A Study on Vulnerabilities, Applications, Advantages and Routing Protocols in MANET

Authors(1) :-Sugandhi Maheshwaram

In wired networks; we have actually firewall programs as well as safeguarded portals as a defense system for safe interaction. In the situation of wireless Mobile Ad-hoc networks (MANET), the nodes are self- arranging, framework much less, vibrant geography and also no central authority. A Mobile Adhoc Network (MANET) is a contenting collection of mobile phones, the cordless network can reconfigure on its own contending team of mobile phones. This network can function with no set framework, the nodes in the networks function as a router along with the host. This paper gives understanding a detailed review of Mobile Impromptu networks. This paper additionally evaluates the different features, difficulties, applications of MANETS. In addition, the routing method for MANET has actually existed in this paper. Each mobile node is cost-free to relocate separately in any kind of instructions as well as transforms its web link to various other tools often. In this paper, we review different susceptibilities, applications, benefits, as well as routing protocols in MANET.

Authors and Affiliations

Sugandhi Maheshwaram
Senior Full Stack Developer, National Association of Insurance Commissioners (NAIC), Kansas City, Kansas

Routing Protocols, Mobile Ad-Hoc Networks, ZRP

  1. Priyanka Goyal, Vinti Parmar, Rahul Rishi “ MANET: Vulnerabilities, Challenges, Attacks, Application” in proceedings of IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
  2. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani “A Survey of Secure Mobile Ad Hoc Routing Protocols” in proceedings of IEEE communications surveys & tutorials, vol. 10, no. 4, fourth quarter 2008.
  3. Yau P.-W., Mitchell C.J., “Security Vulnerabilities in Ad Hoc Networks”, In Proc. of the 7th Int. Symp. on Communications Theory and Applications, pp. 99-104, 2003.
  4. HumayunBakht, “Survey of Routing Protocols for Mobile Ad- hoc Network”, International Journal of Information and Communication Technology Research, 258-270, October 2011.
  5. Mohit Kumar and Rashmi Mishra “An Overview of MANET: History, Challenges and Applications” , Indian Journal of Computer Science and Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
  6. C. Perkins, E. Belding-Royer and S. Das, “Ad-Hoc On-Demand Distance Vector (AODV) Routing”, RFC3561, July 2003
  7. Naveen Bilandi and Harsh K Verma “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET” International Journal of Electronics and Computer Science Engineering 1660 ISSN- 2277-1956.
  8. Perkins CE, Bhagwat P (1994) Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers. Proceedings of ACM SIGCOMM 1994:234–244.
  9. Cheng C, Riley R, Kumar SPR, Garcia-Luna-Aceves JJ (1989) A Loop-Free Extended Bellman- Ford Routing Protocol Without Bouncing Effect. ACM SIGCOMM Computer Communications Review, Volume 19, Issue 4:224–236

Publication Details

Published in : Volume 4 | Issue 2 | January-February 2018
Date of Publication : 2017-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1904-1908
Manuscript Number : IJSRST196318
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Sugandhi Maheshwaram, " A Study on Vulnerabilities, Applications, Advantages and Routing Protocols in MANET", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 2, pp.1904-1908, January-February-2018.
Journal URL : https://ijsrst.com/IJSRST196318
Citation Detection and Elimination     |      | | BibTeX | RIS | CSV

Article Preview