Professional Documents
Culture Documents
net/publication/323967539
CITATIONS READS
0 12,750
1 author:
Ankur Bang
Sardar Vallabhbhai National Institute of Technology
9 PUBLICATIONS 56 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ankur Bang on 23 March 2018.
Abstract- This review paper focus on Wireless Ad communication technology to deal with the
Hoc networks where I took review of its types, unexpected conditions emerged. Ad hoc networks
applications and security goals. The concept of help to reduce administrative cost. Wireless ad hoc
dynamic mobility is also introduced in Ad Hoc network
network because nodes are moving from one place to
another place, within this network any node can join
the network and can leave the network at any time. A
wireless ad hoc network is a decentralized type of is a special structure of the wireless communication
wireless network. The network is ad hoc because it network, whose communication relies on their
does not rely on a pre existing infrastructure, such as cooperation among the nodes and achieves it in the
routers in wired networks or access points in manner of wireless multi-hop. Therefore, this kind of
managed (infrastructure) wireless networks. The network does not rely on any fixed infrastructure, and
decentralized nature of wireless ad-hoc networks has the properties of self-organizing and self-
makes them suitable for a variety of applications managing.
where central nodes can't be relied on and may
improve the scalability of networks compared to
wireless managed networks. Wireless Ad hoc
networks are networks in which communication links
are based on wireless technologies and the network
structure or topology is not pre-defined rather build
through dynamic network connectivity.
128
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
129
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
3. APPLICATIONS
130
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
or oil pipelines. networking is not only the Ad hoc network itself, but
the bridge it provides into other networks.
A disaster alert system that uses WSN and Analytic
Network Process (ANP) to predict any possible 1) Availability: Availability means the assets are
landslides disasters is proposed. In the authors accessible to authorized parties at appropriate times.
proposed a flashflood alerting system based on a Availability applies both to data and to services. It
WSN in a rural area. Regarding the work done for ensures the survivability of network service despite
post disaster scenarios, in the authors proposed a denial of service attack.
multi-agent system based WSN approach for crisis
management. In the authors evaluated using 2) Confidentiality: Confidentiality ensures that
autonomous mobile robots to deploy a WSN in a computer-related assets are accessed only by
disaster area. authorized parties. Protection of information which is
exchanging through a MANET. It should be protected
3.3 Applications of Wireless Mesh Network against any disclosure attack like eavesdropping-
Mesh networks may involve either fixed or mobile unauthorized reading of message.
devices. Due to their versatility, WMNs can
efficiently satisfy The needs of multiple applications. 3) Integrity: Integrity means that assets can be
The solutions are as diverse as communication needs, modified only by authorized parties or only in
for example in difficult environments such as authorized way.. Integrity assures that a message
emergency situations, tunnels, oil rigs, battlefield being transferred is never corrupted.
surveillance, high speed mobile video applications on
board public transport or real time racing car 4) Authentication: Authentication is essentially
telemetry. Some current applications: assurance that participants in communication are
authenticated and not impersonators. The recourses of
Electric meters now being deployed on residences network should be accessed by the authenticated
transfer their readings from one to another and nodes.
eventually to the central office for billing without the
need for human meter readers or the need to connect 5) Authorization: This property assigns different
the meters with cables. access rights to different types of users. For example a
network management can be performed by network
U.S. military forces are now using wireless mesh administrator only.
networking to connect their computers, mainly
ruggedized laptops, in field operations. 6) Non-repudiation: Non-repudiation will facilitate the
ability to identify the attackers even after the attack
The 66-satellite Iridium constellation operates as a happens. This prevents cheaters from denying their
mesh network, with wireless links between adjacent crimes. This ensures that the information originator
satellites. Calls between two satellite phones are cannot deny having sent the message.
routed through the mesh, from one satellite to another
across the constellation, without having to go through 5. CONCLUSION
an earth station.The laptops in the One Laptop per In this paper our main goal to make review of
Child program use wireless mesh networking to Wireless Ad Hoc networks where we study different
enable students to exchange files and get on the types of network namely MANET, WMN, WSN and
Internet even though they lack wired or cell phone or subtypes of MANET namely VANET, IMANET,
other physical connections in their area. InVANET. So the study of this network will be
helpful to understand Ad Hoc networks and its
4. SECURITY GOALS various application area and security goals.
Security is an essential requirement in Wireless ad
hoc networks as compared to wired networks. As we know wireless devices are getting more and
Security is an important issue for ad hoc networks, more popular in coming days. So in future we must
especially for those security-sensitive applications. have to concentrate on improving more effective and
Security in wireless network is becoming more and accurate communication of these networks.
