Full Paper View Go Back

Introduction of MANET

Pradeep Chouksey1

1 Department of Computer Science, Technocrats Institute of Technology, Bhopal, India.

Correspondence should be addressed to: dr.pradeep.chouksey@gmail.com.


Section:Review Paper, Product Type: Journal
Vol.4 , Issue.2 , pp.15-19, Apr-2016

Online published on Apr 27, 2016


Copyright © Pradeep Chouksey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pradeep Chouksey, “Introduction of MANET,” International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.2, pp.15-19, 2016.

MLA Style Citation: Pradeep Chouksey "Introduction of MANET." International Journal of Scientific Research in Network Security and Communication 4.2 (2016): 15-19.

APA Style Citation: Pradeep Chouksey, (2016). Introduction of MANET. International Journal of Scientific Research in Network Security and Communication, 4(2), 15-19.

BibTex Style Citation:
@article{Chouksey_2016,
author = {Pradeep Chouksey},
title = {Introduction of MANET},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2016},
volume = {4},
Issue = {2},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {15-19},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=301},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=301
TI - Introduction of MANET
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pradeep Chouksey
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 15-19
IS - 2
VL - 4
SN - 2347-2693
ER -

2885 Views    1525 Downloads    1345 Downloads
  
  

Abstract :
Mobile Ad Hoc Networks (MANETs) has become one of the most prevalent areas of research in the recent years. MANET is the new emerging technology in which users can communicate without any physical infrastructure regardless of their geographical location. This is the reasion why MANET is sometimes referred to as “infrastructure less network”. It is self organizing and adaptive. Ad hoc networking allows the devices to maintain connections to the network. It is easy to adding and removing devices to and from the network , but the network topology may change rapidly and unpredictably over time due to nodal mobility. Message routing is a problem in a decentralize environment where the topology fluctuates . It is a collection of independent mobile nodes, these nodes can communicate to each other via radio waves. Some of the mobile nodes are in radio range these nodes can directly communicate, whereas others needs the aid of intermediate nodes so that they can route their packets. For maintaining communication among different nodes each of the node has a wireless interface.

Key-Words / Index Term :
MANET, Internet, VANETs, Internal and External Attacks

References :
[1] Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.
[2] Yu-seung Kim, Heejo Lee., “On classifying and evaluating the effect of jamming attack.”
[3] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using errordistribution.”, p.p.1-6,IEEE 2009.
[4] Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013
[5] IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003
[6] Broch,J., A.M David and B. David,1998, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97.
[7] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, 2000, pp. 248-263.
[8] E. M. Royer and C-K Toh, “A review of Current routing protocols for Ad Hoc Mobile Wireless.”
[9] Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire.”
[10] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Network‖ Mobile Computing”, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
[11] Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks.” IEEE Personal Communication magazine pp:46-55. 1999
[12] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, 2000, pp. 248-263.
[13] Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200
[14] M. Kumar, T. Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.71-75, 2014.
[15] Vinod Mahor, Sandeep Raghuwanshi, “Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT - 2013 July 4-6, 2013, Tiruchengode, India.
[16] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
[17] Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood. “The feasibility of launching and detectingjamming attacks in wireless networks.”
[18] John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.”, pp.1-6, IEEE 2007.
[19] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation