scholarly journals A Review on CBDS in MANET

2017 ◽  
Author(s):  
Navdeep Kaur

Security is an important issue in the integrated MANET-Internet environment because in this environment we have to consider the attacks on Internet connectivity and also on the ad-hoc routing protocols. The focus of this work is on different types of attacks on integrated MANET-Internet communication. We consider most common types of attacks on mobile ad-hoc networks and on access point through which MANET is connected to the Internet.

Author(s):  
Chi-Kin Chau ◽  
Jon Crowcroft ◽  
Kang-Won Lee ◽  
Starsky H.Y. Wong

Because of the increasing number of diverse routing protocols proposed to deal with the network dynamics in mobile ad hoc networks (MANETs), the heterogeneity of MANETs has increased dramatically. While many of these extant proposals only concern enhancing routing in a single domain, little attention has been given to the interoperations among heterogeneous MANETs. Moreover, the existing inter-domain routing protocols (i.e., BGP) that have been designed for the Internet cannot cope with the new challenges derived from the MANETs, such as (1) the rapid dynamic changes of network topology due to mobility, and (2) the larger diversity in intra-domain ad hoc routing protocols. In this chapter, the authors address some of the major challenges and identify new directions to the development of seamless inter-domain routing for enabling end-to-end communications over heterogeneous MANET domains.


Author(s):  
Lalitsen Sharma ◽  
Supriya Gupta

The mobility of nodes in mobile ad hoc networks and absence of any centralized control cause unpredictable changes in the network topologies. This makes routing a challenging task. Several routing protocols for mobile ad-hoc networks have come into existence. The protocols are classified in mainly in three categories: proactive, reactive, and hybrid. In this chapter, a study of one of each of the proactive and reactive protocols (respectively, Destination Sequence Distance Vector routing [DSDV], and Dynamic Source Routing [DSR]) is presented. The performance of above said protocols has been measured under varying mobility environment using NS-2 simulator based upon three quality metrics: average end-to-end delay, throughput, and jitter.


2019 ◽  
Vol 3 (2) ◽  
pp. 32-40 ◽  
Author(s):  
Mohammad Riyaz Belgaum ◽  
Shahrulniza Musa ◽  
Mazliham MohdSu’ud ◽  
Muhammad Alam ◽  
Safeeullah Soomro ◽  
...  

Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput.


2011 ◽  
Vol 3 (1) ◽  
pp. 98-106 ◽  
Author(s):  
P Manickam ◽  
T Guru Baskar ◽  
M Girija ◽  
D Manimegalai

Sign in / Sign up

Export Citation Format

Share Document