Review Papers | Electronics & Communication Engineering | India | Volume 6 Issue 1, January 2017
Detection and Prevention of Warmhole Attack in MANET: A Review
Surbhi Saxena, Dr. Paresh Rawat
Abstract: The instant development of network takes the concern of researcher to make it more user-friendly. This paper is a review on the wireless network. The wired technology is a conventional approach but now days Wireless technology is most popular approach in. There are many wireless network technologies available like cellular network, ad-hoc network, sensor network. Mobile Ad-hoc network is one of them. MANET works without using any base station, infrastructure and topology. In MANET the nodes uses radio waves in order to transmit and receive the data. MANET also has its own demerits. This paper gives an idea of mobile Ad-hoc Network. Protocol used in MANET and some security issues. This paper also discussed about the types attacks which are possible in mobile ad-hoc network. It seems to be that there is a major issue related to power consumption in mobile ad-hoc network. This paper it gives the reason and the solution related to the power consumption in MANET
Keywords: MANET, Protocols, Attacks, Power consumption
Edition: Volume 6 Issue 1, January 2017,
Pages: 76 - 78
How to Cite this Article?
Surbhi Saxena, Dr. Paresh Rawat, "Detection and Prevention of Warmhole Attack in MANET: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20163987, Volume 6 Issue 1, January 2017, 76 - 78
How to Share this Article?
Similar Articles with Keyword 'MANET'
A Novel Mac Based Congestion Control System for VANET with Adaptive Routing
Mahanthgouda, Sridhara. K
Impact of Radio Propagation Models on the Performance of Routing Protocols in MANET
Minu Kumari, Manisha Jangra
Similar Articles with Keyword 'Protocols'
Survey of Seamless Vertical Handoff Schemes for WiFi/WiMAX Heterogeneous Network
Ajmal Mohammed V M, Prapu Premanath, Lalji Cyriac
A Survey - Energy Efficient Routing Protocols in WSN
Fathima Nasrin KM, Shaniba Asmi
Similar Articles with Keyword 'Attacks'
A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V, M. D. Patil
New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS
Aruna P Adhav, K T Jadhao
Similar Articles with Keyword 'Power consumption'
Realization of Smart City Using 5G Cognitive Radio
Lalit Chettri, Syed Sazad
FIR Interpolation Filter for Multi-Standard Digital Up Converter Using FPGA
Chaithra M. R., Yashwanth N