Professional Documents
Culture Documents
Contents
1 Types
2 Simulations
3 Data monitoring and mining
4 Security
4.1 Attack classifications
5 See also
6 References
7 Further reading
8 External links
Types
Vehicular Ad hoc Networks (VANETs) are used for communication among vehicles and between
vehicles and roadside equipment. Intelligent vehicular ad hoc networks (InVANETs) are a kind of
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
1/5
10/26/2014
artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions,
accidents, drunken driving etc.
Smart Phone Ad hoc Networks (SPANs) leverage the existing hardware (primarily Bluetooth and Wi-Fi)
in commercially available smart phones to create peer-to-peer networks without relying on cellular carrier
networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional hub
and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays and there is no notion of
a group leader so peers can join and leave at will without destroying the network.
Internet based mobile ad hoc networks (iMANETs) are ad hoc networks that link mobile nodes and
fixed Internet-gateway nodes. For example, multiple sub-MANETs may be connected by in a classic
Hub-Spoke VPN to create a geographically distributed MANET. In such type of networks normal ad
hoc routing algorithms don't apply directly.
Military / Tactical MANETs are used by military units with emphasis on security, range, and integration
with existing systems. Common waveforms include the US Army's SRW, Harris's ANW2
(http://www.army.mil/article/68498/Army_networking_radios_improve_communications_at_tactical_edg
e) and HNW (http://govcomm.harris.com/solutions/products/000056.asp), Persistent Systems' Wave
Relay (http://www.persistentsystems.com), Trellisware's TSM (http://www.trellisware.com/tacticalscalable-manet-tsm) and Silvus Technologies' StreamCaster (http://www.silvustechnologies.com).
A mobile ad-hoc network (MANET) is an ad-hoc network but an ad-hoc network is not necessarily a
MANET.
Simulations
There are several ways to study MANETs. One solution is the use of simulation tools like OPNET, NetSim and
NS2.
Security
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
2/5
10/26/2014
A lot of research has been done in the past but the most significant contributions have been the PGP (Pretty
Good Privacy) and trust based security. None of the protocols have made a decent trade off between security
and performance. In an attempt to enhance security in MANETs many researchers have suggested and
implemented new improvements to the protocols and some of them have suggested new protocols.
Attack classifications
These attacks on MANETs challenge the mobile infrastructure in which nodes can join and leave easily with
dynamics requests without a static path of routing. Schematics of various attacks as described by Al-Shakib
Khan [1] on individual layer are as under:
Application Layer: Malicious code, Repudiation
Transport Layer: Session hijacking, Flooding
Network Layer: Sybil, Flooding, Black Hole, Grey Hole. Worm Hole, Link Spoofing, Link Withholding,
Location disclosure etc.
Data Link/MAC: Malicious Behavior, Selfish Behavior, Active, Passive, Internal External
Physical: Interference, Traffic Jamming, Eavesdropping.
See also
AmbientTalk, an experimental programming language for MANETs
List of ad hoc routing protocols
Delay-tolerant networking
Wireless community network
Wireless mesh network
Backpressure Routing
Data Mining
Wireless Sensor Networks
References
1. ^ Tomas Krag and Sebastian Bettrich (2004-01-24). "Wireless Mesh Networking"
(http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html). O'Reilly Wireless Dev Center.
Retrieved 2009-01-20.
2. ^ http://www.cs.rutgers.edu/~rmartin/teaching/fall04/cs552/papers/012.pdf
3. ^ http://answers.google.com/answers/threadview/id/440378.html
4. ^ Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based
on Sensor Grid in London". Sensors 8 (6): 3601. doi:10.3390/s8063601
(http://dx.doi.org/10.3390%2Fs8063601).
5. ^ Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011). "Distributed Clustering-Based Aggregation Algorithm for
Spatial Correlated Sensor Networks". IEEE Sensors Journal 11 (3): 641. doi:10.1109/JSEN.2010.2056916
(http://dx.doi.org/10.1109%2FJSEN.2010.2056916).
6. ^ Kleinrock, Leonard (1975). "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access
Modes and Their Throughput-Delay Characteristics" (http://ieeexplore.ieee.org/xpls/abs_all.jsp?
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
3/5
10/26/2014
arnumber=1092768&tag=1).
7. ^ Shi, Zhefu; Beard, Cory; Mitchell, Ken (2008). "Tunable traffic control for multihop CSMA networks"
(http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4753376&tag=1).
Further reading
Mobile ad hoc social network (Overview):
Abdul Shabbir, Anasuri Sunil Kumar (January 2012). "An Efficient Authentication Protocol for Security
in MANETs" (http://interscience.in/IJCCT_Vol3Iss1/IJCCT_Paper_12.pdf). IJCCT 3 (1): 7174.
Kahn, R. E. (January 1977). "The Organization of Computer Resources into a Packet Radio Network".
IEEE Transactions on Communications. COM-25 (1): 169178.
Jubin, J., and Tornow, J. D. (January 1987). "The DARPA Packet Radio Network Protocols".
Proceedings of the IEEE 75 (1).
N. Schacham and J. Westcott (January 1987). "Future directions in packet radio architectures and
protocols". Proceedings of the IEEE 75 (1): 8399. doi:10.1109/PROC.1987.13707
(http://dx.doi.org/10.1109%2FPROC.1987.13707).
Ad hoc network papers (overview):
Royer, E., Chai Keong Toh (April 1999). "A Review of Current Routing Protocols for Ad Hoc Mobile
Wireless Networks". IEEE Personal Communications 6 (2): 4655. doi:10.1109/98.760423
(http://dx.doi.org/10.1109%2F98.760423).
Mauve, M., Widmer, J., Hartenstein, H. (December 2001). "A Survey on Position-Based Routing in
Mobile Ad Hoc Networks". IEEE Network 1 (6): 3039. doi:10.1109/65.967595
(http://dx.doi.org/10.1109%2F65.967595).
D. Djenouri, L. Kheladi, N. Badache. (4th quarter 2005). "A Survey of Security Issues in Mobile Ad
hoc and Sensor Networks" (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1593277). IEEE
Communications Surveys and Tutorials 7 (4). Check date values in: |date=(help)
Maihfer, C. (2nd quarter 2004). "A Survey on Geocast Routing Protocols"
(http://www.comsoc.org/livepubs/surveys/public/2004/apr/maihofer.html). IEEE Communications
Surveys and Tutorials 6 (2). Check date values in: |date=(help)
Aneja, Nagender and Gambhir, Sapna (2013). "Ad-hoc-Social-Network-A-Comprehensive-Survey"
(http://www.ijser.org/researchpaper%5CAd-hoc-Social-Network-A-Comprehensive-Survey.pdf).
IJSER.
External links
IETF MANET group (http://www.ietf.org/html.charters/manet-charter.html)
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
4/5
10/26/2014
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
5/5