., Adesina, A.O. and Agbele, K.K. (2011) ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks. Wireless Sensor Networks, 3, 307-312. http://dx.doi.org/10.4236/wsn.2011.39032
 Chatterjee, S. and Singh, M. (2012) A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks. International Journal of Advanced Networking and Applications, 3, 12-18.
 Rejina Parvin, J. and Vasanthanayaki, C. (2015) Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks. IEEE Sensors Journal, 15.
 Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C. and Lai, C.F. (2015) Defending against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Systems Journal, 9.
 Baadache, A. and Belmehdi, A. (2010) Avoiding Blackhole and Cooperative Blackhole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security, 7.
 Vishnu, K. and Paul, A.J. (2010) Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile Ad Hoc Networks. International Journal of Computer Applications, 1, 28-32.
 Liu, K., Pramod, D., Varshney, K. and Balakrishnan, K. (2007) An Acknowledgement Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536-550. http://dx.doi.org/10.1109/TMC.2007.1036
 Deng, S., Li, J. and Shen, L. (2011) Mobility-Based Clustering Protocol for Wireless Sensor Networks with Mobile Nodes. IET Wireless Sensor Systems, 1, 39-47. http://dx.doi.org/10.1049/iet-wss.2010.0084
 Weerasinghe, H. and Fu, H. (2007) Preventing Cooperative Blackhole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Proceedings of IEEE ICC, 362-367.
 Xue, Y. and Nahrstedt, K. (2004) Providing Fault-Tolerant Ad Hoc Routing Service in Adversarial Environments. Wireless Personal Communications, 29, 367-388. http://dx.doi.org/10.1023/B:WIRE.0000047071.75971.cd