Sumit Gwalani

Learn More
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and redundant transmission. These techniques prevent a range of attacks against routing protocols but are expensive to deploy on energy-constrained wireless devices. Experience in(More)
Ad hoc networks meet the demands of spontaneous network setup. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanisms and decision-making. AODV and DSR are the two most widely studied on-demand ad hoc routing protocols. Previous studies have shown limitations of these(More)
As the progression of networks is continues, Mobile ad hoc network (MANET) has become as a new frontier of technology to give anywhere, anytime communication. Because of the features like unreliability of wireless links between nodes, dynamic topology, limited battery power, lack of centralized control and others, the mobile ad hoc networks are more(More)
  • 1