Volume- 2
Issue- 3
Year- 2014
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Rashmi Makkar) , Ms. Suman Sangwan
MANET is a decentralized autonomous system in which different nodes are connected to each by wireless links. Nodes in the network can be either fix or mobile. Mobile nodes may include laptop, mobile phones, MP3 Player. Nodes may be located on ships, airplanes, land irrespective of their location as they can participate in communication. To facilitate the communication within the network, a routing protocol is used to discover the routes between nodes. The primary goal of such an network routing protocol is correct and efficient route establishment between a pair of nodes so that message can be deliver in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper provides an overview of different Geographical routing protocols with their merits and drawbacks.
[1] P. Agrawal, O. P.Vyas, P. Udaykumar,” Analysis of MANET Security –Challenges, Threats & Solutions” International Journal Of Computer Science And Applications Vol. 3, No. 1, January / February 2010 ISSN: 0974-1003.
[2] Vikram m. Agrawal” Manet (Mobile Ad Hoc Network) – Challenges, Security And Protocols” International Journal of Computer science and Engineering Research and Development (IJCSERD),ISSN 2248- 9363
[3] Priyanka Goyal, Sahil Batra, Ajit Singh,” A Literature Review of Security Attack in Mobile Ad-hocNetworks” International Journal of Computer Applications (0975 – 8887) Volume 9– No.12, November 2010
[4] K. Thamizhmaran1, R. Santosh Kumar Mahto2, V. Sanjesh Kumar Tripathi3,” Performance Analysis of Secure Routing Protocols in MANET”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 9, November 2012
[5] Rachika Gupta,” Mobile Adhoc Network(MANETS) :Proposed solution to Security Related Issues”, Indian Journal of Computer Science and Engineering (IJCSE)
[6] Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma,” A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks”, Journal Of Computing, Volume 3, Issue 1, January 2011, ISSN 2151-9617
[7] Karan Singh, R. S. Yadav, Ranvijay,” A Review Paper On Ad Hoc Network Security”, International Journal of Computer Science and Security, Volume (1): Issue (1
[8] Amol Bhosle, Yogadhar Pandey ,” Review of authentication and digital signature methods in Mobile ad hoc network ”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013
[9] Young-Bae Ko and Nitin H. Vaidya,” Location-Aided Routing (LAR) in mobile ad hoc networks”, Department of Computer Science, Texas A&M University, College Station, TX 77843- 3112, USA, 307–321,2000.
[10] Karim El Defrawy and Gene Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs”, School of Information and Computer Science University of California, Irvine.
[11] Stefano B~agni, Irnrich Chlamtac, Violet R. Syrotiuk, Barry A. Woodward,” A Distance Routing Effect Algorithm for Mobility”, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas.
[12] Brad Karp, H. T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Network”, MobiCom 2000.
[13] Mohammed ERRITALI and Oussama Mohamed Reda and Bouabid El Ouahidi, “A Contribution To Secure The Routing Protocol "Greedy Perimeter Stateless Routing'' Using A Symmetric Signature Based Aes And Md5 Hash” , International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.5, September 2011.
[14] Gergely V. Záruba, Vamsi K. Chaluvadi, and Azeem M. Suleman, “LABAR: Location Area Based Ad Hoc Routing for GPS-Scarce Wide-Area Ad Hoc Networks”, Technical Report: CSE-2003-1.
[15] Jian Li and Prasant Mohapatra,” LAKER: Location Aided Knowledge Extraction Routing for Mobile Ad Hoc Networks”, Department of Computer Science, University of California, Davis, National Science Foundation through the grants CCR0296070 and ANI-0296034.
[16] Manjuladevi.V, Jennie Bharathi.R, “MD5: Anonymous Location-Aided Routing in Suspicious Secure MANETs”, International Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801.
[17] Aarti , Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks ” , International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 5, May 2013 , ISSN: 2277 128X .
[18] Laura Marie Feeney, “A Taxanomy for Routing Protocols in Mobile Ad Hoc Networks”, October 1999. [19] Magnus Frodigh et. Al, “Wireless ad hoc networking- The art of networking without a network”, Ericsson Review No. 4, 2000. [20] Petteri Kuosmanen, “Classification of Ad Hoc Routing Protocol”, January 2001.
Panipat, Haryana, India (makkar.rashmi21@gmail.com
No. of Downloads: 3 | No. of Views: 920