A survey on MANETs: architecture, evolution, applications, security issues and solutions

Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dy...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Najeeb, Athaur Rahman, Yaacob, Mashkuri
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science, Jogjakarta, Indonesia 2018
Subjects:
Online Access:http://irep.iium.edu.my/66897/7/66897%20A%20Survey%20on%20MANETs.pdf
http://irep.iium.edu.my/66897/
https://www.iaescore.com/journals/index.php/IJEECS/article/view/13358/9524
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on the evolution of MANETs followed by its significance in various fields. Besides, the MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated.