Introduction of MANET

Authors

  • Pradeep Chouksey Department of Computer Science, Technocrats Institute of Technology, Bhopal, India

Keywords:

MANET, Internet, VANETs, Internal and External Attacks

Abstract

Mobile Ad Hoc Networks (MANETs) has become one of the most prevalent areas of research in the recent years. MANET is the new emerging technology in which users can communicate without any physical infrastructure regardless of their geographical location. This is the reasion why MANET is sometimes referred to as “infrastructure less network”. It is self organizing and adaptive. Ad hoc networking allows the devices to maintain connections to the network. It is easy to adding and removing devices to and from the network , but the network topology may change rapidly and unpredictably over time due to nodal mobility. Message routing is a problem in a decentralize environment where the topology fluctuates . It is a collection of independent mobile nodes, these nodes can communicate to each other via radio waves. Some of the mobile nodes are in radio range these nodes can directly communicate, whereas others needs the aid of intermediate nodes so that they can route their packets. For maintaining communication among different nodes each of the node has a wireless interface.

 

References

Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.

Yu-seung Kim, Heejo Lee., “On classifying and evaluating the effect of jamming attack.”

Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using errordistribution.”, p.p.1-6,IEEE 2009.

Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013

IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003

Broch,J., A.M David and B. David,1998, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97.

M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, 2000, pp. 248-263.

E. M. Royer and C-K Toh, “A review of Current routing protocols for Ad Hoc Mobile Wireless.”

Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire.”

D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Network‖ Mobile Computing”, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.

Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks.” IEEE Personal Communication magazine pp:46-55. 1999

M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, 2000, pp. 248-263.

Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200

M. Kumar, T. Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.71-75, 2014.

Vinod Mahor, Sandeep Raghuwanshi, “Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT - 2013 July 4-6, 2013, Tiruchengode, India.

Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood. “The feasibility of launching and detectingjamming attacks in wireless networks.”

John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.”, pp.1-6, IEEE 2007.

Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Downloads

Published

2016-04-30

How to Cite

[1]
P. Chouksey, “Introduction of MANET”, Int. J. Sci. Res. Net. Sec. Comm., vol. 4, no. 2, pp. 15–19, Apr. 2016.

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.