To see the other types of publications on this topic, follow the link: MANET Issues.

Journal articles on the topic 'MANET Issues'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MANET Issues.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.

Full text
Abstract:
Mobile Ad hoc Networks are widely used in defense applications where traditional wireless network is difficult to implement as the network is formed by autonomous and decentralized wireless nodes. Privacy and Security in MANET are the most important disquiet for basic functionality of the network. Security is the major challenge in MANETs because of its characteristics like resource constraints, open medium, lack of fixed infrastructure, dynamism of topology and no clear security mechanism. As the topology is dynamic, routing process is very difficult. So MANET often suffers from routing attac
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.

Full text
Abstract:
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited battery power, mobility, dynamic topology, open media, and so on. Numerous MANET-related a
APA, Harvard, Vancouver, ISO, and other styles
3

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the securi
APA, Harvard, Vancouver, ISO, and other styles
4

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-rec
APA, Harvard, Vancouver, ISO, and other styles
5

Swain, Jhum, Binod Kumar Pattanayak, and Bibudhendu Pati. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks." International Journal of Information Security and Privacy 12, no. 2 (2018): 38–45. http://dx.doi.org/10.4018/ijisp.2018040103.

Full text
Abstract:
A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysi
APA, Harvard, Vancouver, ISO, and other styles
6

Jangra, Dr Banta Singh, and Manish Kumar Naga. "Study on Security Issues & Challenges in MANET." Paripex - Indian Journal Of Research 3, no. 4 (2012): 54–57. http://dx.doi.org/10.15373/22501991/apr2014/16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Velagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.

Full text
Abstract:
A MANET can be treated as a network in which the nodes have the capability of self-configuring among themselves. These nodes are connected by wireless links to form an distributed topology without the help of any pre-existing infrastructure. Each node in a MANET can itself act as a router on its own. To perform effective routing operation in MANETS , several routing protocols were proposed, addressing several issues in MANETS. In this paper ,we tried to study the operation of DSDV protocol ,which is a proactive protocol and analyse the results obtained by simualting the DSDV protocol using NS-
APA, Harvard, Vancouver, ISO, and other styles
8

Goyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.

Full text
Abstract:
In this paper, we perform rigorous analysis of MANET routing protocols selected from different categories over various scenarios using a large set of performance evaluation metrics. The traffic that we model on source-destination pairs is the video streams that consist of varying sized data frames and the inter-packet time is very low. In this way, we can check the MANET routing protocols over varying data sets and can provide the analysis that among the existing MANET routing protocols which routing protocol is best suited for data transmission over MANETs. To analyze the behavior of various
APA, Harvard, Vancouver, ISO, and other styles
9

Dhende, Sandeep, and Suresh Shirbahadurkar. "MACO-DHKE Based Secure Data Transmission in MANETs." International journal of electrical and computer engineering systems 13, no. 4 (2022): 245–52. http://dx.doi.org/10.32985/ijeces.13.4.1.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are the self-sufficient nodes with their unique characteristics, such as open wireless mediums and self-motivated topology, which suffers from security weaknesses. Due to the complexity of the MANET security architecture, it is difficult to detect and prevent security issues in the wired networks. Hence, this paper proposes a secure and QoS-aware data transmission in the MANET that improves the efficiency of the transmission. The optimal route, which is the shortest possible path, is chosen using the modified ant colony optimization algorithm (MACO algorithm) an
APA, Harvard, Vancouver, ISO, and other styles
10

Habboush, Ahmad Khader. "Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review." Computer and Information Science 12, no. 1 (2019): 82. http://dx.doi.org/10.5539/cis.v12n1p82.

Full text
Abstract:
Application of mobile ad hoc networks (MANETs) has gained significant popularity among researchers in the field of data communication networks. However, a MANET operating in a wireless environment imposes a number of challenges for the implementers so far as routing of packets across it is concerned. There is a wide range of research contributions are available in the literature wherein authors propose various solutions to overcome the problems and bottleneck related to routing in MANET. Especially soft computing techniques and Ant Colony Optimization (ACO) in particular has been significantly
APA, Harvard, Vancouver, ISO, and other styles
11

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
12

Srividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
13

Kumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.

