2018
DOI: 10.5120/ijca2018916859
|View full text |Cite
|
Sign up to set email alerts
|

Review Paper on Mobile Ad-hoc Networks

Abstract: Mobile Ad-hoc networks have been broadly research for many years. Ad-hoc system may be an accumulation from claiming hubs that is joined through a remote medium framing quickly evolving topologies. The infrastructure takes away as well as the dynamic life of these networks anxiety newborn become hard of networking strategies route for staying implemented into orderliness near give capable endto-end communication. Mobile Ad-hoc Network (MANET) is special types of mobile wireless network where the groups of mobi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The wireless communication system between the teleoperation system and the UGV was carried by a mobile ad hoc network (MANET) [41]. The MANET was a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration.…”
Section: Wireless Communication Systemmentioning
confidence: 99%
“…The wireless communication system between the teleoperation system and the UGV was carried by a mobile ad hoc network (MANET) [41]. The MANET was a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration.…”
Section: Wireless Communication Systemmentioning
confidence: 99%
“…Among these attacks, routing attacks have well‐known central focus although they might cause the most destructive damage in MANET . In Reference , encryption is applied on the data by using the symmetric cryptographic technique, which uses same key for encryption and decryption. It also creates digital signature of data by using the asymmetric cryptographic technique from the hash of data.…”
Section: Introductionmentioning
confidence: 99%