To see the other types of publications on this topic, follow the link: Mobile Ad Hoc Networks (MANETs).

Journal articles on the topic 'Mobile Ad Hoc Networks (MANETs)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile Ad Hoc Networks (MANETs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singh, Gurvir, and Tajinder Kaur. "Termite-Based Approach for Wormhole Attack Detection in Mobile Ad-Hoc Networks (MANETs)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42378.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are regular, self-orbiting communication networks that may control mobile nodes. Many protocols have been developed to alleviate the MANET's susceptibility to different risks & attacks. When nodes are mobile or the network architecture is unstable, the hostile node exploits these flaws to initiate assaults, including wormhole assaults. This study presents the termite approach for wormhole detection in MANETs. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.

Full text
Abstract:
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are highly susceptible to various security threats due to their inherent characteristics that can adversely affect their performance. In order to provide secure communication in mobile ad hoc networks, it is required to understand various possible attacks at different layers of the communication protocol stac
APA, Harvard, Vancouver, ISO, and other styles
3

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc network
APA, Harvard, Vancouver, ISO, and other styles
4

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect n
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be d
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
8

Burhan, Ul Islam Khan, Funke Olanrewaju Rashidah, Anwar Farhat, Rahman Najeeb Athaur, and Yaacob Mashkuri. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832–42. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
9

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-config
APA, Harvard, Vancouver, ISO, and other styles
10

Kanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (2021): 364. http://dx.doi.org/10.3390/electronics10040364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mohamed, Elboukhari1 Mostafa Azizi1 and Abdelmalek Azizi2 3. "COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Computer-Aided Technologies (IJCAx) 02, apr (2018): 01–11. https://doi.org/10.5281/zenodo.1346127.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the b
APA, Harvard, Vancouver, ISO, and other styles
12

Mohamed, Elboukhari1 Mostafa Azizi1 and Abdelmalek Azizi2 3. "COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Computer-Aided technologies (IJCAx) 2, no. 2 (2023): 1. https://doi.org/10.5281/zenodo.8323414.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the b
APA, Harvard, Vancouver, ISO, and other styles
13

Vijay U. Rathod. "To Reduce Channel Interference in Mobile Ad-Hoc Networks through LSTM and GRU Prediction Algorithms." Advances in Nonlinear Variational Inequalities 27, no. 2 (2024): 499–516. http://dx.doi.org/10.52783/anvi.v27.1342.

Full text
Abstract:
The demand for the applications that mobile ad-hoc networks (MANETs) can provide is rising along with their popularity. Two important features of MANETs are communication interference and connection. In MANET environments, the movement of mobile nodes has been rising. Co-channel or adjacent interference congestion is especially common due to the increasing mobility of mobile nodes. Due to the severe degradation in MANET performance caused by these interference events, they are becoming critical difficulties. There is a lack of accuracy in MANET's capacity to predict the resources that are requ
APA, Harvard, Vancouver, ISO, and other styles
14

Bhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.

Full text
Abstract:
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same t
APA, Harvard, Vancouver, ISO, and other styles
15

Abdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.

Full text
Abstract:
Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differenc
APA, Harvard, Vancouver, ISO, and other styles
16

Mohammed, Aziz Ahmed*1 Mohammed Sirajuddin2 &. Nazia Kouser3. "REDUCING THE NETWORK OVERHEAD BY IMPLEMENTING DISTRIBUTED KEY MECHANISM IN MANETS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 8 (2018): 104–10. https://doi.org/10.5281/zenodo.1342512.

Full text
Abstract:
In the wireless sensor networks, the Mobile Ad hoc Networks (MANETs) is a type of networks. The difference between wireless network and MANETs is, in the wireless network the nodes are stable and in MANETs no one node is stable which means these are mobile nodes. Generally, any network hasinformation security breaches.The closing purpose of the security answers for MANETs is to provide protection offerings, which includes authentication, confidentiality, integrity, anonymity, and availability, to cellular user. In order to acquire this goal, the security solution required to provide complete p
APA, Harvard, Vancouver, ISO, and other styles
17

K.Thamizhmaran. "Wireless Ad hoc Reactive Routing Protocols in Mobile Ad hoc Networks." Journal of Optoelectronics and Communication 7, no. 1 (2025): 34–45. https://doi.org/10.5281/zenodo.15152925.

