A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features for MANET when compared to wired networks. MANET does not have centralized controllers, which makes it different from traditional wireless networks (cellular networks and wireless LAN). An adhoc network is self-organizing and adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it then address the possible solution to protect the security mechanism, which involve Availability, integrity, authentication and non-repudiation. Finally a comparison of various routing protocols in MANETs is presented.
Authors and Affiliations
Shilpa Gambhir, Karishma Bajaj, Shashank Singh
An Improved Load Balancing technique in weighted algorithm for the selection of Cluster Head
Mobile Ad hoc Networks (MANET), is a planned toward oneself system of mobile nodes joined by remote connections. The topology of MANETs is dynamic in nature so to keep up stability a cluster based methodology will be us...
Use of Almond Tree (Terminialia cattapa) Bark Powder for Adsorption of Methylene Blue, a Basic Dye from Aqueous Solutions
dsorption studies of methylene blue (MB) on Almond tree bark powder (ATBP) were carried out by batch experiments. The parameter studied includes initial dye concentration, adsorbent dose, pH, agitation time, agitation s...
Brief Review of De Duplication over Cloud for Optimizing Storage
Cloud storage is one of the services provide in cloud computing which has been increasing in reputation. With the growing data size of cloud computing, a decrease in data volumes could help provider reducing the costs o...
Performance Analysis of Physical Layer of WiMAX 802.16 using 64 QAM
IEEE 802.16 is an emerging technology for the future telecommunication standards. All Communication standards follows the basic OSI model.OSI model have seven layers. Upper layers responsible for user interface and lowe...
Process Parameter Optimization of Electric Discharge Machining By Response Surface Methodology
Electrical Discharge Machining (EDM) is a modern manufacturing process machining process, where electrically conductive material is removed by controlled erosion through a series of electric sparks of short duration and...