Sumit Gwalani

Learn More
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and redundant transmission. These techniques prevent a range of attacks against routing protocols but are expensive to deploy on energy-constrained wireless devices. Experience in(More)
— Ad hoc networks meet the demands of spontaneous network setup. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanisms and decision-making. AODV and DSR are the two most widely studied on-demand ad hoc routing protocols. Previous studies have shown limitations of these(More)
Mobile ad hoc network is an emerging trend and it has to face many challenges and issues. Routing in these networks is highly complex due to moving nodes and hence many protocols have been developed. Routing in ad hoc networks is a very challenging issue due to nodes mobility, dynamic topology, frequent link breakage, limitation of nodes (memory, battery,(More)
As the progression of networks is continues, Mobile ad hoc network (MANET) has become as a new frontier of technology to give anywhere, anytime communication. Because of the features like unreliability of wireless links between nodes, dynamic topology, limited battery power, lack of centralized control and others, the mobile ad hoc networks are more(More)
Mobile Ad hoc Networks (MANET) has gained substantial research interest, owing to its easy deployment and inexpensiveness. However, the security of the network is the major concern, because of the absence of the central authority. This work addresses these issues by incorporating the trust mechanism in the cluster formation and routing. The chief node is(More)
  • 1