Full text
Abstract:
<em>Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different air communication technologies, MANETs are important because they have mobile nodes that can be randomly connected via wireless links. </em><em>Every node in the network functions as a router and keeps track o
APA, Harvard, Vancouver, ISO, and other styles
18

Khanchandani, Shailesh Kumar. "A COMPARATIVE ANALYSIS OF PROACTIVE ROUTING PROTOCOLS (DSDV, OLSR) & REACTIVE ROUTING PROTOCOLS (AODV, DSR) IN MANET USING NS-3." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30773.

Full text
Abstract:
The abstract outlines a comprehensive analysis focusing on routing protocols in Mobile Ad Hoc Networks (MANETs). Ad-hoc networks are dynamic wireless networks without a central infrastructure. This analysis compares two types of routing protocols—proactive (table-driven) and reactive (on-demand)—using simulation analysis. The protocols DSDV, OLSR, AODV, and DSR are evaluated using NS-3, considering various performance metrics under different scenarios. The research aims to provide insights into protocol strengths and weaknesses, aiding network protocol selection and potential enhancements. Thi
APA, Harvard, Vancouver, ISO, and other styles
19

Cai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.

Full text
Abstract:
A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly an
APA, Harvard, Vancouver, ISO, and other styles
20

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.

Full text
Abstract:
MANETs (Mobile Ad hoc Networks) had become the most important next generation wireless network technologies. It is made up of self-configurable mobile nodes, Intruders mieght decrease MANET functionality due to the dispersed and wireless nature of MANETs, and therefore they were vulnerable to numerous attacks at different levels. The important challenges for MANET were the security and routing protocols. This paper examined the impact of Jammer which it was a kind of DoS attack which interfere with the normal operation of network and show how the Jammer increased the delay and data dropped and
APA, Harvard, Vancouver, ISO, and other styles
21

Alnabhan, Mohammad M. "Advanced GPSR in Mobile Ad-hoc Networks (MANETs)." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 107. http://dx.doi.org/10.3991/ijim.v14i18.16661.

Full text
Abstract:
This work aims to develop the routing capability of GPSR in MANETs. A new GPSR advancement described as Adaptive GPSR (AGPSR) is proposed with enhanced greedy forwarding and efficient routing decision. AGPSR greedy forwarding model consists of three major phases; initialization, finding target neighbor, weight value computation and next hop selection. The weight value encounters a set of network metrics including node density, network size, congestion level, transmission range, node speed and movement direction. An intensive evaluation methodology was implemented in order to evaluate the perfo
APA, Harvard, Vancouver, ISO, and other styles
22

MOHAMMADI, HOSSEIN, EHSAN NEDAAEE OSKOEE, MOHSEN AFSHARCHI, NASSER YAZDANI, and MUHAMMAD SAHIMI. "A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS." International Journal of Modern Physics C 20, no. 12 (2009): 1871–902. http://dx.doi.org/10.1142/s0129183109014795.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are random, self-configurable and rapidly-deployable networks. The main goal of developing the MANETs is not only obtaining better service, but also having networks that can serve in situations in which no other means of communications can operate. Examples include networks that are used in battlefields, in search-and-rescue operations, and networks of sensors. We propose a percolation model for studying the properties of the MANETs. The model is based on a random network of sites, distributed in space, which represent the mobile nodes. Two nodes are linked if t
APA, Harvard, Vancouver, ISO, and other styles
23

Manwal, Manika. "Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2032–40. http://dx.doi.org/10.17762/turcomat.v11i3.13600.

Full text
Abstract:
Mobile devices are able to build their own networks, which are referred to as mobile ad hoc networks. These networks do not require any kind of permanent wiring or other infrastructure (MANETs). The success of MANETs and their adaptability to a variety of tasks is, to a considerable extent, based on the routing protocols that they use. Using metrics such as routing overhead, end-to-end delay, and packet delivery ratio, we compare and contrast the various routing protocols that can be employed in MANETs, including proactive, reactive, and hybrid protocols. This comparison and contrast is carrie
APA, Harvard, Vancouver, ISO, and other styles
24

Et. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.

Full text
Abstract:
With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key man
APA, Harvard, Vancouver, ISO, and other styles
25

Zaid Ihsan Nouri. "Comparative analysis of routing protocols for wireless area networks and evaluation of the effectiveness." Jornual of AL-Farabi for Engineering Sciences 1, no. 2 (2022): 9. http://dx.doi.org/10.59746/jfes.v1i2.48.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is a gathering of mobile nodes that want to communicate without any preplanned infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article been compared AODV, DSR and DSDV routing protocols in mobile ad hoc networks (MANETs) to specify the best operationa
APA, Harvard, Vancouver, ISO, and other styles
26

Sujithra Devi, Mrs L. D., Mrs A. Praveena, Mrs B. Reena, Mrs G. Anandhi, and Mrs M. Sowmya. "Mobile Ad-hoc Networks: A Survey on multipath routing protocols." Journal of University of Shanghai for Science and Technology 24, no. 1 (2022): 244–52. http://dx.doi.org/10.51201/jusst/21/121049.

Full text
Abstract:
A Mobile Ad Hoc Network (MANETs) connects mobile nodes without any base station. These nodes in the network can change the topology dynamically and transfer the data among themselves. The nodes in the MANET are categorized based on the resource factors like memory, computation, and power levels. The dynamic change in route makes the connection of the destination node more complex. Sometimes, it results in link failure, and hence the primary route is failed, which means an alternative route is required to transmit the packets. It required multiple paths from the source node to destination node
APA, Harvard, Vancouver, ISO, and other styles
27

Kanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.

Full text
Abstract:
A lot of intensive research has been carried out in the direction of providing multimedia communication over wireless mobile ad hoc network (MANET). In MANET, various QoS problems exist such as inefficient routing, handling node mobility, power conservation, limited processing capabilities of network devices, high error rates. Wireless routing introduces new challenges as applying basic routing algorithms directly on MANET could lead to large power consumption, interference, and load-balancing problems. Many routing algorithms have been proposed as extensions to the basic routing algorithms to
APA, Harvard, Vancouver, ISO, and other styles
28

Pragya Kabra, Et al. "Techniques for Diversified Optimization of Routing Algorithms in Mobile Ad-Hoc Wireless Connections." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (2023): 569–74. http://dx.doi.org/10.17762/ijritcc.v11i8.10057.

Full text
Abstract:
MANETs, for example, are a type of network that lacks a well-established infrastructure. Creating ad-hoc networks is difficult because of a lack of infrastructure. Choosing a routing protocol in an ad-hoc network may be difficult due to the network's volatility. To obtain the optimum performance, Zone Routing Protocol (ZRP) is a hybrid routing protocol that combines the best aspects of proactive (Optimized Link State Routing) and reactive (Ad hoc On-Demand Distance Vector) routing approaches. MANET performance can be improved using a Genetic Algorithm and Ant Colony Optimization.
APA, Harvard, Vancouver, ISO, and other styles
29

Punya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.

Full text
Abstract:
Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first and then some protection mechanisms against those attacks are discussed. Comparisons
APA, Harvard, Vancouver, ISO, and other styles
30

Phijik, Battula, and Chakunta Venkata Guru Rao. "Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks." Ingénierie des systèmes d information 26, no. 6 (2021): 559–67. http://dx.doi.org/10.18280/isi.260606.

Full text
Abstract:
Wireless networks rely on ad hoc communication in an emergency, such as a search and rescue or military missions. WLAN, WiMAX, and Bluetooth are often used in Ad Hoc networks. Using a TCP/IP wireless network poses several challenges. Packet loss in 802.11 may be caused by noise or the network. TCP/IP connects non-adjacent layers of the network, resolving cross-layer communication technology for cross-layer communication. It regulates data transmission energy. This structure solves an issue in various ways. It is often used to improve data transfer. Currently, the OSI reference model's layers a
APA, Harvard, Vancouver, ISO, and other styles
31

Divya, K., and B. Srinivasan. "A Trust-Based Predictive Model for Mobile Ad Hoc Networks." International Journal on AdHoc Networking Systems 11, no. 03 (2021): 13–23. http://dx.doi.org/10.5121/ijans.2021.11302.

Full text
Abstract:
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has
APA, Harvard, Vancouver, ISO, and other styles
32

Kasem Mohammed, Abdulghani Saif, and Khalid Hamid Bilal. "Survey of mobile ad hoc networks (manets)." International Journal of Engineering and Computer Science 8, no. 02 (2019): 24484–90. http://dx.doi.org/10.18535/ijecs.v8i02.4229.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes
APA, Harvard, Vancouver, ISO, and other styles
33

Kadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (2021): 1446. http://dx.doi.org/10.3390/electronics10121446.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]
APA, Harvard, Vancouver, ISO, and other styles
34

Mishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.

