SlideShare a Scribd company logo
1 of 8
Download to read offline
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 392
ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
MANET Review: Characteristics, Routing Protocols, Attacks
and Performance Metrics
Saurbh Sharma
Research Scholar
L.R. Institute of Engineering & Technology,
Solan, Himachal
er.saurabhsharma64@gmail.com
Kanchan Bala Jaswak
Assistant Professor
L.R. Institute of Engineering & Technology,
Solan, Himachal
t.kanchan103@gmail.com
Abstract: The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
Keywords: MANET, Routing Protocols, MANET Attacks, Performance Metrics.
I. INTRODUCTION
An ad hoc network is a compilation of mobile nodes producing an immediate network without fixed topology. In these networks,
every node performs routers as well as host concurrently and could join or move out or in the network liberally [1]. This network
does not have any base infrastructures as utilized in the standard networks, but it is suited to the conventional networks. Routing in
MANET (Mobile AD HOC network) is difficult because of the constraints in CPU time, transmission bandwidth battery power and
the need to manage the frequent topological variations resulting from the mobility of the nodes.
In MANET, the mobile nodes need to transfer the packets to each other for enabling the communication between nodes exterior the
transmission range. The network nodes are free to move separately in some direction, leave and link the network randomly [2].
Therefore, a node experiences variations in its link state frequently with other devices. Ultimately, the Ad hoc network mobility
modification of link states and another property of wireless transmission like multipath propagation, attenuation, and interference
so on developing routing protocols operating challenge in MANET [3]. The challenges are improved by different types of devices
of incomplete processing power and capability that might join in the network [4].
Figure 1: Mobile ad hoc Network
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 393
1.1 Characteristics of Mobile ad hoc Network
Mobile Ad hoc network consists of number of characteristics that are defined below in table 1 [5-6]
Table 1: MANET Characteristics
Characteristics Description
Multi hop transmission
 While a source node with the destination node for
a message is away from the transmission range
than the MANETs are able of multi-hop
transmission.
 While transmitting the data packets from a source
to its destination elsewhere from the direct
wireless transmission range, the packets have to
be transmitted via one or more intermediate
nodes.
Autonomous behaviour
 Every node behaves as host as well as the router.
That means a node has the capability of host and
may also execute switching functions like a
router, therefore, switches and endpoints are
indistinguishable.
Dynamically changing topology
 Because of the mobile nodes, the variation in
topology is common and dynamic in nature.
 The connectivity between the nodes might
change with time and dynamically begin routing
between them as they move about.
Distributed nature of operation
 Because the centralized control is missing here,
the operation and control of the network are
dispersed between the nodes.
 The nodes have to be collaborating for
implementing different functions chiefly security
and routing.
Inferior link capacity
 The scalability, reliability, efficiency, and
capacity of wireless links are frequently inferior
when the comparison with wired links takes
place.
 One end to end path could be collected by
different sessions.
 The terminals communicate via a channel which
is subjected to fading, noise, interference and has
low bandwidth as compared to the wired
network.
 This depicts the variable link bandwidth of
wireless links.
Light weight features
 The nodes of MANET are mobile devices with
low capability of CPU processing, less memory
size and less power storage.
Infrastructure absence
 These networks should operate independently of
any permanent infrastructure.
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 394
1.2 MANET Applications
Applications of MANET are defined in table 2 [7]:
Table 2: MANE T Applications
Applications Description
Commercial sector
 It may be utilized in rescue/ emergency
operations for the efforts of natural calamities
relief, like a flood, in fire, or earthquake.
 The rescue operations should take place where
damaged communications infrastructure or non-
existing and rapid deployment of a
communication network is required.
 The Information is transferred from one rescue
team member to another.
Military battlefield
 The military equipment currently has several
computer equipments.
 During ad-hoc networking, the military can take
the benefit of common place network
technology for maintaining an information
network between the soldiers, vehicles, and
military headquarters.
 Generally, the ad-hoc networks techniques came
from this field.
Local Level
 The Ad hoc networks may autonomously
connect temporary and an instant multimedia
network by utilizing palmtop computers or
notebook computers for spreading and sharing
information between participants at a
conference.
 Other suitable local level application could be in
home networks where devices may
communicate for exchanging the information.
PAN (Personal Area Network)
 Short-range MANET can shorten the
intercommunication among different mobile
devices (like laptops, mobile phone, and
wearable computers).
 Conventionally wired cables are replaced by the
wireless connections.
 MANET may also extend for accessing the
Internet or another network via mechanisms
such as Wireless LAN.
II. CLASSIFICATION OF ROUTING PROTOCOLS IN MANET
Routing protocols are termed as a rule set that defines the journey of message packets from source to destination in the network [8].
