A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET

A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET

Parthasarathy Ramadass, Manjula Sankar, Shanmugapriyan J.
Copyright: © 2021 |Volume: 12 |Issue: 1 |Pages: 11
ISSN: 1947-8208|EISSN: 1947-8216|EISBN13: 9781799861829|DOI: 10.4018/IJKSS.2021010103
Cite Article Cite Article

MLA

Ramadass, Parthasarathy, et al. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET." IJKSS vol.12, no.1 2021: pp.37-47. http://doi.org/10.4018/IJKSS.2021010103

APA

Ramadass, P., Sankar, M., & Shanmugapriyan J. (2021). A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET. International Journal of Knowledge and Systems Science (IJKSS), 12(1), 37-47. http://doi.org/10.4018/IJKSS.2021010103

Chicago

Ramadass, Parthasarathy, Manjula Sankar, and Shanmugapriyan J. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET," International Journal of Knowledge and Systems Science (IJKSS) 12, no.1: 37-47. http://doi.org/10.4018/IJKSS.2021010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A collection of mobile nodes deployed with a temporary intention is called mobile ad hoc network (MANET). Every deployed node has the capable of connecting the network communication, and every node has the capable of configuring network communication. There are many routing procedures to discover the proper route from source to destination. The routing protocol helps to channelize the route from one point to other for establishment of the communication. This paper discusses the detailed and the elaborated study of the MANET security issues and the various routing protocols. Moreover, it describes about the OSI model with the relationship of security systems. The elaborated and the detailed approach of the various protocol helps to build a progressive idea of the MANET security. Various issues and the overcomes help to find the loopholes of the threats, and it clearly explains the analysis of the MANET efficiency. The simulation analysis helps to know the comparison analysis of various protocols.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.