scholarly journals A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network

2016 ◽  
Vol 79 ◽  
pp. 16-23 ◽  
Author(s):  
Ajay Kushwaha ◽  
Hari Ram Sharma ◽  
Asha Ambhaikar

Incessantly a self configuring network for mobile devices known as Mobile Ad hoc Network (MANET) are associated wirelessly .In significant networks, this design might perhaps enforce increased computational costs owing to the costly credentials chaining overheads that would not adapt for ad-hoc applications with increased nodes. Here a survey is carried out to express a view on the secure and authentic MANET systems. The literature reviewed is on different and diverse techniques of related to MANET systems. Reviews of 65 papers is presented and stated the significant analysis. At first the analysis depicts various attacks that are contributed in different papers. Subsequently ,various measures like security, cost, simulation time etc are also analyzed. It analyses the encryption method also that is exploited in each paper. This paper further gives an insight regarding the tools adapted ,chronological review and performance achievements in each case. At the end the review extended for the different research issues to investigate further research on secure and authentic MANET system


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


Sign in / Sign up

Export Citation Format

Share Document