MANET consists of a variety of routing protocols and is applied as per the network circumstances. Figure 2 defines the general
classification of the MANET routing protocols [9].
2.1 Proactive Routing Protocols/Table Driven Protocols
In this protocol, every node preserves routing table with the information for the network topology even without its need [10]. The
routing tables are efficient sometimes, when, the network topology varies. The proactive protocols are not suitable for huge networks
as it requires for maintaining the node entries for every node in the routing table of every node. There are different proactive routing
protocols. The examples of Proactive routing protocols are OLSR, DSDV, and WRP etc.
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 395
Figure 2: Routing Protocol Classification
2.2 Reactive Routing Protocols/On-Demand Routing Protocols
In this protocol, the route is established whenever it is required. The node starts the route discovery when it is commanded [11].
The route is taken by route discovery initiation procedure by the source node. Reactive Routing Protocols is consisted of below two
components:
i. Route discovery: In this phase, the source node starts the route discovery on demand basis. The source nodes consult
the route cache for the accessible route from the source towards a destination or else if the route is not there it starts
the route discovery. The source node packet has the destination node address as well intermediate nodes address
towards the destination.
ii. Route maintenance- Because of the network dynamic topology, the route cases failure among the nodes arises
because of the link breakage etc, therefore, route maintenance is needed. The reactive protocols have the mechanism
of acknowledgement because of which the route maintenance is possible.
The examples of Reactive protocols are AODV, DSR, TORA, and LMR.
2.3 Hybrid Routing Protocol
Hybrid Routing Protocol is a trade-off between proactive and reactive protocols. The proactive protocol has more overhead and less
latency whereas the reactive protocols have less overhead and more latency [12]. Therefore, this protocol is required for overcoming
the disadvantages proactive as well as reactive routing protocols. Combination of proactive and reactive routing protocol takes place
in hybrid routing protocol [13]. It utilizes the On-demand mechanism of reactive protocol and the mechanism of table maintenance
of proactive protocol for avoiding the problems of latency and overhead in the network. The hybrid protocol is suitable for big
networks where large numbers of nodes are there. In this protocol, the large networks are categorized in zone set where routing
inside the zone is executed by utilizing the proactive method and outside the zone, routing is executed by utilizing the reactive
approach [14].
Table 3: Comparison of MANET Routing Protocols
Protocols Advantages Disadvantages
Proactive  Less information available
 Reduction of latency in the
network
 More overhead
 Routing information is
congested in the entire
network
Reactive  Availability of path when
the required overheads is
less and free from loops
 Enhancement of latency in
the network
Hybrid  Appropriate for big
networks and availability of
advanced information
 Enhancement of complexity
Mobile Ad hoc Network routing
protocols
Table Driven Proactive On-demand Driven Reactive
DSDV, WRP,
CGSR, STAR
etc.
Hybrid
ZRP
ABR, DSR,
TORA, AODV,
CBRP, RDMAR
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 396
III. MANET ATTACKS
There is a number of attacks in MANET that are defined below [15-16]:
Figure 3: MANET Attack Types
There are various kinds of attacks on ad hoc network which are following:
1) Location Disclosure
It is an attack that targets the privacy needs of an ad hoc network. By utilizing the techniques of traffic analysis, simpler monitoring
and probing approaches, an attacker can find the node location or the whole network structure.
2) Black Hole
In a black hole attack, the malicious node fits the false route replies towards the route requests, with the shortest path to a destination.
The fake replies may be fabricated for diverting the network traffic by the malicious node for attracting the traffic towards it for
performing a denial of service attack by removal of the received packets.
3) Replay
A replay attack is known as one of the attacks that reduce strictly the MANET performance. A replay attacker performs this attack
by retransmission and interception of the suitable signed messages. The signed messages validation is verified by a timestamp
discrepancy set by receiver and sender nodes. The replay attack generally attacks the route freshness.
4) Wormhole
It is one of the most influential attacks because it has the cooperation among two malicious nodes which participates in the network.
Consider, node A, capturing the routing traffic at single network point network and tunnel them to another network point, to node
B for sharing a private communication connection with A. The node B then injects the tunneled traffic back to the network. The
connection among the nodes that have developed the routes for the wormhole link is totally under the two conspiring attacker’s
control. The packet control is the solution to this attack.
5) Blackmail
Its attack is applicable besides routing protocols that utilize the identification of malicious nodes mechanisms with the propagation
of messages that attempt to blacklist the attacker. An attacker might build these reporting messages and attempts to separate the
legitimate nodes from the network. The non-repudiation security criteria may be proved to be significant in a number of cases as it
integrates a node to the messages it produced.
