Manets Using Advance DSR Algorithm and Improve The Secure Transmission
Manets Using Advance DSR Algorithm and Improve The Secure Transmission
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 7, July 2013)
I. INTRODUCTION
1.1 MOBILE AD HOC NETWORK
A mobile ad hoc network (MANET) is a group of
devices or nodes that transmit across a wireless
communication medium. Cooperation of nodes is important
to forward packets on behalf of each other when
destinations are out of their direct wireless transmission
range. There will be no centralized control or network
infrastructure for a MANET to be set up, thus is making its
deployment quick and inexpensive. The nodes ability to
move freely ensures a flexible and versatile dynamic
network topology which is another important feature of a
MANET.
Mobile ad-hoc network (MANET) routing protocols
play a fundamental role in a possible future of ubiquitous
devices. Current MANET commercial applications have
mainly been for military applications or emergency
situations. However, we believe that research into MANET
routing protocols will lay the groundwork for future
wireless sensor networks and wireless plug-n-play devices.
213
214
215
REFERENCES
Ashanti Kush,Jinshong Hwang.C, (2009) Proposed Protocol for
Secured Routing in Ad hoc networks ,IEEE Spring Conference ,
pp. 76-81.
[2] Young Fang,(2009) Securing Resource Constrained Wireless Ad
Hoc Networks , IEEE Wireless Communications, pp. 24-29.
[3] Farads Farnoud (Hassanzadeh) and Shahrokh
Valaee,(2009),
Reliable Broadcast of Safety Messages in Vehicular Ad Hoc
Networks, IEEE Infocom. pp. 226-234.
[4] Bo Rong, Hsiao-Hwa Chen, (2009), A Pyramidal Security Model
for Large-Scale Group-Oriented in Mobile Ad Hoc Networks: The
Key Study, IEEE Transactions on Vehicular Technology, pp. 398408.
[5] Jie Liu, Richard Yu.F, (2009), Optimal Combined Intrusion
Detection and Biometric-Based Continuous Authentication in High
Security Mobile Ad Hoc Networks, IEEE Transactions on Wireless
Communications, pp. 806-815.
[6] Qingfeng Feng,,Xiaozhong Liu,Yougbo Yu, (2008), A Secure
Standby Route Mechanism For Ad Hoc Networks, IEEE
International Conference on Communication Proceedings pp. 77-80.
[7] Bin Xie, Anup Kumar Srinivasan.S., (2006), GMSP: A Generalized
Multi-hop Security Protocol for Heterogeneous Multi-hop Wireless
Network, IEEE, pp. 634-639.
[8] Kaveh pahlavan and Prashant Krishnamurthy (2002), Principles of
Wireless Networks a unified approach.
[9] P. Papadimitratos and Z. J. Haas, Secure link state routing for
mobile ad hoc networks, in Proc. IEEE CS Workshop on Security
and Assurance in ad hoc Netw., Orlando, FL, Jan. 2003, pp. 379
383.
[10] of frequently changing network topologies, IEEE Trans. Wireless
Communication., vol. 3, no. 2, pp. 500511, Mar. 2004.
[11] J. R. Douceur, The Sybil attack, In First International Workshop on
Peer-to-Peer Systems (IPTPS 02), American Mathematical Society,
March 2002.
[1]
216