Reference Hub3
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks

A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks

Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati
Copyright: © 2018 |Volume: 12 |Issue: 2 |Pages: 8
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543077|DOI: 10.4018/IJISP.2018040103
Cite Article Cite Article

MLA

Swain, Jhum, et al. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks." IJISP vol.12, no.2 2018: pp.38-45. http://doi.org/10.4018/IJISP.2018040103

APA

Swain, J., Pattanayak, B. K., & Pati, B. (2018). A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks. International Journal of Information Security and Privacy (IJISP), 12(2), 38-45. http://doi.org/10.4018/IJISP.2018040103

Chicago

Swain, Jhum, Binod Kumar Pattanayak, and Bibudhendu Pati. "A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks," International Journal of Information Security and Privacy (IJISP) 12, no.2: 38-45. http://doi.org/10.4018/IJISP.2018040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysis on their performance. After detailed analysis and comparison, it was observed that when security features are imposed at different levels during routing, various protocols perform in different ways. Also, the network performance and network life times vary from one approach to another. So, this article also presents the effect of security features on data drop and delay of prominent protocols after simulation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.