Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

An Overview on MANET- Advantages, Characteristics and Security Attacks

Print
PDF
IJCA Proceedings on International Conference on Advances in Emerging Technology
© 2016 by IJCA Journal
ICAET 2016 - Number 1
Year of Publication: 2016
Authors:
Prabhleen Kaur
Sukhman

Prabhleen Kaur and Sukhman. Article: An Overview on MANET- Advantages, Characteristics and Security Attacks. IJCA Proceedings on International Conference on Advances in Emerging Technology ICAET 2016(1):6-9, September 2016. Full text available. BibTeX

@article{key:article,
	author = {Prabhleen Kaur and Sukhman},
	title = {Article: An Overview on MANET- Advantages, Characteristics and Security Attacks},
	journal = {IJCA Proceedings on International Conference on Advances in Emerging Technology},
	year = {2016},
	volume = {ICAET 2016},
	number = {1},
	pages = {6-9},
	month = {September},
	note = {Full text available}
}

Abstract

Wireless technology has brought a very advance change in the field of internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) that makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network. It consists of collection of wireless mobile nodes, and the communication between these nodes has carried out without any centralized authority. In this paper the discussion has been carried on the characteristics, challenges, applications, security goals and different types of security attacks of MANET.

References

  • Dhenakaran S. S (Dr. ), ICARCSSE, "An Overview of Routing Protocols in Mobile Ad-Hoc Network", Vol. 3, Issue: 2, ISSN: 2277-128X, pp: 251-259 (2013).
  • Bakshi Aditya et. al, IJITEE, "Significance of Mobile Ad-Hoc Network (MANET)", Vol. 2, Issue: 4, ISSN: 2278-3075 (2013).
  • Sekhar Chandra P. et. al, IJCTA, "A Survey on MANET Securing Challenges and Routing Protocols", Vol. 4 (2), ISSN: 2229-6093, pp: 248-256 (2013).
  • Aarti, IJARCSSE, "Study of MANET: Characteristic, Challenges, Applications and Security Attacks", Vol. 3, Issue: 5, ISSN: 2277-128X, pp: 252-257 (2013).
  • Bansal Ekta, "Improving Performance of AODV Using ANT Agents" (2013).
  • Bang O. Ankur et. al, IJAIEM, "MANET: History, Challenges and Applications", Vol. 2, Issue 9, ISSN: 2319-4847, pp: 249-251 (2013).
  • Kaur Harjeet et. al, IJCSIT, "A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review", Vol. 4 (3), ISSN: 0975-9646, pp: 498-500 (2013).
  • Kumar Mohit et. al, IJCSE, "An Overview of MANET: History, Challenges and Application", Vol. 3 No. 1, ISSN: 0976-5166, pp: 121-125 (2012).
  • Goyal Priyanka et. al, IJCEM, "MANET: Vulnerabilities, Challenges, Attacks and Applications", Vol. 11, ISSN: 2230-7893, pp: 32-37 (2011).
  • Ghosekar Pravin et. al, IJCA, "Mobile Ad-Hoc Networking: Imperatives and Challenges", pp: 153-158 (2010).
  • Gorantala Krishna, "Routing Protocols in Mobile Ad-Hoc Network" (2006).