Full text
Abstract:
In a MANET (Mobile Ad-Hoc Network), an intruder can attempt to gain unlawful access to the network to obtain sensitive information. These attacks can occur at various network layers, and different attacks can be carried out. To mitigate the risks of such attacks, several solutions have been proposed. It can be characterized by dynamic topology, meaning that the network is formed by a group of nodes communicating wirelessly and without centralized control. This feature makes MANETs highly vulnerable to attacks, especially when malicious nodes are introduced into the network. These malicious nod
APA, Harvard, Vancouver, ISO, and other styles
14

Rakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "AN ARTIFICIAL INTELLIGENCE BASED LIGHT WEIGHT CRYPTOGRAPHIC ADDRESS GENERATION (LW-CGA) USING OPTIMIZATION FOR IPv6 BASED MANETs." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 251–61. https://doi.org/10.5281/zenodo.1345600.

Full text
Abstract:
Due to rising application requests and also for dependable data transfer, security concern is one the important research areas in the field of mobile ad hoc networks (MANET). As we know that MANET is formed by a number of mobile nodes and each node communicate with each other using their energy capabilities. To solve the security and routing protocol in IPv6 based MANET, the Secure Neighbor Discovery (SeND) routing protocol will be designed with concept of artificial intelligence techniques to overcome the security threats during auto-configuration has proven to face security and technical iss
APA, Harvard, Vancouver, ISO, and other styles
15

Abdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.

Full text
Abstract:
Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differenc
APA, Harvard, Vancouver, ISO, and other styles
16

Kurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.

Full text
Abstract:
Battery energy is a crucial issue that limits battery-powered mobile devices’ operational efficiency in Mobile Ad hoc Networks (MANETs). Failure of a node affects both the lifetime and connectivity of a MANET, which has to initiate finding a new route from source to destination. This initiation causes more energy consumption in nodes. Failure of a node also causes network partitions, thereby resulting in sparse networks being formed. Existing energy-efficient strategies only defer the end of a node’s battery lifetime; they could not guarantee the MANET’s nonstop functioning. To address the iss
APA, Harvard, Vancouver, ISO, and other styles
17

Sirajuddin, Mohammad, Ch Rupa, Surbhi Bhatia, R. N. Thakur, and Arwa Mashat. "Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–8. http://dx.doi.org/10.1155/2022/9134036.

Full text
Abstract:
The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for information exchange in various domains. MANET is a group of versatile nodes that communicates with each other without relying on a fixed physical framework. One of the prominent features of MANET is its versatile topology. Because of this striking feature, MANETs are employed in various domains like defense and combat operations, disaster management, healthcare, and environmental monitoring. In this paper, we enlighten the sign
APA, Harvard, Vancouver, ISO, and other styles
18

Sarkar, Nurul I., and Md Jahan Ali. "A Study of MANET Routing Protocols in Heterogeneous Networks: A Review and Performance Comparison." Electronics 14, no. 5 (2025): 872. https://doi.org/10.3390/electronics14050872.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are becoming a popular networking technology as they can easily be set up and provide communication support on the go. These networks can be used in application areas, such as battlefields and disaster relief operations, where infrastructure networks are not available. Like media access control protocols, MANET routing protocols can also play an important role in determining network capacity and system performance. Research on the impact of heterogeneous nodes in terms of MANET performance is required for proper deployment of such systems. While MANET routing pr
APA, Harvard, Vancouver, ISO, and other styles
19

Habboush, Ahmad Khader. "Hot Spot Phenomenon and Greedy Routing Failure in Mobile Ad-hoc Networks." Modern Applied Science 13, no. 4 (2019): 89. http://dx.doi.org/10.5539/mas.v13n4p89.

Full text
Abstract:
Lately, Greedy Forwarding Strategy (GFS) is express as a basic mechanistic in geographic routing for Mobile Ad Hoc Networks (MANETs). GFS employs the shortest path between two connected nodes. The research’s analysis of networks that using GFS indicates that some areas of the MANET are more decumbent to high traffic load compared with other places. This situation is called hot spot phenomenon. Accordingly, these hot spot nodes become constrained in terms of many issues and seem to be died fast. The performance of GFS becomes limited to these hot spot nodes. The whole MANET fails, as
APA, Harvard, Vancouver, ISO, and other styles
20

A.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.

Full text
Abstract:
Purpose In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for greater energy usage, thereby affecting the parameter metrics network performance, throughput, packet overhead, energy consumption in addition to end-to-end delay. The effective parameter metric measures are implemented and made to enhance the network lifetime and energy efficiency. The transmission of data for at any node should be more efficient and also the battery of sensor node battery usage should be profic
APA, Harvard, Vancouver, ISO, and other styles
21

M. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.

Full text
Abstract:
In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data
APA, Harvard, Vancouver, ISO, and other styles
22

Biswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.

Full text
Abstract:
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET  is  particularly  vulnerable  to  security attacks  in  comparison  to  wired  network  or infrastructure-based  wireless  network  due  to  its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and   transmi
APA, Harvard, Vancouver, ISO, and other styles
23

Islam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
24

Burhan, Ul Islam Khan, Funke Olanrewaju Rashidah, Anwar Farhat, Rahman Najeeb Athaur, and Yaacob Mashkuri. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832–42. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
25

Nigar, Nahida, and Muhammad Anwarul Azim. "Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2199. http://dx.doi.org/10.11591/ijece.v8i4.pp2199-2206.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which cl
APA, Harvard, Vancouver, ISO, and other styles
26

Nahida, Nigar, and Anwarul Azim Muhammad. "Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2199–206. https://doi.org/10.11591/ijece.v8i4.pp2199-2206.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which cl
APA, Harvard, Vancouver, ISO, and other styles
27

Krzysztoń, Mateusz, and Ewa Niewiadomska-Szynkiewicz. "This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication wi." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2016): 38–49. http://dx.doi.org/10.26636/jtit.2016.3.739.

Full text
Abstract:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cl
APA, Harvard, Vancouver, ISO, and other styles
28

Tiwari, Narendra Kumar. "A Comprehensive Survey on MANET: Architecture, Protocols, and Challenges." International Journal of Information Technology and Management 19, no. 1 (2024): 259–71. https://doi.org/10.29070/7ddjde88.

Full text
Abstract:
Mobile Ad Hoc Networks, also known as MANETs, are a paradigm for wireless networks that are dynamic and self-configuring. They make it possible to communicate without any interruptions and do not rely on established infrastructure. This study offers a detailed review of MANET design, including the most important routing protocols and the issues that are related with them. The article addresses a variety of routing tactics, such as proactive, reactive, and hybrid protocols, and highlights the advantages and disadvantages of each of these approaches. Additionally, crucial difficulties like as se
APA, Harvard, Vancouver, ISO, and other styles
29

S, Hemalatha, Harikumar Pallathadka, and Rajesh Chinchewadi. "An Overview of Manet Power Management Approaches." International Journal of Data Informatics and Intelligent Computing 2, no. 4 (2023): 11–19. http://dx.doi.org/10.59461/ijdiic.v2i4.82.

Full text
Abstract:
One of the primary issues with MANET is power optimization and utilization because it relies on the node's internal battery power to operate the wireless network. The performance of the MANET is also affected by one of the parameters of energy consumption and utilization. Each operation in the MANET requires some amount of energy to complete. This article elaborated on MANET power management from its inception to the present, as well as doing comparison research to recommend new methods for improving MANET power utilization. This study examines MANET power management options in terms of numero
APA, Harvard, Vancouver, ISO, and other styles
30

Hemalatha, S., Nileshkumar Patel, Ajay Kumar, et al. "MANET Hidden and Exposed Terminal - Challenges and Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (2023): 48–51. http://dx.doi.org/10.17762/ijritcc.v11i10s.7593.

Full text
Abstract:
Mobile Adhoc Network (MANET)is a self organized wireless Network which was created to communicate among the nodes without support of the any Infrastructure. While transmission of the packets between the nodes, many challenges the every nodes faces. One of the Major challenges is Hidden and Exposed nodes issues in the MANET. This causes the packet drop or packet failure while the transmitting the packets. Also which reflects in degrades the throughput of the MANET and performance of the MANET nodes when the heavy traffic ,retransmission of the dropped packets delayed the communication. This art
APA, Harvard, Vancouver, ISO, and other styles
31

Vijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.

Full text
Abstract:
The property of dynamic infrastructure that adjusts the network automatically and allows for faster deployment has made Mobile ad hoc networks (MANETs) extremely fitting for locations that don’t have support for radio communication due to disasters or other crises. Since the topology is dynamic, security is one of the major concerns in MANET which will be exposed for various attacks like eavesdropping, routing based attacks and modification of executables. Though MANET is vulnerable to these attacks, another major issue to be addressed is the attacks based on intrusion. The proposed model uses
APA, Harvard, Vancouver, ISO, and other styles
32

Zhao, Huanyu, Xin Yang, and Xiaolin Li. "cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks." Vehicular Technology, IEEE Transactions on 62, no. 6 (2013): 2792–806. http://dx.doi.org/10.1109/tvt.2012.2230411.

Full text
Abstract:
Mobility model and network topology play important roles in mobile ad hoc networks (MANETs). Most existing trust and reputation management systems in a MANET do not address mobility issues adequately. In this paper, we study the trust management problem in a MANET with cyclic movement patterns. In a cyclic MANET (cMANET) where nodes periodically move, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional schemes, trust management in cMANET involves not only neighbor trust relationships
APA, Harvard, Vancouver, ISO, and other styles
33

Ram Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.

Full text
Abstract:
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications, which involve military applications, civilian domains, and disaster recovery systems. It is assumed that the nodes present in the routing protocols of MANETs are cooperative and trustworthy. This assumption makes MANET more prone to manipulation and interception, which generates several possibilities of different suspicious attacks, such as Denial of Service (DoS) attacks. Hence, security is considered as an important parameter as the network is fond of suspicious attacks. This paper addresses the security iss
APA, Harvard, Vancouver, ISO, and other styles
34

Jagadev, Nibedita, Binod Kumar Pattanayak, Debabrata Singh, and Sipra Sahoo. "A Survey on Bandwidth Management in MANET." International Journal of Engineering & Technology 7, no. 3.4 (2018): 38. http://dx.doi.org/10.14419/ijet.v7i3.4.14672.

Full text
Abstract:
Mobile ad-hoc network (MANET) are self-configuring without any fixed infrastructure. In MANET the challenge of providing QoS support during multimedia application is an open problem. To enhance the network throughput adequate amount of bandwidth is required. Bandwidth management in MANET plays a vital role in improving the networks overall performance. In this paper a systematic study has been carried out about challenging issues associated with bandwidth management during routing in MANET and analysis has been done about different models of bandwidth management.
APA, Harvard, Vancouver, ISO, and other styles
35

Vijay U. Rathod. "To Reduce Channel Interference in Mobile Ad-Hoc Networks through LSTM and GRU Prediction Algorithms." Advances in Nonlinear Variational Inequalities 27, no. 2 (2024): 499–516. http://dx.doi.org/10.52783/anvi.v27.1342.

Full text
Abstract:
The demand for the applications that mobile ad-hoc networks (MANETs) can provide is rising along with their popularity. Two important features of MANETs are communication interference and connection. In MANET environments, the movement of mobile nodes has been rising. Co-channel or adjacent interference congestion is especially common due to the increasing mobility of mobile nodes. Due to the severe degradation in MANET performance caused by these interference events, they are becoming critical difficulties. There is a lack of accuracy in MANET's capacity to predict the resources that are requ
APA, Harvard, Vancouver, ISO, and other styles
36

Praveen, Mourya, and Avinash Sharma Prof. "Review on Intrusion Detection in MANETs." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 213–15. https://doi.org/10.5281/zenodo.3843071.

Full text
Abstract:
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma "Review on Intrusion
APA, Harvard, Vancouver, ISO, and other styles
37

Hemalatha, S., Nileshkumar Patel, Neelesh Kumar Jain, Ajay Kumar, Anant Nagesh Kaulage, and Amit Kumar Mishra. "MANET Congestion Control Mechanism - Challenges and Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (2023): 210–14. http://dx.doi.org/10.17762/ijritcc.v11i7.7847.

