A LITERARY REVIEW OF MANET SECURITY PROTOCOLS

Abstract

Ad hoc networks offer various applications which are very much essential in wireless networks. But the vital problem concerning their security aspects is the major issue which must be solved. A mobile adhoc network is a collection of nodes that are connected through a wireless medium forming rapidly changing topologies. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. Attacks on ad hoc network routing protocols is the main problem which affects the network performance and reliability. Here a brief introduction is made of the most popular protocols that follow the tabledriven approach and the source initiated on-demand approach.

Authors and Affiliations

Krishan Kumar , Yogesh Kumar , Gaurav Pruthi

Keywords

Related Articles

AN EMPIRICAL ANALYSIS OF CAUSAL RELATIONSHIP BETWEEN STOCK MARKET AND MACROECONOMIC VARIABLES IN INDIA

The present paper is aimed at studying the nature of the causal relationship between stock prices and macroeconomic variables in India, if any such relationship exists. For this purpose the techniques of unit– root tests...

Performance Analysis of DSDV Protocol Using NS-2

The instantly created network does not have any base infrastructure as used in the conventional networks, but it is compatible with the conventional networks. DSDV is a modification of the conventional Bellman- Ford rout...

Design of Metrics for Customization of Component Based Software Module

In this paper we will discuss such kind of metrics that are used to customize of software modules while software development takes place through component based methodology. While these metrics are used to do this it he...

An Improved Approach to perform Crawling and avoid Duplicate Web Pages

When a web search is performed it includes many duplicate web pages or the websites. It means we can get number of similar pages at different web servers. We are proposing a Web Crawling Approach to Detect and avoid Dupl...

A Hybrid Approach Using C Mean and CART for Classification in Data Mining

Data Mining is a field of search and researches of data. Mining the data means fetching out a piece of data from a huge data block. The basic work in the data mining can be categorized in two subsequent ways. One is ca...

Download PDF file
  • EP ID EP87014
  • DOI -
  • Views 171
  • Downloads 0

How To Cite

Krishan Kumar, Yogesh Kumar, Gaurav Pruthi (2011). A LITERARY REVIEW OF MANET SECURITY PROTOCOLS. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 11(3), 64-68. https://europub.co.uk/articles/-A-87014