CFP last date
20 December 2024
Reseach Article

An Overview on MANET- Advantages, Characteristics and Security Attacks

Published on September 2016 by Prabhleen Kaur, Sukhman
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2016 - Number 1
September 2016
Authors: Prabhleen Kaur, Sukhman
5c8a9e43-f2bb-48f7-b06f-828dc42810f9

Prabhleen Kaur, Sukhman . An Overview on MANET- Advantages, Characteristics and Security Attacks. International Conference on Advances in Emerging Technology. ICAET2016, 1 (September 2016), 6-9.

@article{
author = { Prabhleen Kaur, Sukhman },
title = { An Overview on MANET- Advantages, Characteristics and Security Attacks },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { September 2016 },
volume = { ICAET2016 },
number = { 1 },
month = { September },
year = { 2016 },
issn = 0975-8887,
pages = { 6-9 },
numpages = 4,
url = { /proceedings/icaet2016/number1/25876-t018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Prabhleen Kaur
%A Sukhman
%T An Overview on MANET- Advantages, Characteristics and Security Attacks
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2016
%N 1
%P 6-9
%D 2016
%I International Journal of Computer Applications
Abstract

Wireless technology has brought a very advance change in the field of internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) that makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network. It consists of collection of wireless mobile nodes, and the communication between these nodes has carried out without any centralized authority. In this paper the discussion has been carried on the characteristics, challenges, applications, security goals and different types of security attacks of MANET.

References
  1. Dhenakaran S. S (Dr. ), ICARCSSE, "An Overview of Routing Protocols in Mobile Ad-Hoc Network", Vol. 3, Issue: 2, ISSN: 2277-128X, pp: 251-259 (2013).
  2. Bakshi Aditya et. al, IJITEE, "Significance of Mobile Ad-Hoc Network (MANET)", Vol. 2, Issue: 4, ISSN: 2278-3075 (2013).
  3. Sekhar Chandra P. et. al, IJCTA, "A Survey on MANET Securing Challenges and Routing Protocols", Vol. 4 (2), ISSN: 2229-6093, pp: 248-256 (2013).
  4. Aarti, IJARCSSE, "Study of MANET: Characteristic, Challenges, Applications and Security Attacks", Vol. 3, Issue: 5, ISSN: 2277-128X, pp: 252-257 (2013).
  5. Bansal Ekta, "Improving Performance of AODV Using ANT Agents" (2013).
  6. Bang O. Ankur et. al, IJAIEM, "MANET: History, Challenges and Applications", Vol. 2, Issue 9, ISSN: 2319-4847, pp: 249-251 (2013).
  7. Kaur Harjeet et. al, IJCSIT, "A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review", Vol. 4 (3), ISSN: 0975-9646, pp: 498-500 (2013).
  8. Kumar Mohit et. al, IJCSE, "An Overview of MANET: History, Challenges and Application", Vol. 3 No. 1, ISSN: 0976-5166, pp: 121-125 (2012).
  9. Goyal Priyanka et. al, IJCEM, "MANET: Vulnerabilities, Challenges, Attacks and Applications", Vol. 11, ISSN: 2230-7893, pp: 32-37 (2011).
  10. Ghosekar Pravin et. al, IJCA, "Mobile Ad-Hoc Networking: Imperatives and Challenges", pp: 153-158 (2010).
  11. Gorantala Krishna, "Routing Protocols in Mobile Ad-Hoc Network" (2006).
Index Terms

Computer Science
Information Sciences

Keywords

Manet Routing Protocols Of Manet Attacks In Manet.