Full Paper View Go Back
Study of Routing in Ad hoc network
Pradeep Chouksey1
1 Department of Computer Science, TIT, Bhopal, India.
Correspondence should be addressed to: dr.pradeep.chouksey@gmail.com.
Section:Review Paper, Product Type: Journal
Vol.5 ,
Issue.2 , pp.55-57, May-2017
Online published on May 31, 2017
Copyright © Pradeep Chouksey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Pradeep Chouksey, “Study of Routing in Ad hoc network,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.55-57, 2017.
MLA Style Citation: Pradeep Chouksey "Study of Routing in Ad hoc network." International Journal of Scientific Research in Network Security and Communication 5.2 (2017): 55-57.
APA Style Citation: Pradeep Chouksey, (2017). Study of Routing in Ad hoc network. International Journal of Scientific Research in Network Security and Communication, 5(2), 55-57.
BibTex Style Citation:
@article{Chouksey_2017,
author = {Pradeep Chouksey},
title = {Study of Routing in Ad hoc network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {5 2017},
volume = {5},
Issue = {2},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {55-57},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=304},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=304
TI - Study of Routing in Ad hoc network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pradeep Chouksey
PY - 2017
DA - 2017/05/31
PB - IJCSE, Indore, INDIA
SP - 55-57
IS - 2
VL - 5
SN - 2347-2693
ER -
Abstract :
Every network performs routing of packets which is the basic function of the network. Routing algorithms have to take the decision that whom to forward the packet. Number of hops is used to take the decision. Routers are generally used in wired networks and the reason is that routers are more powerful than a normal host. Router keeps the next hop for every destination on the basis of the best metric value for this purpose router maintains routing table.
Key-Words / Index Term :
MANETs, Topology, Routing Protocols,
References :
[1] Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.
[2] Yu-seung Kim, Heejo Lee, “On classifying and evaluating the effect of jamming attack”.
[3] Ali Hamieh, Jalel Ben-Othman., “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
[4] Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013
[5] IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003.
[6] Broch,J., A.M David and B. David, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97. 1998.
[7] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, , pp. 248-263. 2000.
[8] E. M. Royer and C-K Toh , “A review of Current routing protocols for Ad Hoc Mobile Wireless”.
[9] Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire”.
[10] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Ed., pp. 153-81. Kluwer, 1996.
[11] Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks”,IEEE Personal Communication magazine pp:46-55. 1999.
[12] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network”, Ericsson Review,No.4, pp. 248-263. 2000.
[13] Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200
[14] Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012, pp.269-275.
[15] Mr. Vinod Mahor M.Tech Scholar , Information Technology,Mr. Sandeep Raghuwanshi, “Taguchi’s Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT , Tiruchengode, India. - July 4-6, 2013
[16] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
[17] Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood., “The feasibility of launching and detecting jamming attacks in wireless networks”.
[18] John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.” pp.1-6, IEEE 2007.
[19] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.