IV. RELATED WORK
Alex Hinds et al, focused on the range of available MANET routing protocols and discussed several features ranging from early
protocols (e.g. DSDV) to higher level (e.g. MAODV).Protocol focused on Perkins' efforts to develop and improve MANET routing.
A series of literature related to the MANET routing domain has been identified and reviewed, and the literature review identifies
trends in research papers, such as the exclusive use of a stochastic waypoint movement model, not including key metrics from
simulation results, rather than comparing protocol performance to available alternatives. Arun Biradar, focused on Mobile Ad Hoc
Networks (MANETs) that consists of mobile platforms that are freely mobile. These are self-organizing and adaptive networks.
These networks allow the spontaneous formation and deformation of mobile networks. The shortest path problem in MANETS
requires that the path from the source node to the destination node be calculated, thereby, minimizing the sum of the total costs
associated with the path. Azzedine Boukerchea and Begumhan Turgut, focused on Ad hoc wireless network to accomplish the
difficult task of multi-hop communication in the absence of special infrastructure, the mobile node and change the topology network
environment. It shows different limits for deployment as calorie restriction option, knowledge of the physical location of nodes, in
MANET Attacks
Location
Disclosure
Black Hole Replay Wormhole Black mail
Denial of
Service Black mail
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 397
some cases, such as real-time or multicast traffic, as well as requirements. Bow-Nan Cheng et al, proposed a comparative analysis
of various routing protocols in MANET. Various routing protocols has been analysed like AODV, OLSR and OSPF-MDR. Their
performance has been evaluated in terms of routing overhead traffic, end-to-end message completion rate, and end-to-end delay, to
examine performance vs. Trade-off. Disadvantage: Overall throughput is low. Harjeet Kaur et al, focused on Ad hoc network
(MANETs) that consists of different types of mobile nodes. MANETs are mobile, so the authors connect to the network using a
wireless connection. MANET can be deployed in a variety of applications at low cost. In MANET, different types of routing
protocols have been recommended. These protocols can be divided into three main categories: reaction (on demand), active (table
driven) and hybrid routing protocols, namely AODV, OLSR and ZRP. The research focuses on reactive, active and hybrid routing
protocols such as AODV, OLSR and ZRP. Fabrice Le Fessant et al, has focused on sensor networks with environmental monitoring
as the main application. The main objective is to limit the effect of separation caused by the malicious nodes in such networks. The
authors has focused on routing protocols that depends on tree dependent topology in which the data is send through the sensor node
to the sink via tree rooted at the sink. It has been assumed that the routing tree is developed by means of hop distance to sink. Anjali
et al, showed the performance of AODV, OLSR, and GRP routing protocols for evaluation of FTP-based application traffic based
on the IEEE 802.11, WLAN standard and 48 Mbps data rate. Through the use of OPNET simulator based on a variety of quantitative
measurement - network load, throughput, retransmission attempts and media access delay, by changing the physical characteristics
and the number of nodes are used to evaluate network performance. Bow Nan et al, proposed a comparative analysis of various
routing protocols in MANET. Various routing protocols has been analysed like AODV, OLSR and OSPF-MDR. Their performance
has been evaluated in terms of routing overhead traffic, end-to-end message completion rate, and end-to-end delay, to examine
performance vs. trade off. John et al, proposed an algorithm for routing in MANET. In the proposed algorithm, some of the selfish
nodes take place in route discovery. In this method, data that has to be send must be in encrypted form and contained the destination
address in the message that has been sent.
V. PERFORMANCE METRICS IN MANET
The performance Metrics are considered as the measurements in MANET for analysing the routing protocols performance [17].
These are significant for evaluating the network performance. It elaborates how better the network is executing under a variety of
parameters [18]. The performance metrics can be classified into below two types:
a) Quantitative Metrics
It is considered as the numerical measurement of the network performance. It can be described in numbers like Number of delays;
Number of nodes, Number of bytes being transmitted and so on.
b) Qualitative Metrics
It is a quality measurement of the network performance. Quality can be calculated for Route Acquisition Time, Throughput and
Packet out of delivery etc. Few performance metrics are:
i. Throughput
It is defined as the number of bits transferred for each unit time.
ii. Packet Delivery Ratio
It is defined as the total number of packet delivered for a total number of packet sent.
iii. End to End Delay
It is defined as the time taken by the packet for reaching the destination. The parameters that affect the performance are propagation
delay, transmission delay, average delay, and processing delay.
iv. Jitter
Jitter is also termed as a delay. It occurs establishes because of improper setting of the network, network congestion and so on.
v. Packet Loss
It elaborates the number of bits lost because of the relay.
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 398
Table 4: MANET Performance Metrics
Metrics Formula
Throughput 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑒𝑟 𝑢𝑛𝑖𝑡 𝑜𝑓 𝑡𝑖𝑚𝑒
Packet delivery ratio 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡
End to End delay 𝑇𝐼𝑚𝑒 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡 − 𝑇𝑖𝑚𝑒 𝑡ℎ𝑒 𝑝𝑎𝑐𝑘𝑒𝑡 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
Jitter [{(𝑃𝐴 + 1) − 1(𝑃𝑆 − 1)} − {(𝑃𝐴) − (𝑃𝑆)}
𝑁 − 1
Where PA=Packet arrival, PS=Packet Start
Packet Loss 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡
− 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
VI. CONCLUSION
This paper has reviewed the MANET (Mobile ad hoc network) infrastructure. Initially, a brief introduction is discussed following
the characteristics and applications for understanding more about MANET. MANET consists of a number of routing protocols that
are analysed with its examples and types. The comparison of routing protocols with its advantages and disadvantages has been
discussed. Later, the attacks undertaken in MANET are studied. The solutions related to these issues are significant to accomplish
the wide commercial deployment requirements of MANET. We have examined the performance metrics utilized for the analysis of
the network.
REFERENCES
[1] Alex Hinds, Michael Ngulube, Shaoying Zhu, “A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET)”,
International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
[2] John, P.M.; Vivekananda, P., “A framework for secure routing in Mobile Ad hoc Networks,” in Advances in Engineering,
Science and Management (ICAESM), 2012 International Conference on, vol., no., pp.453-458, 30-31 March 2012.
[3] Giordano S, “Mobile ad hoc networks,” Handbook of wireless networks and mobile computing, pp. 325-46, 2002.
[4] Mauve M, Widmer J, Hartenstein H, “A survey on position-based routing in mobile ad hoc networks,” IEEE network, Vol.
15, Issue 6,2001.
[5] Ghosekar P, Katkar G, Ghorpade P, “Mobile ad hoc networking: imperatives and challenges”, IJCA Special issue on
MANETs, 2010.
[6] Mamatha GS, Sharma DS, “Analyzing the MANET variations, Challenges, Capacity and protocol issues”, International
Journal of Computer Science & Engineering Survey (IJCSES), Vol.1, Issue 1, pp.14-21, 2010.
[7] Jiazi YI, “A Survey on the Applications of MANET”, Polytech Nantes, pp. 721-726, 2008.
[8] ArunBiradar, “Effectiveness of Genetic Algorithm in Reactive Protocols for MANET”, International Journal of
Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2, Issue 7, July 2013.
[9] AzzedineBoukerchea, BegumhanTurgut, “Routing protocols in ad hoc networks: A survey”, 2011 Elsevier
doi:10.1016/j.comnet.2011.05.010
[10]Bow-Nan Cheng; Moore, S., “A comparison of MANET routing protocols on airborne tactical networks”, in Military
Communications Conference – (MILCOM’12), vol., no., pp.1-6, Oct. 29, 2012, Nov. 1, 2012.
[11]HarjeetKaur, VarshaSahni, Dr.ManjuBala, “A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A
Review”, in International Journal of Computer Science and Information Technologies, (IJCSIT), Vol. 4 (3), pp. 498-500,
2013.
[12]Fabrice Le Fessant, Antonis Papadimitriou, Aline Carneiro Viana, Cigdem Sengul, Esther Palomar, “A sinkhole resilient
protocol for wireless sensor networks: Performance and security analysis”, Computer Communications vol.35, 2012, pp.
234–248.
Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 399
[13]Anjali, Maninder Singh, “Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE
802.11 Standard”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.12, September 2012.
[14]Bow-Nan Cheng; Moore, S., “A comparison of MANET routing protocols on airborne tactical networks,” in Military
Communications Conference, 2012 - MILCOM 2012, vol., no., pp.1-6, Oct. 29 2012-Nov. 1 2012
[15]Faisal M, Kumar M, Ahmed A, “Attacks In MANET,” International Journal of Research in Engineering and Technology,
Vol. 2, Issue 10,pp.273-6,2013.
[16]Nandy R, Roy DB, “Study of various attacks in MANET and elaborative discussion of rushing attack on DSR with
clustering scheme,” International Journal of Advanced Networking and Applications, Vol.3, Issue1):1035, 2011.
[17]Devi R, Sumathi B, Gandhimathi T, Alaiyarasi G, “Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc
Network Routing Protocols,” Proceedings of International Journal of Computational Engineering Research, pp.2250-3005,
2008.
[18]Vetrivelan N, Reddy AV, “Performance analysis of three routing protocols for varying MANET size,” Proceedings of the
International MultiConference of Engineers and Computer Scientists, Vol. 2, pp. 19-21,2008.

More Related Content

What's hot

PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 

What's hot (17)

eaodv
eaodveaodv
eaodv
 
O26087092
O26087092O26087092
O26087092
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
50120130405022
5012013040502250120130405022
50120130405022
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Mane ts
Mane tsMane ts
Mane ts
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 

Similar to Manet review characteristics, routing protocols, attacks and performance metrics

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETIRJET Journal
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to Manet review characteristics, routing protocols, attacks and performance metrics (20)

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 
H010524049
H010524049H010524049
H010524049
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Manet review characteristics, routing protocols, attacks and performance metrics

  • 1. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 392 ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com MANET Review: Characteristics, Routing Protocols, Attacks and Performance Metrics Saurbh Sharma Research Scholar L.R. Institute of Engineering & Technology, Solan, Himachal er.saurabhsharma64@gmail.com Kanchan Bala Jaswak Assistant Professor L.R. Institute of Engineering & Technology, Solan, Himachal t.kanchan103@gmail.com Abstract: The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET with its applications and characteristics, its routing protocols, attacks and its performance parameters. Keywords: MANET, Routing Protocols, MANET Attacks, Performance Metrics. I. INTRODUCTION An ad hoc network is a compilation of mobile nodes producing an immediate network without fixed topology. In these networks, every node performs routers as well as host concurrently and could join or move out or in the network liberally [1]. This network does not have any base infrastructures as utilized in the standard networks, but it is suited to the conventional networks. Routing in MANET (Mobile AD HOC network) is difficult because of the constraints in CPU time, transmission bandwidth battery power and the need to manage the frequent topological variations resulting from the mobility of the nodes. In MANET, the mobile nodes need to transfer the packets to each other for enabling the communication between nodes exterior the transmission range. The network nodes are free to move separately in some direction, leave and link the network randomly [2]. Therefore, a node experiences variations in its link state frequently with other devices. Ultimately, the Ad hoc network mobility modification of link states and another property of wireless transmission like multipath propagation, attenuation, and interference so on developing routing protocols operating challenge in MANET [3]. The challenges are improved by different types of devices of incomplete processing power and capability that might join in the network [4]. Figure 1: Mobile ad hoc Network
  • 2. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 393 1.1 Characteristics of Mobile ad hoc Network Mobile Ad hoc network consists of number of characteristics that are defined below in table 1 [5-6] Table 1: MANET Characteristics Characteristics Description Multi hop transmission  While a source node with the destination node for a message is away from the transmission range than the MANETs are able of multi-hop transmission.  While transmitting the data packets from a source to its destination elsewhere from the direct wireless transmission range, the packets have to be transmitted via one or more intermediate nodes. Autonomous behaviour  Every node behaves as host as well as the router. That means a node has the capability of host and may also execute switching functions like a router, therefore, switches and endpoints are indistinguishable. Dynamically changing topology  Because of the mobile nodes, the variation in topology is common and dynamic in nature.  The connectivity between the nodes might change with time and dynamically begin routing between them as they move about. Distributed nature of operation  Because the centralized control is missing here, the operation and control of the network are dispersed between the nodes.  The nodes have to be collaborating for implementing different functions chiefly security and routing. Inferior link capacity  The scalability, reliability, efficiency, and capacity of wireless links are frequently inferior when the comparison with wired links takes place.  One end to end path could be collected by different sessions.  The terminals communicate via a channel which is subjected to fading, noise, interference and has low bandwidth as compared to the wired network.  This depicts the variable link bandwidth of wireless links. Light weight features  The nodes of MANET are mobile devices with low capability of CPU processing, less memory size and less power storage. Infrastructure absence  These networks should operate independently of any permanent infrastructure.
