scholarly journals Mobile ad-hoc network data communication in large geographic areas

Author(s):  
L.D. Fife ◽  
Le Gruenwald
Author(s):  
U Kumaran ◽  
A Ramachandran ◽  
J Jegan ◽  
E.K. Subramanian

<p>A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network).  Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms to understand the strengths &amp; threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks. The methodology of honeypot detects and isolates the attacks of the black hole. The results prove better delivery of packets with decreased load of the network.</p>


2019 ◽  
Vol 16 (9) ◽  
pp. 3835-3839
Author(s):  
Nippun Kamboj ◽  
Dalip ◽  
Munishwar Rai

In modern era, MANET i.e., Mobile Ad-hoc Network is a very powerful, interactive tool and useful resource for transmission/communication in computer networks. About composition of MANET, a collection of mobile nodes have the potential of creating self-maintaining and self-configurable network without having any centralized infrastructure i.e., MANET is a self-organized network without any infrastructure. Nodes in the network require energy for transmission of data after collapse of energy a node become inactive and it can’t participate in the communication. Due to exhaustation of energy the network becomes unstable. An unstable network requires extra routing process for coin out a route. In future security of MANET is a major challenge for smooth and efficient data communication. There are many protocols in MANET but in this paper, we discussed AODV routing protocol for data communication. In this paper a new algorithm is designed i.e., modified AODV with security constraint. This paper also gives the comparative study of original AODV and modified AODV.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document