A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)

Abstract

Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features for MANET when compared to wired networks. MANET does not have centralized controllers, which makes it different from traditional wireless networks (cellular networks and wireless LAN). An adhoc network is self-organizing and adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it then address the possible solution to protect the security mechanism, which involve Availability, integrity, authentication and non-repudiation. Finally a comparison of various routing protocols in MANETs is presented.

Authors and Affiliations

Shilpa Gambhir, Karishma Bajaj, Shashank Singh

Keywords

Related Articles

Fair Round Robin: A Low Complexity Packet Scheduler with Proportional and Worst-Case Fairness

Round robin arbiter (RRA) is a critical block in nowadays designs. It is widely found in System-on-chips and Network-on-chips. The need of an efficient RRA has increased extensively as it is a limiting performance block...

Intelligent Train Engine and Running System

This paper is an attempt to improve the currently running railway system by automation of the rail engine and the unmanned railway crossing gates. This system is designed to automatically change speed in accordance to t...

Design and implementation of FPGA control unit for solar Application

Designing photovoltaic systems to maximize the output power Maximum Power Point Tracking (MPPT) is used. The new MPPT system is developed, using DC-DC converter. The design of FPGA control unit which includes the power...

A Study on Job Involvement in the Mitsubishi Heavy Industries India Precision Tools LTD

This project title “A STUDY ON JOB INVOLVEMENT IN THE MITSUBISHI HEAVY INDUSTRIES INDIA PRECISION TOOLS LTD” is conducted to focus on how they are satisfied towards the job based on motivation. The main objective of th...

Bio Mathematical Model to Find the Gallbladder Contraction Outcomes Using Normal Distribution

The cholecystokinin (CCK) is a 33 amino acid polypeptide. The C-terminal octapeptide fragment (OP-CCK) reproduces all the known biologic activities of the intact molecule. The purpose of this study was to determine the...

Download PDF file
  • EP ID EP21456
  • DOI -
  • Views 284
  • Downloads 3

How To Cite

Shilpa Gambhir, Karishma Bajaj, Shashank Singh (2015). A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs). International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(12), -. https://europub.co.uk/articles/-A-21456