Full text
Abstract:
The transport layer plays a crucial role in the Mobile Adhoc Network (MANET) protocol stack by controlling traffic flow, managing congestion, and enabling end-to-end delivery. With the help of congestion control mechanisms, numerous protocols are formed to enhance MANET performance. This paper focuses on a thorough analysis of the challenges the MANET protocol stack is facing as a result of congestion control issues such high overload, long delays, and increased packet loss. Finally, note that in order to increase MANET performance, research needs to concentrate on specific congestion control
APA, Harvard, Vancouver, ISO, and other styles
38

John, Y. M. Mahaboob, and G. Ravi. "Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 232–41. http://dx.doi.org/10.17762/ijritcc.v11i4s.6533.

Full text
Abstract:
In wireless transmission, a Mobile Ad-hoc Network (MANET) contains many mobile nodes that can communicate without needing base stations. Due to the highly dynamic nature of wireless, MANETs face several issues, like malicious nodes making packet loss, high energy consumption, and security. Key challenges include efficient clustering and routing with optimal energy efficiency for Quality of Service (QoS) performance. To combat these issues, this novel presents Cooperative Self-Scheduling Secure Routing Protocol (CoS3RP) for efficient scheduling for proficient packet transmission in MANET. Initi
APA, Harvard, Vancouver, ISO, and other styles
39

Wijonarko, Dwi, Samsul Arifin, Muhammad Faisal, Muhammad Nabil Pratama, Okta Nindita Priambodo, and Edwin Setiawan Nugraha. "Mobile Ad-Hoc Network (MANET) Method: Some Trends and Open Issues." Recent in Engineering Science and Technology 3, no. 2 (2025): 49–74. https://doi.org/10.59511/riestech.v3i2.108.

Full text
Abstract:
This study analyzes the latest developments and trends in the field of Mobile Ad-Hoc Networks (MANET) through a bibliometric approach using a metadata dataset from publications taken from Scopus between 2021 and 2024. By utilizing VOSviewer to visualize the data, the study identified key keywords that dominated the MANET literature, such as "security", "routing protocols", "mobility", and "5G". The visualization results show several important clusters, including topics related to network security, vehicle networks (VANET), and the application of advanced technologies such as machine learning i
APA, Harvard, Vancouver, ISO, and other styles
40

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulner
APA, Harvard, Vancouver, ISO, and other styles
41

Sumathi, K., and D. Vimal Kumar. "Manet Security and Attacks Issues, Challenges and Solutions." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 433–37. http://dx.doi.org/10.26438/ijcse/v7i3.433437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

El brak, Said, Mohamed El brak, and Driss Benhaddou. "A New QoS Management Scheme for VoIP Application over Wireless Ad Hoc Networks." Journal of Computer Networks and Communications 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/945695.

Full text
Abstract:
Nowadays, mobile ad hoc networks (MANETs) have to support new applications including VoIP (voice over IP) that impose stringent QoS (quality of service) constraints and requirements. However, VoIP applications make a very inefficient use of the MANET resources. Our work represents a first step toward improving aspects at the network layer by addressing issues from the standpoint of adaptation, claiming that effective adaptation of routing parameters can enhance VoIP quality. The most important contribution is the adaptive OLSR-VA algorithm which provides an integrated environment where VoIP ac
APA, Harvard, Vancouver, ISO, and other styles
43

Ramadass, Parthasarathy, Manjula Sankar, and Shanmugapriyan J. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 37–47. http://dx.doi.org/10.4018/ijkss.2021010103.

Full text
Abstract:
A collection of mobile nodes deployed with a temporary intention is called mobile ad hoc network (MANET). Every deployed node has the capable of connecting the network communication, and every node has the capable of configuring network communication. There are many routing procedures to discover the proper route from source to destination. The routing protocol helps to channelize the route from one point to other for establishment of the communication. This paper discusses the detailed and the elaborated study of the MANET security issues and the various routing protocols. Moreover, it descri
APA, Harvard, Vancouver, ISO, and other styles
44

Nigahat*, Dr. Dinesh Kumar. "BLACK HOLE DETECTION AND PREVENTION USING ADOV AND SHORTEST DISTANCE TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 314–19. https://doi.org/10.5281/zenodo.546354.

Full text
Abstract:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secu
APA, Harvard, Vancouver, ISO, and other styles
45

Shajin, Francis H., Muthusamy Palaniappan, and P. Rajesh. "Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET." International Journal of Computer Network and Information Security 16, no. 1 (2024): 123–32. http://dx.doi.org/10.5815/ijcnis.2024.01.10.

