International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 248

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.8 / 10


     

Routing Protocols & Intrusion Detection Techniques over MANET: A Survey

Preeti Pandey, Atul Barve


Abstract: The main feature that distinguishes the network from malicious wireless network or wired is another mobility and density of the contract. A mobile ad-hoc network (MANET) is a network which is infrastructure less, each node play role of transmitter and receiver data router. Therefore, it has been MANET routing to adapt to the dynamic changes in topology protocols design, while maximizing performance and packet delivery ratio and reduce the delay adds a good start, the anger of the average and minimum packet loss. Current performance of MANET routing protocols on mobility and density factors decade. Results vary when we change the density of the node. This article also provides a survey of the many schemes available intrusion detection dedicated networks. We also described some of the basic attacks in ad hoc network and discuss solutions available.


Keywords: AODV, DSR, DYMO, IDS, MANET, OLSR and ZRP


Edition: Volume 6 Issue 4, April 2017


Pages: 1089 - 1092



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Preeti Pandey, Atul Barve, "Routing Protocols & Intrusion Detection Techniques over MANET: A Survey", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 1089-1092, https://www.ijsr.net/getabstract.php?paperid=ART20172480, DOI: https://www.doi.org/10.21275/ART20172480



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Book Chapter, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 836 - 846

A Comprehensive Introduction to SDN Architectural Foundations and Applications

Dr. Yogita Hande, Dr. Rupali Vairagade

Share this Article
Top