CFP last date
20 December 2024
Reseach Article

Mobile Ad Hoc Networks-A Holistic Overview

by Ritika Sharma, Minakshi Halder, Kamlesh Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 21
Year of Publication: 2012
Authors: Ritika Sharma, Minakshi Halder, Kamlesh Gupta
10.5120/8336-1932

Ritika Sharma, Minakshi Halder, Kamlesh Gupta . Mobile Ad Hoc Networks-A Holistic Overview. International Journal of Computer Applications. 52, 21 ( August 2012), 31-36. DOI=10.5120/8336-1932

@article{ 10.5120/8336-1932,
author = { Ritika Sharma, Minakshi Halder, Kamlesh Gupta },
title = { Mobile Ad Hoc Networks-A Holistic Overview },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 21 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number21/8336-1932/ },
doi = { 10.5120/8336-1932 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:52:52.268805+05:30
%A Ritika Sharma
%A Minakshi Halder
%A Kamlesh Gupta
%T Mobile Ad Hoc Networks-A Holistic Overview
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 21
%P 31-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks (MANET) comprise mobile devices to form an ad hoc network for some ad hoc purpose. So, this special feature of a MANET allows it to be the most demanding technology amongst the users, and the most concerned topic of research in the field of wireless networks. Following the latest trends of research in the field of wireless communication, this paper attempts to focus on some growing issues in MANETs. Security, one of the most important aspects of communication, which faces severe challenges due to various constraints imposed by MANET, is discussed in this paper including vulnerabilities, attacks, various security goals and the applications of MANET. Along with the security, it also describes the routing protocols and the related work that has already been done in this field.

References
  1. Pradip M, Jawandhiya, Mangesh M Ghonge, Dr. M S Ali, "A Survey of Mobile A d Hoc Network Attacks", International Journal of Engineering Science and Technology, Vol. 02, 2010, 4063-4071. .
  2. Imrich Chlamtac, Marco Conti, Jennifer J-N Liu, "Mobile Ad Hoc Networking-Imperatives and Challenges", Elsevier, 2003, 13-64.
  3. Vikas Solomon Abel. "Survey of Attacks on Mobile Ad Hoc Networks", International Journal on Computer Science and Engineering, Vol. 03, No. 02, February 2011, 826-829.
  4. Shalini Jain, Dr. Satbir Jain, "Detection and Prevention of Wormhole Attack in Mobile Ad Hoc Network", International Journal of Computer Theory and Engineering, Vol. 2, No. 1, Feb 2010, 78-86.
  5. Panagiotis Papadimitratos and Zugmunt J. Haas, "Secure routing for Mobile Ad Hoc Networks", In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS-2002), San Antonio, TX, January 27-31, 2002.
  6. Priyanka Goyal, Vinti Parmar, Rahul Rishi, "MANET: Vulnerabilities, Challenges, Attacks, Applications", International Journal of Computational Engineering & Management, Vol. 11, January 2011, 32-37.
  7. A Rahim, I Ahmed, Z S Khan, M Sher, M Shoaib, A Javed, R Mahmood, "A Comparative Study of Mobile and Vehicular Ad Hoc Networks", International Journal of Recent Trends in Engineering, Vol. 02, No. 04, November 2009. 195-197.
  8. Hongmei Deng Weiji, and Dharma P Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Magazine, October 2002, 70-75.
  9. Wenjia Li and Anupam Joshi, "Security Issues in Mobile Ad Hoc Networks-A Survey", Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 1-23.
  10. Po- Wah Yau and Chris J. Mitchell, "Security of Attacks on Mobile Ad Hoc Wireless Networks", Information Security Group, University of London.
  11. Sunil Taneja and Ashwani Kush, "A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Innovation, Management and Technology, Vol. 01, No. 03, August 2010, 279-285.
  12. GS. Mamatha and Dr. S. C. Sharma, "Analyzing MANET Variations, Challenges, Capacity and Protocol Issues", International Journal of Computer Science and Engineering Survey (IJCSES), Vol. 1, No. 1, August 2010, 14-21.
  13. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, "A Survey of Blackhole Attacks in Wireless Mobile Ad hoc Networks", Human-Centric Computing and Information Sciences (a Springer journal), 2011, 1-16.
  14. Jiazi YI, "A Survey on the Applications of MANET", Polytech' Nantes, February 2008.
  15. G. Vijaya Kumar, Y Vasudev Reddyr, Dr. M. Nagendra, "Current Research Work on Routing Protocols for MANET: A Literature Survey", International Journal on Computer Science and Engineering, Vol. 02, No. 03, 2010, 706-713.
  16. Priyanka Goyal, Sahil Batra, Ajit Singh, "A Literature Review of Security Attacks in Mobile Ad-Hoc Networks", International Journal of Computer Applications, Vol. 09-No. 12, November 2010, 11-15.
  17. Nishu Garg, R. P. Mahapatra, "MANET Security Issues", International Journal of Computer Science and Network Security", Vol. 09, No. 08, August 2009, 241-246.
  18. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshika Nemoto, and Nei Kato, "A Survey of Routing Attacks in Mobile Ad hoc Networka", IEEE wireless communications, October 2007, 85-91.
  19. Jun-Zhao Sun, "Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing", Info-Tech and Info-net, 2001. Proceedings. ICII 2001- Beijing. 2001 International conference, 2001, Vol. No. 03, 316-321.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Wireless Networks Ad hoc Networking Routing Protocol