more important while the using of mobile equipments
such as cellular phones or laptops is tremendously 6. ACKNOWLEDGMENTS
increasing. I would like to thank all those people who made this
review paper possible and an unforgettable experience
Security in MANETs is challenging task and difficult for me. I avail this opportunity to express my
to achieve as there is no central server and base gratitude and whole hearted thanks to Guide Prof. A.
station. In fact, the security hole provided by Ad hoc O. Bang, and also thank him for the systematic
131
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
guidance and friendly advice during the review paper Position Paper, PAMPAS Workshop, Sept. 16/17
work. 2002.
[13] Bimal H Patel, Parth D Shah, Harikrishna B
I acknowledge my overwhelming gratitude and Jethva, Nishidh Chavda, “Issues and
respect to H.O.D., Prof. V. P. Narkhede and sincere Imperatives of Ad hoc
thanks and respect to Principal, Dr. P. M. Networks”, International Journal of
Jawandhiya who giving me support and Computer Applications (0975 – 8887)
encouragement whenever I was in need. Volume 62 – No.13, January 2013.
REFERENCES
[1] S.Ganesan, B.Loganathan “A Survey of Ad-Hoc
Network: A Survey” International Journal of Miss. Monika G. Ghorale Student of First year M.E.
Computer Trends and Technology (IJCTT) – (Computer Science and Engineering) Pankaj Laddhad
volume 4 Issue 8– August 2013. Institute of Technology and Management Studies,
[2] K. Biswas and Md. Liaqat Ali, “Security threats Buldana. Sant Gadge Baba Amravati University. Has
in Mobile Ad-Hoc Network”, Master Thesis, earned degree of B.E (Computer Science and
Blekinge Institute of Technology” Sweden, 22nd Engineering) from Sant Gadge Baba Amravati
March 2007. University in 2014.
[3] M. Conti and S. Giordano. “Mobile Ad Hoc
Networking: Milestones, Challenges, and New
Research Directions” IEEE Communications
Magazine, Vol. 52, pp. 85-96. 2014.
[4] www.techoprdia.com/defination/14527/wireless
ssensor-Network-wmn, “Wireless sensor
network”.
[5] Pragya Singhal, Rakesh Kumar, “Analyzing Prof. A. O. Bang Assistant Professor and M.E. Co-
Misbehavior of Selfish Nodes in Mobile Ad hoc ordinator Computer Science and Engineering
Network”, International Journal of Computer Department, Pankaj laddhad Institute of technology
Applications (0975 – 8887) Volume 64 – No.3, and management studies, Buldana. Has earned M.E.
February 2013. (CSE) from Amravati University, Amravati and
[6] www.wikipedia.org/wik/Wireless-sensor- B.E.(CSE) From Amravati university, Amravati.
networks- “Wireless Sensor Network”.
[7] Sukumaran S, Venkatesh. J and Arunkorath, “A
Survey Of Methods to mitigate Selfishness in
Mobile Ad hoc Networks” IJICT, Vol 1, Issue
No. 2, June 2011.
[8] www.techoprdia.com/defination/14527/wirelesss
mesh-network-wmn,” Wireless mesh network”.
Engineering & Management, Vol. 11, January
2011.
[9] Senthilkumar P., Baskar M. and Saravanan K., “A
Study On Mobile Ad-Hock Networks
(MANETS)”, JMS, Vol. No.1,Issue No.1,
September 2011.
[10] D. A. McEntire, “Disaster Response and
Recovery”, Wiley. 2007.
[11] K. Biswas and Md. Liaqat Ali, “Security threats
in Mobile Ad-Hoc Network”, Master Thesis,
Blekinge Institute of Technology” Sweden,
22nd March 2007.
[12].V. Jani, “Security within Ad-Hoc Networks,”
132