Corpus ID: 115135558

Paper on Mobile Ad-hoc Networks

@inproceedings{Vegda2018PaperOM,
  title={Paper on Mobile Ad-hoc Networks},
  author={Hiral Vegda and Nimesh Modi},
  year={2018}
}
Mobile Ad-hoc networks have been broadly research for many years. Ad-hoc system may be an accumulation from claiming hubs that is joined through a remote medium framing quickly evolving topologies. The infrastructure takes away as well as the dynamic life of these networks anxiety newborn become hard of networking strategies route for staying implemented into orderliness near give capable endto-end communication. Mobile Ad-hoc Network (MANET) is special types of mobile wireless network where… Expand

Figures from this paper

References

SHOWING 1-9 OF 9 REFERENCES
A Review Paper on Introduction to Mobile Ad Hoc Networks
TLDR
Routing protocol, challenges and security of ad-hoc networks are discussed, which represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies. Expand
Secure data transmission on MANET by hybrid cryptography technique
TLDR
This paper presents comparison based on simulation of AODV, SAODV routing protocol of MANET with Different parameters like energy, packet delivery ratio and throughput, and proposed cryptographic routing algorithm is implemented through the NS2 network simulation environment. Expand
A Novel Review on Security and Routing Protocols in MANET
TLDR
Different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET are examined. Expand
Hybrid Cryptography for Malicious Behavior Detection and Prevention System for MANETs
  • Shreyas S. Jathe, V. Dhamdhere
  • Computer Science
  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)
  • 2015
TLDR
To reduce network overhead, packet delivery ratio caused by existing system, the concept of (RSA) Rivest, Shamir Adleman and (DES) Data Encryption standard algorithm along with the digital signature is used. Expand
Secure data transfer in MANET using hybrid cryptosystem
  • S. Sivaranjani, S. Rajashree
  • Computer Science
  • International Conference on Information Communication and Embedded Systems (ICICES2014)
  • 2014
TLDR
A hybrid encryption technique to reduce the network overhead caused by digital signature in EAACK is proposed, which detects nodes misbehavior, anomalies in packet forwarding, such as intermediate nodes dropping or delaying packets is Enhanced Adaptive Acknowledgment (EAACK). Expand
Secure data transfer in MANET using symmetric and asymmetric cryptography
  • Raj Kamal Kapur, S. Khatri
  • Computer Science
  • 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
  • 2015
TLDR
The proposed technique protects the data transmitted over the network from snooping, modification, replay and fabrication attack at the application layer and provides confidentiality, integrity, authenticity and non-repudiation to the data. Expand
A secure and efficient certificate based authentication protocol for MANET
TLDR
This paper presents a robust and secure mechanism for authentication of nodes in the MANET based on certificate exchange between the nodes, which uses digital signature with a hash function to maintain the authenticity of certificates. Expand
Improved acknowledgement intrusion detection system in MANETs using hybrid cryptographic technique
  • Trupti Patil, B. Joshi
  • Computer Science
  • 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)
  • 2015
TLDR
A hybrid technique of RSA and AES is used, to make the system more secure as RSA algorithm is used to communicate with the receiver through session key and AES algorithm isused to encrypt this session key, which makes the key moreSecure as a result enhancing the security level. Expand
Ambhaikar, A Novel Selective Encryption Method for Securing Text over Mobile Ad hoc Network, ELSEVIER, 2016
  • 2016