Full text
Abstract:
Abstract: To put it simply, a Mobile Ad-Hoc Network (MANET) is indeed a network of wireless mobile hosts that have formed temporarily without the use of any dedicated infrastructure or centralized administration. The network's nodes are selforganizing &amp; self-configuring because of their mobility. The hosts also serve as routers. Their job is to route information to and from other network nodes. Routing protocols are essential in MANETs because they determine the best ways to get from one node to another. Any ad hoc network's routing protocol should be designed with the ever-evolving topolo
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Rong Xin, Chao Mei Zheng, and Ling Chai. "Study on Power-Aware Routing Mechanism in MANET." Applied Mechanics and Materials 263-266 (December 2012): 1100–1104. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1100.

Full text
Abstract:
A mobile ad hoc networks (MANET) is a group of mobile wireless nodes which communicate without any fixed networking infrastructure. The nodes in an ad hoc mobile network are typically powered by batteries with a limited energy supply. For MANETs, One of the most important and challenging issues is how to conserve energy, maximizing the network lifetime.Since routing is an essential function in these networks, developing power-aware routing protocols has been an intensive research area in recent years. As a result, many power-aware routing protocols have been proposed from a variety of perspect
APA, Harvard, Vancouver, ISO, and other styles
36

Velagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.

Full text
Abstract:
A MANET can be treated as a network in which the nodes have the capability of self-configuring among themselves. These nodes are connected by wireless links to form an distributed topology without the help of any pre-existing infrastructure. Each node in a MANET can itself act as a router on its own. To perform effective routing operation in MANETS , several routing protocols were proposed, addressing several issues in MANETS. In this paper ,we tried to study the operation of DSDV protocol ,which is a proactive protocol and analyse the results obtained by simualting the DSDV protocol using NS-
APA, Harvard, Vancouver, ISO, and other styles
37

Farooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.

Full text
Abstract:
Abstract: A mobile ad hoc network is made up of portable wireless nodes (MANET). The communication between these mobile nodes is not managed centralized. A self-organizing, self-configuring network known as MANET allows mobile nodes to roam around at whim. The mobile nodes can act as a router by receiving and sending packets. Due to the significance of routing in MANET, this thesis also evaluates several routing systems' efficacy. We compared the three routing protocols AODV, DSR, OLSR, and DSDV. Throughput, network load, and latency are the three metrics used to gauge how well-performing diff
APA, Harvard, Vancouver, ISO, and other styles
38

Patel, Ibrahim, Aisha Ruman Patel, S. Saravanan, D. Ganeshaperumal, and Kedarnath B. "Pre-Existing Mobile Ad Hoc Network Routing Protection." ECS Transactions 107, no. 1 (2022): 395–404. http://dx.doi.org/10.1149/10701.0395ecst.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) versatility and portability have made them well known across a wide range of uses. Security conventions for protecting steering and device details have been established to ensure these systems. Those conventions, however, simply secure courses or correspondence, not both. To offer complete protection, both stable steering and communication safety conventions need to be performed. Using communication security conventions which were originally developed for, and Wi-Fi systems, may also place an enormous weight on a MANET's restricted network property. A new protec
APA, Harvard, Vancouver, ISO, and other styles
39

U., Kumaran, Ramachandran A., Jegan J., and K. Subramanian E. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 2 (2020): 949–56. https://doi.org/10.11591/ijeecs.v19.i2.pp949-956.

Full text
Abstract:
A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile adhoc network). Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in pac
APA, Harvard, Vancouver, ISO, and other styles
40

Kaur, Ramanpreet, Dr Kavita Taneja, and Dr Harmunish Taneja. "COMPUTATIONAL INTELLIGENCE BASED ROUTING SOLUTIONS FOR MOBILE AD HOC NETWORKS." International Journal of Engineering Science and Humanities 14, Special Issue 1 (2024): 32–37. http://dx.doi.org/10.62904/a0485344.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) refers to a wireless network where nodes dynamically establish and maintain connections with each other, directly without the need for a centralized infrastructure. MANETs are characterized by their decentralized nature, presenting challenges for routing protocols concerning rapid data transmission, minimized delay and Quality of Service (QoS) provisioning. Traditional routing protocols may struggle to perform optimally in MANETs due to frequent changes in network topology and resource constraints. The development of intelligent routing protocols tailored to the
APA, Harvard, Vancouver, ISO, and other styles
41

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sen
APA, Harvard, Vancouver, ISO, and other styles
42

KONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.

