Mobile Ad Hoc Networks Challenges
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Now adays Mobile Ad Hoc Networks are becoming a major immerging technology in mobile computing. In this paper we focus on the evolution of the MANET, the challenges in it and a wide area of its applications. In the first section we provide a brief information about the history and evolution of MANET , next to it we discuss the major challenges in Mobile Ad Hoc Networks and towards the end we mentioned some of the application of MANET.
Authors and Affiliations
Inam Ullah Khan| Isra University, Islamabad Campus, School of Engineering and Applied Sciences (SEAS), inamullahkhan05@gmail.com, Faheem Numan| Abdul Wali Khan University, Shankar Campus, Mardan (AWKUM), faheemnuman@gmail.com, Shaheen Ahmad| Abdul Wali Khan University, Shankar Campus, Mardan (AWKUM), shaheenahmad281@gmail.com
Cryptography Based on DNA Using Random key Generation Scheme
With the growth of technological advancements, the threats dealt by a user grow exponentially. The 21st century is a period of information explosion in which information has become a very important strategic resource...
Twitter has drew a large number of users to share and disperse most onward data, bringing about large volumes of information produced systematic. In any case, various applications in Information Retrieval (IR) and Na...
A Novel DNA Encryption Technique Using Efficient Key Generation Method For Secure Data
Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers....
Two Efficient Outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient Outsourced Verifying Protocol
Attribute-based signature (ABS) facilitates revelry to mark a message with fine-grained access control over make out information. Particularly, in an ABS system, users get hold of their attribute private keys from an...
A New Technique For Authenticating Short Encrypted Messages
The best MACs in the cryptographic narrative are based on universal hashing. The major cause following the presentation benefit of worldwide hashing-based MACs is the fact that dispensation messages block by block by...