Back
 CN  Vol.8 No.4 , November 2016
A Novel Review on Security and Routing Protocols in MANET
Abstract:
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination. Due to its dynamic topology, MANET can be created anywhere, anytime. As there are limited resources in MANET so it faces many problems such as security, limited bandwidth, range and power constraints. Due to this, many new routing protocols are proposed. This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET.
Cite this paper: Kashif Nazir, M. , Rehman, R. and Nazir, A. (2016) A Novel Review on Security and Routing Protocols in MANET. Communications and Network, 8, 205-218. doi: 10.4236/cn.2016.84020.
References

[1]   Abdalla, G.M., Abu-Rgheff, M.A. and Senouci, S.M. (2007) Current Trends in Vehicular ad Hoc Networks. Ubiquitous Computing and Communication Journal, 1-9.

[2]   Abolhasan, M., Wysocki, T. and Dutkiewicz, E. (2004) A Review of Routing Protocols for Mobile Ad Hoc Networks. Ad Hoc Networks, 2, 1-22.
http://dx.doi.org/10.1016/S1570-8705(03)00043-X

[3]   Al-Omari, S.A.K. and Sumari, P. (2010) An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications. arXiv Preprint arXiv:1003.3565

[4]   Biradar, R.C. and Manvi, S.S. (2011) Agent-Driven Backbone Ring-Based Reliable Multicast Routing in Mobile Ad Hoc Networks. Communications, IET, 5, 172-189.
http://dx.doi.org/10.1049/iet-com.2010.0002

[5]   Chlamtac, I., Conti, M. and Liu, J.J.-N. (2003) Mobile ad Hoc Networking: Imperatives and Challenges. Ad Hoc Networks, 1, 13-64.
http://dx.doi.org/10.1016/S1570-8705(03)00013-1

[6]   de Morais Cordeiro, C. and Agrawal, D.P. (2002) Mobile Ad Hoc Networking.

[7]   Gagandeep, A. and Kumar, P. (2012) Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review. International Journal of Engineering and Advanced Technology (IJEAT), 1, 269-275.

[8]   Garg, N., Aswal, K. and Dobhal, D.C. (2012) A Review of Routing Protocols in Mobile Ad Hoc Networks. International Journal of Information Technology, 5, 177-180.

[9]   Ghosekar, P., Katkar, G. and Ghorpade, P. (2010) Mobile Ad Hoc Networking: Imperatives and Challenges. IJCA Special Issue on “Mobile Ad Hoc Networks”, MANETs.

[10]   Ghosh, C., Jana, D. and Bhaumik, B.B. (2011) Security Challenges in Reactive Mobile Ad Hoc Network. India Conference (INDICON), 2011 Annual IEEE, 16-18 December 2011.
http://dx.doi.org/10.1109/indcon.2011.6139352

[11]   Goyal, P., Parmar, V. and Rishi, R. (2011) Manet: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of Computational Engineering & Management, 11, 32-37.

[12]   Gupta, A.K., Sadawarti, H. and Verma, A.K. (2011) A Review of Routing Protocols for Mobile Ad Hoc Networks. SEAS Transactions on Communications, 10, 331-340.

[13]   Haboub, R. and Ouzzif, M. (2012) Secure and Reliable Routing in Mobile Adhoc Networks. arXiv Preprint arXiv:1203.2044

[14]   Yang, H., Luo, H.Y., Ye, F., Lu, S.W. and Zhang, L.X. (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. Wireless Communications, 11, 38-47.
http://dx.doi.org/10.1109/MWC.2004.1269716

[15]   Sun, J.-Z. (2001) Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. International Conferences on the Info-Tech and Info-Net, Beijing, 29 October-1 November 2001.
http://dx.doi.org/10.1109/icii.2001.983076

[16]   Komninos, N., Vergados, D. and Douligeris, C. (2006) Layered Security Design for Mobile Ad Hoc Networks. Computers & Security, 25, 121-130.
http://dx.doi.org/10.1016/j.cose.2005.09.005

[17]   Koutsonikolas, D., Das, S., Charlie, H.Y. and Stojmenovic, I. (2007) Hierarchical Geographic Multicast Routing for Wireless Sensor Networks. International Conference on Sensor Technologies and Applications, Valencia, 14-20 October 2007, 449-466.

[18]   Li, W. and Joshi, A. (2008) Security Issues in Mobile Ad Hoc Networks: A Survey. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 1-23.

[19]   Panda, I. (2012) A Survey on Routing Protocols of Manets by Using Qos Metrics. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 120-129.

[20]   Papadimitratos, P. and Haas, Z.J. (2003) Securing Mobile Ad Hoc Networks. CRC Press, Inc., Boca Raton.

[21]   Royer, E.M. and Toh, C.-K. (1999) A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 6, 46-55.
http://dx.doi.org/10.1109/98.760423

[22]   Ruta, M., Zacheo, G., Grieco, L., Noia, T., Boggia, G., Tinelli, E., Sciascio, E., et al. (2010) Semantic-Based Resource Discovery, Composition and Substitution in IEEE 802.11 Mobile Ad Hoc Networks. Wireless Networks, 16, 1223-1251.
http://dx.doi.org/10.1007/s11276-009-0199-5

[23]   Sanchez, J.A., Ruiz, P.M. and Stojmenovic, I. (2006) GMR: Geographic Multicast Routing for Wireless Sensor Networks. 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, 28 September 2006, 20-29.

[24]   Sen, S., Clark, J.A. and Tapiador, J.E. (2010) Security Threats in Mobile Ad Hoc Networks. In: Al-Sakib, K.P., Ed., Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, Boca Raton, 127-145.
http://dx.doi.org/10.1201/EBK1439819197-9

[25]   Singh, G. Security Threats and Maintaince in Mobile Ad Hoc Networks.

[26]   Tamilarasi, M., Chandramathi, S. and Palanivelu, T. (2001) Efficient Energy Management for Mobile Ad Hoc Networks. Ubiquitous Computing and Communication Journal, 3, 12-19.

[27]   Hong, X.Y., Xu, K.X. and Gerla, M. (2002) Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network, 16, 11-21.
http://dx.doi.org/10.1109/MNET.2002.1020231

 
 
Top