Abstract
In Mobile ad hoc Networks (MANETs), discovering the stable, reliable and secure routes is a difficult analysis downside because of the open medium and dynamic topology. Most of the recent ways didn’t solve the entire downside of data loss in MANETs as they targeted on distinguishing the malicious nodes and forestall them from electronic communication method solely. There are many different reasons corresponding to mobility and congestion of mobile nodes due to which the data could loss in MANETS. Thus planned theme ETSR is meant by considering these parameters so as to provide a more stable, reliable and secure routes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
IEEE Std 802.11-2007. IEEE standard for information technology- Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications, June 2007
Loo, J., Mauri, J.L., Ortiz, J.H. (eds.): Mobile Ad Hoc Networks: Current Status and Future Trends. CRC, Boca Raton (2011)
Guan, Q., Yu, F.R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Tech. 61(6), 2674–2685 (2012)
Yu, F.R., Tang, H., Bu, S., Zheng, D.: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2013, 188–190 (2013)
Wang, Y., Yu, F.R., Tang, H., Huang, M.: A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 13(3), 1616–1627 (2014)
Chapin, J., Chan V.W.: The next 10 years of DoD wireless networking research. In: Proceedings IEEE MILCOM, pp. 2155–2245, November 2011
Bu, S., Yu, F.R., Liu, P., Manson, P., Tang, H.: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Technol. 60(3), 1025–1036 (2011)
Bu, S., Yu, F.R., Liu, X.P., Tang, H.: Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans. Wireless Commun. 10(9), 3064–3073 (2011)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secure Comput. 3(4), 386–399 (2006)
Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wireless Commun. 16(2), 24–30 (2009)
Yu, F.R., Tang, H., Mason, P., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manag. 7(4), 258–267 (2010)
Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETS. In: IEEE Transactions on Industrial Electronics, vol. 60, no. 3, March 2013
Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for P2P and mobile ad-hoc networks. In: 2nd Proceedings Workshop Economics of Peer-to-Peer Systems, pp. 1–6, November 2004
Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.C.: Security enhancements for mobile Ad Hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)
Mahmoud, M.M., Lin, X., Shen, X.S.: Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1140–1153 (2013)
Dahshan, H., Irvine, J.: A trust based threshold cryptography key management for mobile ad hoc networks. In: IEEE, pp. 1–5 (2009)
Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sarbhukan, V.V., Lata, R. (2020). Impact of Mobility and Density on Performance of MANET. In: Balaji, S., Rocha, Á., Chung, YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham. https://doi.org/10.1007/978-3-030-28364-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-28364-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28363-6
Online ISBN: 978-3-030-28364-3
eBook Packages: EngineeringEngineering (R0)