Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

Mamata Rath (Birla Global University, India), Bibudhendu Pati (Rama Devi Women's University, India) and Jhum Swain (Centurion University of Technology and Management, India)
DOI: 10.4018/978-1-5225-9554-0.ch008
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.
Chapter Preview


When there is some difficulty in communication system in a network environment, the best solution is offered by MANET where it is possible to create communication even in the absence of physical infrastructure. MANET is a specially designed wireless network that supports connectivity in very critical situations such as during hardware break down or where physical connection is a major issue. Because of high effectiveness of MANET and VANET based networks and their self-sufficient nodes, they can provide communication facility smoothly in such cases. Due to multi-jump transfer capability in appropriated way these MANETs(Rath, 2014) are critical in calamity circumstances, for example, combat zone for communication, military condition and cataclysmic events. Headway of technology with situation has been developed in numerous structures in current remote communication((L.K. Shar, 2015). Because of unstable network topology, and developments of nodes dependably change powerfully in numerous ways, it is absolutely hard to control and oversee such an incautious circumstance and communicating with neighbor nodes with propose co-activity is another dreary issue. Administration of Quality of Service and its reasonable control is additionally empowering.

Figure 1.

A general MANET scenario with device connectivity


Figure 1 A general MANET scenario with device connectivity where a sender device sends information to its neighbor device and then the messages is forwarded through intermediate nodes. During data communication from sender to beneficiary, there are numerous requirements in the way containing way discovering, node choosing, identification of connection disappointments, route upkeep, route repair, holding steering tables and to take amend choice of parcel quickening towards the heading of correct goal. Motivation behind the current survey article has been drawn from various security challenges (Rath, 2018) and vulnerability in Ad-hoc Networks both in MANET and VANET.

Organisation of the Chapter

Section 1 presents the introduction part that describes the MANET and VANET concept with challenges in their routing strategies. Section 2 presents security protocols with different techniques used for routing in MANET and VANET. Section 3 offers a description of Key Factors Used in MANET and VANET for Security Evaluation. Next section 4 narrates Safekeeping Approaches Used in MANET and VANET Protocols. Section 5 offers explanation of Protection and Confidentiality preserving scheme in VANET and the last segment offers the conclusion part.

Complete Chapter List

Search this Book: