Academic Journals Database
Disseminating quality controlled scientific knowledge

Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs

Author(s): Deepika Dhiman, Anand Nayyar | Anand Nayyar

Journal: International Journal of Advanced Research In Computer Science and Software Engineering
ISSN 2277-6451

Volume: 3;
Issue: 10;
Start page: 1;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: MANETs | routing protocols | security attacks | security leaks | selfish node

MANET is a collection of the mobile nodes which form a dynamic and temporary network without the use of centralized network infrastructure. MANETs make use of the routing protocols for controlling the nodes and routing of the packets between the nodes. Due to certain characteristics- dynamic topology, open sharable wireless medium, battery constraints and limited security, the nodes in MANET are susceptible to various attacks. In this paper, the complete aspect of the MANETs- characteristics, fundamental problems, routing protocols, security leaks and attacks in MANET along with the future trends has been discussed in detail.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions