Study of Routing in Ad hoc network

Authors

  • Pradeep Chouksey CSE Dept. Technocrats Institute of Technology, RGT University, Bhopal, India

Keywords:

MANETs, Topology, Routing Protocols

Abstract

Every network performs routing of packets which is the basic function of the network. Routing algorithms have to take the decision that whom to forward the packet. Number of hops is used to take the decision. Routers are generally used in wired networks and the reason is that routers are more powerful than a normal host. Router keeps the next hop for every destination on the basis of the best metric value for this purpose router maintains routing table.

 

References

Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.

Yu-seung Kim, Heejo Lee, “On classifying and evaluating the effect of jamming attack”.

Ali Hamieh, Jalel Ben-Othman., “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013

IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003.

Broch,J., A.M David and B. David, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97. 1998.

M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, , pp. 248-263. 2000.

E. M. Royer and C-K Toh , “A review of Current routing protocols for Ad Hoc Mobile Wireless”.

Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire”.

D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Ed., pp. 153-81. Kluwer, 1996.

Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks”,IEEE Personal Communication magazine pp:46-55. 1999.

M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network”, Ericsson Review,No.4, pp. 248-263. 2000.

Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200

Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012, pp.269-275.

Mr. Vinod Mahor M.Tech Scholar , Information Technology,Mr. Sandeep Raghuwanshi, “Taguchi’s Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT , Tiruchengode, India. - July 4-6, 2013

Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood., “The feasibility of launching and detecting jamming attacks in wireless networks”.

John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.” pp.1-6, IEEE 2007.

Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.

Downloads

Published

2017-05-30

How to Cite

[1]
P. Chouksey, “Study of Routing in Ad hoc network”, Int. J. Sci. Res. Net. Sec. Comm., vol. 5, no. 2, pp. 55–57, May 2017.

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 

You may also start an advanced similarity search for this article.