ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : CHALLENGES AND ISSUES of MANET

ISSN : 2394-2231
Year of Publication : 2020

10.29126/23942231/IJCT-v7i6p3
Authors: Hewa Majeed Zangana

         



MLA Style: Hewa Majeed Zangana " CHALLENGES AND ISSUES of MANET " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: Hewa Majeed Zangana " CHALLENGES AND ISSUES of MANET " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
Mobile ad-hoc network’s (MANET’s) are infrastructure less mobile network’s that has no fixed routers. All nodes are capable of movement and can be connected dynamically in an arbitrary manner using radio waves. This paper focuses on study of Mobile ad-hoc Networks (MANET’S), and its classification and characteristics. This paper also focuses on the issues and challenges that are imposed by Mobile ad-hoc Networks (MANET’S).

Reference
[1] ImrichChlamtac a, Marco Conti b, Jennifer J.-N. Liu c, “Mobile ad hoc networking: Imperatives and Challenges”, ELSEVIER, 2003, 13-64. [2] Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003. [3] M. Weiser, “The Computer for the Twenty-First Century”, Scientific American, September 1991. [4] Wenjia Li and Anupam Joshi, Security Issues in Mobile Ad Hoc Networks - A Survey. [5] M.S. Corson, J.P. Maker, and J.H. Cernicione, “Internet-based Mobile Ad Hoc Networking”, IEEE Internet Computing, pages 63–70, July-August 1999. [6] Magnus Frodigh, Per Johansson and Peter Larsson, “Wireless ad hoc networking— The art of networking without a network”, Ericsson Review No. 4, 2000. 248 [7] Mehul, Ekata, and Vikram Limaye. Security in Mobile Ad Hoc Networks. Handbook Mobile Business, 2nd Ed. BhuvanUnhelkar. Hershey: IGI Global, 2009. 541-58. [8] Hamza Aldabbas, Tariq Alwada’n, Helge Janicke, Ali Al-Bayatti,“Data Confidentiality in Mobile Ad hoc Networks”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, February 2012 [9] Subir Kumar Sarkar, T. G. Basavaraju, and C. Puttamadappa. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. Auerbach Publications, Boston, MA, USA, 2007. [10] Jameela Al-Jaroodi. Security issues at the network layer in wireless mobile ad hoc Networks at the network layer. Technical report, Faculty of Computer Science and Engineering, University of Nebraska-Lincoln, Nebraska, USA, 2002. [11] C. Siva Ram Murthy and B.S. Manoj. Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2004. [12] C.K. Toh. Maximum battery life routing to support ubiquitous mobile computing in Wireless ad hoc networks. IEEE communications Magazine, 39 (6): 138–147, 2001. [13] R. Chadha and L. Kant. Policy-driven mobile ad hoc network management. Wiley- IEEE Press, 2007. [14] D. Djenouri, L. Khelladi, and N. Badache. A survey of security issues in mobile ad hoc Networks. IEEE communications surveys, 7 (4), 2005. [15] DRAGAN MLADENOVIĆ, DANKO JOVANOVIĆ. “Mobile ad hoc networks Security”, 5th International scientific Conference on defensive technologies, OTECH 2012. [16] Stephen Mueller, Rose P. Tsang, and Dipak Ghosal “Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges”. [17] Guerin R., Orda A., “QoS-based routing in networks with inaccurate information: Theory and algorithms”, in Proc. IEEE INFOCOM’97, Japan, pp. 75-83. [18] Broch J., Johnson D., Maltz A., “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, draft-ietf-manet-dsr-03.txt, work in progress. October 1999. [19] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade. “Mobile Ad Hoc Networking: Imperatives and Challenges” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010. [20] Y. Zhang and W. Lee. Security in mobile ad-hoc networks. Ad hoc Networks, pages 249–268, Ed. Prasant mohapatraSrikanthv. Krishnamurthy. Springer, 2005. [21] M. Carvalho. Security in mobile ad hoc networks. Security Privacy, IEEE, 6 (2): 72 –75, 2008. [22] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11 (1): 38–47, 2004. [23] D. Djenouri, L. Khelladi, and N. Badache. A survey of security issues in mobile ad hoc networks. IEEE communications surveys, 7 (4), 2005 [24] Ismael Al-Sanjary, O., Abdullah Ahmed, A., Majeed Zangana, H., A.M Ali, M., HazimAlkawaz, M., & Hameed Aldulaimi, S. (2018). An Investigation of the Characteristics and Performance of Hybrid Routing Protocol in (MANET). International Journal of Engineering & Technology, 7(4.22), 49-54. doi:http://dx.doi.org/10.14419/ijet.v7i4.22.22188 [25] H. M. Zangana, "Developing Data Warehouse for Student Information System ( IIUM as a Case Study )," International Organization of Scientific Research, vol. 20, no. 1, pp. 09-14, 2018.

Keywords
Handoff, WLAN, MANET, VANET, PDA, Quality of Services (QoS), Denial of Service (DoS), Multi Hop Router, Non-Repudiation

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)