Study of Routing in Ad hoc network
Keywords:
MANETs, Topology, Routing ProtocolsAbstract
Every network performs routing of packets which is the basic function of the network. Routing algorithms have to take the decision that whom to forward the packet. Number of hops is used to take the decision. Routers are generally used in wired networks and the reason is that routers are more powerful than a normal host. Router keeps the next hop for every destination on the basis of the best metric value for this purpose router maintains routing table.
References
Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.
Yu-seung Kim, Heejo Lee, “On classifying and evaluating the effect of jamming attack”.
Ali Hamieh, Jalel Ben-Othman., “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013
IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003.
Broch,J., A.M David and B. David, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97. 1998.
M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, , pp. 248-263. 2000.
E. M. Royer and C-K Toh , “A review of Current routing protocols for Ad Hoc Mobile Wireless”.
Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire”.
D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Ed., pp. 153-81. Kluwer, 1996.
Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks”,IEEE Personal Communication magazine pp:46-55. 1999.
M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network”, Ericsson Review,No.4, pp. 248-263. 2000.
Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200
Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012, pp.269-275.
Mr. Vinod Mahor M.Tech Scholar , Information Technology,Mr. Sandeep Raghuwanshi, “Taguchi’s Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT , Tiruchengode, India. - July 4-6, 2013
Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood., “The feasibility of launching and detecting jamming attacks in wireless networks”.
John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.” pp.1-6, IEEE 2007.
Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.