Full text
Abstract:
Mobile ad hoc network (MANET) routing is a generous tactic used for allocating packets to the base station (BS). During the operations of routing, occurrence of malicious node embellishes the mobile ad hoc network operations. For that reason, a trusted distributed routing protocol is obliged that maintains the routing buttressing and the proficiency of mobile ad hoc network. To overcome these challenging issues, Auto-Metric Graph Neural Network based Blockchain technology is proposed in this manuscript for Secured Dynamic Optimal Routing in MANET (BC-SDOR-MANET-AGNN). The proposed approach is
APA, Harvard, Vancouver, ISO, and other styles
46

Kadhum, Aseel Nadhum. "Improved Digital Security Applications for Smart Card." Feb-Mar 2024, no. 42 (February 1, 2024): 11–18. http://dx.doi.org/10.55529/ijrise.42.11.18.

Full text
Abstract:
With the rapid expansion of wireless networks and mobile computing applications, the quality of service (QoS) of mobile ad hoc networks (MANETs) has garnered growing attention. Ensuring QoS in a MANET system requires careful consideration of security issues. Attacks on a QoS distortion system without the protection of a security mechanism might result in subpar QoS performance, interference with resource use, or even failure of QoS provisioning. Traditional security measures cannot be applied because to the characteristics of MANET, which include limited processing and communication power and
APA, Harvard, Vancouver, ISO, and other styles
47

Zaman, Rafi U., Humaira M. Alam, Khaleel Ur Rahman Khan, and A. Venugopal Reddy. "Improvement of Adaptive Load Balanced Gateway Discovery Protocol in Hybrid Integrated Internet-MANET." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 3 (2017): 162. http://dx.doi.org/10.3991/ijim.v11i3.6706.

Full text
Abstract:
<p class="0abstract">Internetworking of different types of networks is envisaged as one of the primary objectives of the future 5G networks. Integrated Internet-MANET is a heterogeneous networking architecture which is the result of interconnecting wired Internet and wireless MANET. Multiprotocol gateways are used to achieve this interconnection. There are two types of Integrated Internet-MANET architectures, two-tier and three-tier. A combination of two-tier and three tier architectures also exists, called the Hybrid Framework or Hybrid Integrated Internet-MANET. Some of the most import
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.

Full text
Abstract:
Mobile Ad hoc network (MANET) is a collection of moving wireless nodes which form a temporary network topology without using any pre-existing network infrastructure. One of the challenges in MANET is to identify a path between the source and the destination nodes. MANET is highly deployable, self-organizing, autonomous and self-configuring network with the ability of rapid deployment. Nodes movement imposes high challenges to routing in MANET due to dynamically changing of topologies, low transmission power and asymmetric links. So well-organized routing is very critical task due to highly dyn
APA, Harvard, Vancouver, ISO, and other styles
49

International, Journal on AdHoc Networking Systems (IJANS). "Different Ways to Achieve Trust in MANET." International Journal on AdHoc Networking Systems (IJANS) 2, no. 2 (2024): 12. https://doi.org/10.5121/ijans.2012.2206.

Full text
Abstract:
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages anddisadvantages. Providing safe communication between mobile nodes, recognization the position ofnodes, reducing overhead, handling misbehavior and location updates are such a difficult issues inad-hoc network, so providing trust schemes is an important in this network. MANET provides somebasic functions like routing, communication, network management and packet forwarding etc overself organized network. Because MANET has not a fixed topology, in which mobile nodes comes andleaves the network within a random
APA, Harvard, Vancouver, ISO, and other styles
50

Al mojamed, Mohammad. "Integrating IP Mobility Management Protocols and MANET: A Survey." Future Internet 12, no. 9 (2020): 150. http://dx.doi.org/10.3390/fi12090150.

Full text
Abstract:
The Mobile ad hoc Network (MANET) is a collection of mobile devices that forms a self-created, self-administered, and self-organized network. It is an infrastructureless network that does not require an existing infrastructure to operate. MANET suits scenarios where a temporary network is needed, such as emergency rescue, the military field, and disaster areas. MANET is an isolated network, and communication is restricted to the participating nodes’ transmission coverage. In order to increase its connectivity and its application scope, however, MANET requires integration with other networks, f
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!