A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features for MANET when compared to wired networks. MANET does not have centralized controllers, which makes it different from traditional wireless networks (cellular networks and wireless LAN). An adhoc network is self-organizing and adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it then address the possible solution to protect the security mechanism, which involve Availability, integrity, authentication and non-repudiation. Finally a comparison of various routing protocols in MANETs is presented.
Authors and Affiliations
Shilpa Gambhir, Karishma Bajaj, Shashank Singh
Desulfurization of High-Sulfur Lignites (Çan, Çanakkale-Turkey) by the Meyers Method
The uses of high-sulfur coals in burning processes are limited because of environmental pollution. In the world, the reserves of high quality coal are decreasing as well as Turkey where coal reserves are mainly lignite...
Efficient Data Management in Wireless Sensor Network using Source Location Privacy
Wireless sensor networks (WSNs) have been gained worldwide attention for use in different applications. In this paper we present efficient data gathering technique that assures the Qos and following network performance...
Image De-Blurring and De-Noising using Weiner Filter and Anisotropic Diffusion for Natural Images
The proposed method basically represents how to de-blur and de-noise images using a wiener filter and Anisotropic Diffusion Filter. Basically wiener filter is used to produce an estimate of a desired image or target a r...
Batteryless Mobile using Supercapacitor with Wireless Charging
In the current world of technology, we introduce to many new electronic gadgets. As the rate of population increases the use of this electronic gadgets are also increasing rapidly. All this electronic gadgets are run on...
Behaviour of Soil Reinforced with Plastic Waste
in this paper the study of behaviour of black cotton soil, reinforced with plastic waste is done. Various tests are performed to study the properties of soil, various percentage of plastic waste are added and results ar...