A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features for MANET when compared to wired networks. MANET does not have centralized controllers, which makes it different from traditional wireless networks (cellular networks and wireless LAN). An adhoc network is self-organizing and adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it then address the possible solution to protect the security mechanism, which involve Availability, integrity, authentication and non-repudiation. Finally a comparison of various routing protocols in MANETs is presented.
Authors and Affiliations
Shilpa Gambhir, Karishma Bajaj, Shashank Singh
A Novel Approach to Increase the Embedding Capacity in Digital Watermarking Using DWI-IWT
watermarking is a development that supplements cryptography by embeddings impalpable flags in work. Information covering strategies have starting late ended up being imperative in different application zones. Propelled...
Fingerprint Compression Based On Online Dictionary Learning and Orthogonal Matching Pursuit
A new fingerprint compression technique based on the concept of sparse representation is introduced. Given a set of fingerprint patches, an over complete dictionary is constructed and the patches are represented as a sp...
Study of Ethanol – Gasoline Blends for Powering Medium–Duty Transportation SI Engine
As a lucrative fuel gasoline is widely consumed in country like India whose economy is very rapidly increasing. With the rapidly growing economy, demand is also going up sharply which is resulting in increased level of...
Rapid Detection of Duplicates by Comparing the Records
Duplicate detection is the procedure to identify various identical real world entities. Duplicate detection methods needs larger datasets to be processed in shorter time: to maintain the excellence of a dataset become d...
Review Paper on Data Access Control using CPABE for Multi-Authority Cloud Storage System
Cloud computing is the system on which we can store data over a network and easily access it from anywhere. But in the case of public cloud storage systems, access control is a most concerning issue[4]. Cipher-text-Poli...