Full text
Abstract:
The present work is dedicated to study attacks and countermeasures in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a table which summarizes the advantages and the disadvantages of the mechanisms proposed were presented.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
43

Mohamed, Elboukhari, Azizi Mostafa, and Azizi Abdelmalek. "PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of UbiComp (IJU) 6, no. 2 (2022): 11. https://doi.org/10.5281/zenodo.7333209.

Full text
Abstract:
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, N
APA, Harvard, Vancouver, ISO, and other styles
44

Mohamed, Elboukhari, Azizi Mostafa, and Azizi Abdelmalek. "PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 11. https://doi.org/10.5281/zenodo.8208445.

Full text
Abstract:
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, N
APA, Harvard, Vancouver, ISO, and other styles
45

K.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.

Full text
Abstract:
<em>Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different wireless communication technologies, MANETs are important because they have mobile nodes that can be randomly coupled via wireless links. </em><em>Every node in the network functions as a router and keeps trac
APA, Harvard, Vancouver, ISO, and other styles
46

Tiwari, Rovin, and Megha Nema. "Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks." SMART MOVES JOURNAL IJOSCIENCE 5, no. 8 (2019): 10–13. http://dx.doi.org/10.24113/ijoscience.v5i8.288.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are normal in improving road wellbeing and traffic conditions, in which security is basic. In MANETs, the authentication of the mobile access control is a vital security administration for both inter‐vehicle and vehicle–roadside unit correspondences. In the mean time, vehicles additionally must be kept from the abuse of the private data and the assaults on their privacy. There is various research works concentrating on giving the mysterious authentication protected privacy in MANETs. In this paper, we explicitly give a review on the privacy‐preserving authentica
APA, Harvard, Vancouver, ISO, and other styles
47

S. Jeba, Shiny. "A review on application of MANET-IoT." i-manager's Journal on Mobile Applications and Technologies 9, no. 1 (2022): 28. http://dx.doi.org/10.26634/jmt.9.1.18922.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) will be very important for the Internet of Things (IoT). MANET is a decentralized selforganizing wireless network. Every device in MANET is completely free and can move in any direction. The interaction of the Internet of Things with wireless sensors and Mobile Ad-hoc Networks allows for the development of a new MANET-IoT framework. Innovative MANET-IoT systems are created through the interaction between Wireless Sensor Networks (WSN) and the IoT, which creates numerous design difficulties. Several application domains use MANET-based IoT systems. These systems i
APA, Harvard, Vancouver, ISO, and other styles
48

Rani, Seema, and Saurabh Charaya. "Performance Improvement of AODV in Wireless Networks using Reinforcement Learning Algorithms." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 734–41. http://dx.doi.org/10.17762/ijritcc.v11i9s.7746.

Full text
Abstract:
This paper investigates the application of reinforcement learning (RL) techniques to enhance the performance of the Ad hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad hoc networks (MANETs). MANETs are self-configuring networks consisting of mobile nodes that communicate without the need for a centralized infrastructure. AODV is a widely used routing protocol in MANETs due to its reactive nature, which reduces overhead and conserves energy. This research explores three popular Reinforcement Learning algorithms: SARSA, Q-Learning and Deep Q-Network (DQN) to optimize the AODV p
APA, Harvard, Vancouver, ISO, and other styles
49

Rakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.

Full text
Abstract:
The Mobile ad hoc networks (MANET) have become most significant and are being used widely in many applications. Generally, these applications require low cost, low energy and low data nodes that communicating over multiple hop to cover a large geographical area. In internet protocol version (IPv6) based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through auto configuration so the chances of energy consumption and security of network become high. This paper presents a survey of different routing protocols of IPv6 based MANET to minimize the
APA, Harvard, Vancouver, ISO, and other styles
50

Mahdi, M. A., T. C. Wan, A. Mahdi, M. A. G. Hazber, and B. A. Mohammed. "A Multipath Cluster-Based Routing Protocol For Mobile Ad Hoc Networks." Engineering, Technology & Applied Science Research 11, no. 5 (2021): 7635–40. http://dx.doi.org/10.48084/etasr.4259.

Full text
Abstract:
A MANET (Mobile Ad-hoc Network) is a group of mobile network nodes dynamically forming a network without any pre-existing infrastructure. Multi-path routing protocols in MANETs try to discover and use multiple routes between source and destination nodes. Multipath routing is typically used to reduce average delay, increase transmission reliability, provide load balancing among multiple routes, and improve security and overall QoS (Quality of Service). In this paper, the Cluster-Based Routing Protocol (CBRP), which is a single path MANET protocol is enhanced to use multiple paths. The traffic w
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!