Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

MANET: Security Issues

Author : Prashant Johri 1

Date of Publication :20th November 2017

Abstract: MANET stands for "Mobile Ad Hoc Network." Mobile ad hoc network (MANET) is an independent mobile node device that is linked via wireless connections. Every node not only acts as an end system but also as a packet forwarding router. The nodes are free to move and combine into a network. Such nodes frequently change location. A MANET is a kind of ad hoc network capable of swapping positions and configuring itself on the move. Because MANETS are mobile, special routing algorithms are needed to accommodate the changing topology by using wireless connections to connect to different networks. There is no single protocol that fits perfectly with all the networks. The protocols must be selected on the basis of network features, such as distance, scale and node stability. Work on mobile ad hoc networks is still underway, and work will contribute to even improved protocols, and will likely face new challenges. The paper's main goal is to find out about the security issues and their countermeasures implemented on the Network Layer.

Reference :

    1. M. Conti and S. Giordano, “Mobile ad hoc networking: Milestones, challenges, and new research directions,” IEEE Commun. Mag., 2014, doi: 10.1109/MCOM.2014.6710069.
    2. S. Al-Sultan, M. M. Al-Doori, A. H. AlBayatti, and H. Zedan, “A comprehensive survey on vehicular Ad Hoc network,” Journal of Network and Computer Applications. 2014, doi: 10.1016/j.jnca.2013.02.036.
    3. P. Goyal, V. Parmar, and R. Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application,” IJCEM Int. J. Comput. Eng. Manag. ISSN, 2011.
    4. A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., 2015, doi: 10.5121/ijcses.2015.6102.
    5. P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT urban scenarios,” IEEE Sens. J., 2013, doi: 10.1109/JSEN.2013.2272099.
    6. M. Conti et al., “From MANET to peoplecentric networking: Milestones and open research challenges,” Comput. Commun., 2015, doi: 10.1016/j.comcom.2015.09.007.
    7. M. Sadeghi and S. Yahya, “Analysis of Wormhole attack on MANETs using different MANET routing protocols,” 2012, doi: 10.1109/ICUFN.2012.6261716.
    8. A. Hinds, M. Ngulube, S. Zhu, and H. AlAqrabi, “A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET),” Int. J. Inf. Educ. Technol., 2013, doi: 10.7763/ijiet.2013.v3.223.
    9. J. Whitbeck and V. Conan, “HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks,” Comput. Commun., 2010, doi: 10.1016/j.comcom.2010.03.005.

Recent Article