<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 2 Issue 4</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science &amp; Engineering </IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>July - August 2014</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>11</Month>
        <Day>17</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Dynamic Security Implementation in MANETS</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>1</FirstPage>
      <LastPage>5</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Anshu</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Suman Sagwan</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>Security has become a primary concern in order to provide reliable communication between mobile nodes. Inherent characteristics of Mobile ad hoc networks like open peer-to-peer network architecture, shared wireless medium, resource constraints, and dynamic network topology make them more vulnerable to security threats. This calls for elaborated security solutions that achieve both broad protection and desirable network performance. This paper identifies the security issues related to MANET, the known routing attacks and th</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>attacks, manet, measures, security</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=77</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>