Mobile Ad hoc Networks Challenges
Abstract
Now adays Mobile Ad Hoc Networks are becoming a major immerging technology in mobile computing. In this paper we focus on the evolution of the MANET, the challenges in it and a wide area of its applications. In the first section we provide a brief information about the history and evolution of MANET , next to it we discuss the major challenges in Mobile Ad Hoc Networks and towards the end we mentioned some of the application of MANET.
References
Lecture Notes, “Broadband Computer Networks,†by Prof. Zhisheng Niu, Tsinghua University, 2003.
Gang Wang and Guodong Wang, An Energy Aware Geographic Routing Protocol for Mobile Ad Hoc Networks, Int J Software informatics, Vol. 4, No. 2, June 2010, pp. 183-196.
M. Frodigh, P. Johansson, and P. Larsson.―Wireless ad hoc networking: the art of networking without a network,Ç
Ericsson Review, No.4, 2000, pp. 248-263.
Magnus Frodigh, Per Johansson and Peter Larsson. Wireless ad hoc networking— the art of networking without a net-work.
E. M. Royer and C-K Toh , ―A review of Current routing protocols for Ad Hoc Mobile Wireless.
Chlamtac, I., Conti, M., and Liu, J. J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp. 13–6.
HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks: Challenges and solutions,Ç, Pg. 38-47, Vol 11, issue 1, Feb 2004.
The Hand book of AdHoc Wireless Networks (chapter 30), CRC press LLC, 2003.
M. A. Jan, P. Nanda, M. Usman, and X. He, “PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks,†Concurrency and Computation: Practice and Experience, “acceptedâ€, 2016.
M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol†Computer Networks, Vol. 74, PP-92-102, 2014.
M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network†in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.
M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment†in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â