In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult to provide a secure environment in MANET. In this paper we are providing a detailed survey of different kind of attacks and proposed solutions for handling those attacks. This paper also gives a brief comparison of various protocols available for secured routing in MANET.
With the increase in the evolution of wireless communication, the ad-hoc networks are gaining attention and are significantly becoming the technology solutions to the various problems. Mobile ad-hoc Networks (MANETs) are envisaged to grow as a main component in the today 4G architecture, and ad hoc networks are projected to be a significant element of the whole future wireless communication. The MANETs are infrastructure less, self-forming and self-organizing network in which there is no control of any centralized entity. The nodes are free to move around the network with dynamic topology. But this self formation, flexibility and scalability create many challenges and design constraints like hidden terminal, limited bandwidth, limited energy of a node, unpredictable change in the topology etc. Bandwidth and energy are the scarce resources of the network. In order to effectively manage the consumption of bandwidth and energy, an algorithm is proposed which is the extension of traditional Dynamic Source Routing (DSR) reactive routing protocol. The extended protocol applies the mobile agents to carry the data. The proposed work is intended to optimize the bandwidth and making the protocol energy efficient.
A huge amount of generated data is regularly exploding into the network by the users through smartphones, laptops, tablets, self-configured Internet-of-things (IoT) devices, and machine-to-machine (M2M) communication. In such a situation, satisfying critical quality-of-service (QoS) requirements (e.g., throughput, latency, bandwidth, and reliability) is a large challenge as a vast amount of data travels into the network. Nowadays, strict QoS requirements must be satisfied efficiently in many networked multimedia applications when intelligent multi-homed devices are used. Such devices support the concept of multi-homing. To be precise, they have multiple network interfaces that aim to connect and communicate concurrently with different networking technologies. Therefore, many multipath transport protocols are provided to multi-homed devices, which aim (1) to take advantage of several network paths at the transport layer (Layer-4) and (2) to meet the strict QoS requirements for providing low network latency, higher data rates, and increased reliability. To this end, this survey first presents the challenges/problems for supporting multipath transmission with possible solutions. Then, it reviews recent research efforts related to the concurrent multipath transmission (CMT) protocol and the multipath transmission control protocol (MPTCP). It reviews the latest research efforts by considering (1) how a multipath transport protocol operates (i.e., its functionality); (2) in what type of network; (3) what path characteristics it should consider; and (4) how it addresses various design challenges. Furthermore, it presents some lessons learned and discusses open research issues in multipath transport protocols.
As IPv4 addresses are already exhausted before the beginning of Internet of Thing (IoT), IPv6 is widely used to assign unique identity to IoT nodes. In this article, the analysis of different components required in assigning IPv6 addresses to IoT nodes, a survey of IPv6 address assignment schemes and an examination of the different kinds of IPv6 addresses are presented. This article highlights the architectural complexity of IoT technologies, protocol stacks, limitations of IoT nodes, renumbering, multihoming, the merging of IoT network and other challenges towards assigning of IPv6 address to IoT nodes. A comprehensive survey on recent addressing schemes with classification based on allocation tables and spatial information are presented. This survey describes the address allocation mechanism, performance on different metrics, the area of applicability, and the merits and demerits of different addressing schemes. It also describes the future research options addressing IoT.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.