Mobile Ad Hoc Networks: An Overview

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-48 Number-3
Year of Publication : 2017
Authors : Poonam M. Mahajan
DOI :  10.14445/22312803/IJCTT-V48P125


Poonam M. Mahajan "Mobile Ad Hoc Networks: An Overview". International Journal of Computer Trends and Technology (IJCTT) V48(3):123-127, June 2017. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Mobile means moving and ad hoc means temporary without any fixed infrastructure so mobile ad hoc networks are kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration[1]. Mobile Ad Hoc Networks(MANETs) are fundamental element of pervasive networks, where user communicate anywhere, any time and on fly. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure they rely on wireless terminals for routing and transport services .Routing in Mobile Ad-hoc Networks is a challenging task due to its frequent changes in topologies. In this paper authors review routing protocol, challenges and security of ad-hoc networks. Mobile ad hoc networking is one of the most important and essential technologies that support future computing scheme. The characteristics of MANET bring this technology as a great opportunity together with many challenges.

[1] Robinpreet Kaur & Mritunjay Kumar Rai, Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India “A Novel Review on Routing Protocols in MANETs” under Undergraduate Academic Research Journal (UARJ), ISSN : 2278 – 1129, Volume-1, Issue-1, 2012 [2] Lu Han, October 8, 2004 “Wireless Ad-hoc Networks”
[2] A. Boukerche et al., “Routing protocols in ad hoc networks: A survey,”Computer Networks: The International Journal of Computer andTelecommunications Networking, vol. 55, no. 13. pp. 3032–3080, May2011.
[3] M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review, No.4, 2000, pp. 248-263.
[4] “THE HANDBOOK OF AD HOC WIRELESS NETWORKS” Edited by Mohammad Ilyas Florida Atlantic University Boca Raton, Florida
[5] Wenjia Li and Anupam Joshi, Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County “Security Issues in Mobile Ad Hoc Networks- A Survey”
[6] Karan Singh, R. S. Yadav, Ranvijay “A REVIEW PAPER ON AD HOC NETWORK SECURITY” under International Journal of Computer Science and Security, Volume (1): Issue (1)
[7] Jun-Zhao Sun MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu, Finland “Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing” under P.O.Box 4500, FIN-90014 University of Oulu.
[8] Imrich Chlamtac, Marco Cont, and, Jennifer J.-N. Liu “Mobile ad hoc networking: imperatives and challenges” under 1570-8705/$ - see front matter _ 2003 Elsevier B.V. All rights reserved. doi:10.1016/S1570-8705(03)00013-1
[10] Priyanka Goyal, Vinti Parmar, Rahul Rishi “MANET: Vulnerabilities, Challenges, Attacks, Application” under IJCEM International Journal of Computational Engineering & Management, Vol. 11,January 2011 ISSN (Online): 2230-7893
[11] Janne Lundberg, Helsinki University of Technology “Routing Security in Ad Hoc Networks” under Telecommunications Software and Multimedia Laboratory HUT TML 2000 Tik-110.501 Seminar on Network Security
[13] Ms. Amita Pandey “Introduction to Mobile Ad Hoc Network, International Journal of Scientific and Research Publications, Volume 5, Issue 5, May 2015 1 ISSN 2250-3153.

Characteristics, Challenges, Routing protocols, Mobile Ad-hoc Networks, Security.