A LITERARY REVIEW OF MANET SECURITY PROTOCOLS

Abstract

Ad hoc networks offer various applications which are very much essential in wireless networks. But the vital problem concerning their security aspects is the major issue which must be solved. A mobile adhoc network is a collection of nodes that are connected through a wireless medium forming rapidly changing topologies. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. Attacks on ad hoc network routing protocols is the main problem which affects the network performance and reliability. Here a brief introduction is made of the most popular protocols that follow the tabledriven approach and the source initiated on-demand approach.

Authors and Affiliations

Krishan Kumar , Yogesh Kumar , Gaurav Pruthi

Keywords

Related Articles

Impact of Foreign Direct Investment on Retail Sector in India

The retail industry in India is expected to grow at a rate of 14% by financial year 2013-2014.

ANALYSIS AND PREDICTION OF TEMPERATURE USING STATISTICAL ARTIFICIAL NEURAL NETWORK

This paper is about producing a prediction system by using artificial neural methods that will forecast temperature. This paper is based on three objectives. First, study of temperature and gathers all knowledge regardin...

Data warehousing and Phases used in Internet Mining

In this paper, we describe the data warehousing and data mining. Data Warehousing is the process of storing the data on large scale and Data mining is the process of analyzing data from different perspectives and summar...

A New Model Using Auction Oriented Approach in Grid Computing

Grids are emerging as the infrastructure for next generation computing. The resources in the Grid are heterogeneous and geographically distributed. The management of resources in such a large and distributed environment...

Download PDF file
  • EP ID EP87014
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

Krishan Kumar, Yogesh Kumar, Gaurav Pruthi (2011). A LITERARY REVIEW OF MANET SECURITY PROTOCOLS. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 11(3), 64-68. https://europub.co.uk/articles/-A-87014