  • 3. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 394 1.2 MANET Applications Applications of MANET are defined in table 2 [7]: Table 2: MANE T Applications Applications Description Commercial sector  It may be utilized in rescue/ emergency operations for the efforts of natural calamities relief, like a flood, in fire, or earthquake.  The rescue operations should take place where damaged communications infrastructure or non- existing and rapid deployment of a communication network is required.  The Information is transferred from one rescue team member to another. Military battlefield  The military equipment currently has several computer equipments.  During ad-hoc networking, the military can take the benefit of common place network technology for maintaining an information network between the soldiers, vehicles, and military headquarters.  Generally, the ad-hoc networks techniques came from this field. Local Level  The Ad hoc networks may autonomously connect temporary and an instant multimedia network by utilizing palmtop computers or notebook computers for spreading and sharing information between participants at a conference.  Other suitable local level application could be in home networks where devices may communicate for exchanging the information. PAN (Personal Area Network)  Short-range MANET can shorten the intercommunication among different mobile devices (like laptops, mobile phone, and wearable computers).  Conventionally wired cables are replaced by the wireless connections.  MANET may also extend for accessing the Internet or another network via mechanisms such as Wireless LAN. II. CLASSIFICATION OF ROUTING PROTOCOLS IN MANET Routing protocols are termed as a rule set that defines the journey of message packets from source to destination in the network [8]. MANET consists of a variety of routing protocols and is applied as per the network circumstances. Figure 2 defines the general classification of the MANET routing protocols [9]. 2.1 Proactive Routing Protocols/Table Driven Protocols In this protocol, every node preserves routing table with the information for the network topology even without its need [10]. The routing tables are efficient sometimes, when, the network topology varies. The proactive protocols are not suitable for huge networks as it requires for maintaining the node entries for every node in the routing table of every node. There are different proactive routing protocols. The examples of Proactive routing protocols are OLSR, DSDV, and WRP etc.
  • 4. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 395 Figure 2: Routing Protocol Classification 2.2 Reactive Routing Protocols/On-Demand Routing Protocols In this protocol, the route is established whenever it is required. The node starts the route discovery when it is commanded [11]. The route is taken by route discovery initiation procedure by the source node. Reactive Routing Protocols is consisted of below two components: i. Route discovery: In this phase, the source node starts the route discovery on demand basis. The source nodes consult the route cache for the accessible route from the source towards a destination or else if the route is not there it starts the route discovery. The source node packet has the destination node address as well intermediate nodes address towards the destination. ii. Route maintenance- Because of the network dynamic topology, the route cases failure among the nodes arises because of the link breakage etc, therefore, route maintenance is needed. The reactive protocols have the mechanism of acknowledgement because of which the route maintenance is possible. The examples of Reactive protocols are AODV, DSR, TORA, and LMR. 2.3 Hybrid Routing Protocol Hybrid Routing Protocol is a trade-off between proactive and reactive protocols. The proactive protocol has more overhead and less latency whereas the reactive protocols have less overhead and more latency [12]. Therefore, this protocol is required for overcoming the disadvantages proactive as well as reactive routing protocols. Combination of proactive and reactive routing protocol takes place in hybrid routing protocol [13]. It utilizes the On-demand mechanism of reactive protocol and the mechanism of table maintenance of proactive protocol for avoiding the problems of latency and overhead in the network. The hybrid protocol is suitable for big networks where large numbers of nodes are there. In this protocol, the large networks are categorized in zone set where routing inside the zone is executed by utilizing the proactive method and outside the zone, routing is executed by utilizing the reactive approach [14]. Table 3: Comparison of MANET Routing Protocols Protocols Advantages Disadvantages Proactive  Less information available  Reduction of latency in the network  More overhead  Routing information is congested in the entire network Reactive  Availability of path when the required overheads is less and free from loops  Enhancement of latency in the network Hybrid  Appropriate for big networks and availability of advanced information  Enhancement of complexity Mobile Ad hoc Network routing protocols Table Driven Proactive On-demand Driven Reactive DSDV, WRP, CGSR, STAR etc. Hybrid ZRP ABR, DSR, TORA, AODV, CBRP, RDMAR
  • 5. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 396 III. MANET ATTACKS There is a number of attacks in MANET that are defined below [15-16]: Figure 3: MANET Attack Types There are various kinds of attacks on ad hoc network which are following: 1) Location Disclosure It is an attack that targets the privacy needs of an ad hoc network. By utilizing the techniques of traffic analysis, simpler monitoring and probing approaches, an attacker can find the node location or the whole network structure. 2) Black Hole In a black hole attack, the malicious node fits the false route replies towards the route requests, with the shortest path to a destination. The fake replies may be fabricated for diverting the network traffic by the malicious node for attracting the traffic towards it for performing a denial of service attack by removal of the received packets. 3) Replay A replay attack is known as one of the attacks that reduce strictly the MANET performance. A replay attacker performs this attack by retransmission and interception of the suitable signed messages. The signed messages validation is verified by a timestamp discrepancy set by receiver and sender nodes. The replay attack generally attacks the route freshness. 4) Wormhole It is one of the most influential attacks because it has the cooperation among two malicious nodes which participates in the network. Consider, node A, capturing the routing traffic at single network point network and tunnel them to another network point, to node B for sharing a private communication connection with A. The node B then injects the tunneled traffic back to the network. The connection among the nodes that have developed the routes for the wormhole link is totally under the two conspiring attacker’s control. The packet control is the solution to this attack. 5) Blackmail Its attack is applicable besides routing protocols that utilize the identification of malicious nodes mechanisms with the propagation of messages that attempt to blacklist the attacker. An attacker might build these reporting messages and attempts to separate the legitimate nodes from the network. The non-repudiation security criteria may be proved to be significant in a number of cases as it integrates a node to the messages it produced. IV. RELATED WORK Alex Hinds et al, focused on the range of available MANET routing protocols and discussed several features ranging from early protocols (e.g. DSDV) to higher level (e.g. MAODV).Protocol focused on Perkins' efforts to develop and improve MANET routing. A series of literature related to the MANET routing domain has been identified and reviewed, and the literature review identifies trends in research papers, such as the exclusive use of a stochastic waypoint movement model, not including key metrics from simulation results, rather than comparing protocol performance to available alternatives. Arun Biradar, focused on Mobile Ad Hoc Networks (MANETs) that consists of mobile platforms that are freely mobile. These are self-organizing and adaptive networks. These networks allow the spontaneous formation and deformation of mobile networks. The shortest path problem in MANETS requires that the path from the source node to the destination node be calculated, thereby, minimizing the sum of the total costs associated with the path. Azzedine Boukerchea and Begumhan Turgut, focused on Ad hoc wireless network to accomplish the difficult task of multi-hop communication in the absence of special infrastructure, the mobile node and change the topology network environment. It shows different limits for deployment as calorie restriction option, knowledge of the physical location of nodes, in MANET Attacks Location Disclosure Black Hole Replay Wormhole Black mail Denial of Service Black mail
  • 6. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 397 some cases, such as real-time or multicast traffic, as well as requirements. Bow-Nan Cheng et al, proposed a comparative analysis of various routing protocols in MANET. Various routing protocols has been analysed like AODV, OLSR and OSPF-MDR. Their performance has been evaluated in terms of routing overhead traffic, end-to-end message completion rate, and end-to-end delay, to examine performance vs. Trade-off. Disadvantage: Overall throughput is low. Harjeet Kaur et al, focused on Ad hoc network (MANETs) that consists of different types of mobile nodes. MANETs are mobile, so the authors connect to the network using a wireless connection. MANET can be deployed in a variety of applications at low cost. In MANET, different types of routing protocols have been recommended. These protocols can be divided into three main categories: reaction (on demand), active (table driven) and hybrid routing protocols, namely AODV, OLSR and ZRP. The research focuses on reactive, active and hybrid routing protocols such as AODV, OLSR and ZRP. Fabrice Le Fessant et al, has focused on sensor networks with environmental monitoring as the main application. The main objective is to limit the effect of separation caused by the malicious nodes in such networks. The authors has focused on routing protocols that depends on tree dependent topology in which the data is send through the sensor node to the sink via tree rooted at the sink. It has been assumed that the routing tree is developed by means of hop distance to sink. Anjali et al, showed the performance of AODV, OLSR, and GRP routing protocols for evaluation of FTP-based application traffic based on the IEEE 802.11, WLAN standard and 48 Mbps data rate. Through the use of OPNET simulator based on a variety of quantitative measurement - network load, throughput, retransmission attempts and media access delay, by changing the physical characteristics and the number of nodes are used to evaluate network performance. Bow Nan et al, proposed a comparative analysis of various routing protocols in MANET. Various routing protocols has been analysed like AODV, OLSR and OSPF-MDR. Their performance has been evaluated in terms of routing overhead traffic, end-to-end message completion rate, and end-to-end delay, to examine performance vs. trade off. John et al, proposed an algorithm for routing in MANET. In the proposed algorithm, some of the selfish nodes take place in route discovery. In this method, data that has to be send must be in encrypted form and contained the destination address in the message that has been sent. V. PERFORMANCE METRICS IN MANET The performance Metrics are considered as the measurements in MANET for analysing the routing protocols performance [17]. These are significant for evaluating the network performance. It elaborates how better the network is executing under a variety of parameters [18]. The performance metrics can be classified into below two types: a) Quantitative Metrics It is considered as the numerical measurement of the network performance. It can be described in numbers like Number of delays; Number of nodes, Number of bytes being transmitted and so on. b) Qualitative Metrics It is a quality measurement of the network performance. Quality can be calculated for Route Acquisition Time, Throughput and Packet out of delivery etc. Few performance metrics are: i. Throughput It is defined as the number of bits transferred for each unit time. ii. Packet Delivery Ratio It is defined as the total number of packet delivered for a total number of packet sent. iii. End to End Delay It is defined as the time taken by the packet for reaching the destination. The parameters that affect the performance are propagation delay, transmission delay, average delay, and processing delay. iv. Jitter Jitter is also termed as a delay. It occurs establishes because of improper setting of the network, network congestion and so on. v. Packet Loss It elaborates the number of bits lost because of the relay.
  • 7. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 398 Table 4: MANET Performance Metrics Metrics Formula Throughput 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑒𝑟 𝑢𝑛𝑖𝑡 𝑜𝑓 𝑡𝑖𝑚𝑒 Packet delivery ratio 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡 End to End delay 𝑇𝐼𝑚𝑒 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡 − 𝑇𝑖𝑚𝑒 𝑡ℎ𝑒 𝑝𝑎𝑐𝑘𝑒𝑡 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 Jitter [{(𝑃𝐴 + 1) − 1(𝑃𝑆 − 1)} − {(𝑃𝐴) − (𝑃𝑆)} 𝑁 − 1 Where PA=Packet arrival, PS=Packet Start Packet Loss 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑒𝑛𝑡 − 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 VI. CONCLUSION This paper has reviewed the MANET (Mobile ad hoc network) infrastructure. Initially, a brief introduction is discussed following the characteristics and applications for understanding more about MANET. MANET consists of a number of routing protocols that are analysed with its examples and types. The comparison of routing protocols with its advantages and disadvantages has been discussed. Later, the attacks undertaken in MANET are studied. The solutions related to these issues are significant to accomplish the wide commercial deployment requirements of MANET. We have examined the performance metrics utilized for the analysis of the network. REFERENCES [1] Alex Hinds, Michael Ngulube, Shaoying Zhu, “A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET)”, International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013. [2] John, P.M.; Vivekananda, P., “A framework for secure routing in Mobile Ad hoc Networks,” in Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on, vol., no., pp.453-458, 30-31 March 2012. [3] Giordano S, “Mobile ad hoc networks,” Handbook of wireless networks and mobile computing, pp. 325-46, 2002. [4] Mauve M, Widmer J, Hartenstein H, “A survey on position-based routing in mobile ad hoc networks,” IEEE network, Vol. 15, Issue 6,2001. [5] Ghosekar P, Katkar G, Ghorpade P, “Mobile ad hoc networking: imperatives and challenges”, IJCA Special issue on MANETs, 2010. [6] Mamatha GS, Sharma DS, “Analyzing the MANET variations, Challenges, Capacity and protocol issues”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol.1, Issue 1, pp.14-21, 2010. [7] Jiazi YI, “A Survey on the Applications of MANET”, Polytech Nantes, pp. 721-726, 2008. [8] ArunBiradar, “Effectiveness of Genetic Algorithm in Reactive Protocols for MANET”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2, Issue 7, July 2013. [9] AzzedineBoukerchea, BegumhanTurgut, “Routing protocols in ad hoc networks: A survey”, 2011 Elsevier doi:10.1016/j.comnet.2011.05.010 [10]Bow-Nan Cheng; Moore, S., “A comparison of MANET routing protocols on airborne tactical networks”, in Military Communications Conference – (MILCOM’12), vol., no., pp.1-6, Oct. 29, 2012, Nov. 1, 2012. [11]HarjeetKaur, VarshaSahni, Dr.ManjuBala, “A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review”, in International Journal of Computer Science and Information Technologies, (IJCSIT), Vol. 4 (3), pp. 498-500, 2013. [12]Fabrice Le Fessant, Antonis Papadimitriou, Aline Carneiro Viana, Cigdem Sengul, Esther Palomar, “A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis”, Computer Communications vol.35, 2012, pp. 234–248.
  • 8. Sharma Saurbh, Jaswak Kanchan Bala, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 399 [13]Anjali, Maninder Singh, “Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802.11 Standard”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.12, September 2012. [14]Bow-Nan Cheng; Moore, S., “A comparison of MANET routing protocols on airborne tactical networks,” in Military Communications Conference, 2012 - MILCOM 2012, vol., no., pp.1-6, Oct. 29 2012-Nov. 1 2012 [15]Faisal M, Kumar M, Ahmed A, “Attacks In MANET,” International Journal of Research in Engineering and Technology, Vol. 2, Issue 10,pp.273-6,2013. [16]Nandy R, Roy DB, “Study of various attacks in MANET and elaborative discussion of rushing attack on DSR with clustering scheme,” International Journal of Advanced Networking and Applications, Vol.3, Issue1):1035, 2011. [17]Devi R, Sumathi B, Gandhimathi T, Alaiyarasi G, “Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols,” Proceedings of International Journal of Computational Engineering Research, pp.2250-3005, 2008. [18]Vetrivelan N, Reddy AV, “Performance analysis of three routing protocols for varying MANET size,” Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol. 2, pp. 19-21,2008.