A Review : Mobile Ad-Hoc Network Using Routing Protocols
Keywords:
Mobile Ad-hoc Network (MANET), Routing Protocols, Decentralized Networks, Security Threats, Applications.Abstract
Mobile Ad-hoc Networks (MANETs) has revolutionized the landscape of wireless communication by enabling seamless and dynamic network formations without any fixed infrastructure. This thesis presents a comprehensive review of the current state of MANET research, focusing on its underlying principles, routing protocols, challenges, and potential applications. This Paper begins by elucidating the fundamental concepts of MANETs, highlighting their decentralized nature, self-organizing capabilities, and limited resources. A detailed examination of prominent routing protocols follows, including proactive protocols like OLSR and DSDV, reactive protocols such as AODV and DSR, and hybrid solutions like ZRP. Comparative analyses of their strengths, weaknesses, and suitability for different scenarios offer valuable insights. Challenges inherent to MANETs, such as node mobility, scalability, security threats, and energy efficiency, are systematically expounded. Noteworthy efforts in addressing these challenges are discussed, encompassing techniques like trust-based security, energy-aware routing, and Quality of Service (QoS) optimization. Furthermore, the review explores the manifold applications of MANETs across domains like disaster recovery, military operations, Internet of Things (IoT), and vehicular networks. Real-world deployment scenarios and case studies underscore the practical significance of MANETs in enabling resilient and adaptable communication infrastructures.
References
- Gupta, A. Kalra, D. Boston, C. Borcea, Mobisoc: a middleware for mobile social computing applications, Springer Mob. Netw. Appl., 14 (1) (2009), pp. 35-52
- Jedari, F. Xia, A survey on routing and data dissemination in opportunistic mobile social networks, IEEE Commun. Surv. Tutorials, (2013), pp. 1-25
- Sobin, V. Raychoudhury, G. Marfia, A. Singla, A survey of routing and data dissemination in delay tolerant networks, Elsevier J. Netw. Comput. Appl., 67 (2016), pp. 128-146
- Talipov, Y. Chon, H. Cha, Content sharing over smartphone-based delay-tolerant networks, IEEE Trans. Mobile Comput., 12 (3) (2013), pp. 581-595
- Li, J. Wu, Mops: providing content-based service in disruption-tolerant networks, Proceedings of the 29th IEEE International Conference on Distributed Computing Systems, IEEE (2009), pp. 526-533
- Xia, L. Liu, J. Li, J. Ma, A.V., Vasilios, socially aware networking: a survey, IEEE Syst. J., 9 (3) (2015), pp. 904-921
- Rizzo, N.P. Palma, M.A. Marsan, V. Mancuso, Storage capacity of opportunistic information dissemination systems, IEEE Trans. Mobile Comput. (2021), pp. 1-16
- L. McNamara, C. Mascolo, L. Capra, Media sharing based on colocation prediction in urban transport, Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, ACM, (2008), pp. 58-69
- M. Girolami, S. Chessa, A. Caruso, On Service Discovery in Mobile Social Networks: Survey and Perspectives, vol. 88, Elsevier Computer Networks (2015), pp. 51-71
- M. Papadopouli, H. Schulzrinne, Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices, Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM (2001), pp. 117-127
- M. Taghizadeh, K. Micinski, S. Biswas, C. Ofria, E. Torng, Distributed cooperative caching in social wireless networks IEEE Trans. Mobile Comput., 12 (6) (2013), pp. 1037-1053
- M.A. Ferrag, L. Maglaras, A. Ahmim ”Privacy-preserving schemes for ad hoc social networks: a survey, IEEE Commun. Surv. Tutorials., 19 (4) (2017), pp. 3015-3045
- N. Vastardis, K. Yang, Mobile social networks: architectures, social properties, and key research challenges, IEEE Commun. Surv. Tutorials., 15 (3) (2013), pp. 1355-1371
- S. Gaonkar, J. Li, R.R. Choudhury, L. Cox, A. Schmidt “Micro-blog: sharing and querying content through mobile phones and social participation” Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, ACM (2008), pp. 174-186
- S. Kaisar, Emergency response and post-disaster recovery using smartphone-based applications, IGI Global Digital Services in Crisis, Disaster, and Emergency Situations (2021), pp. 31-49
- X. Liu, Z. Li, P. Yang, Y. Dong, Information-centric Mobile Ad Hoc Networks and Content Routing: a Survey, vol. 58, Elsevier Ad Hoc Networks (2017), pp. 255-268
- Mahor, V., & Raghuwanshi, S. (2013, July). Taguchi's loss function based measurement of mobile ad-hoc network parameters under AODV routing protocol. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.
- Y. Wang, A.V. Vasilakos, Q. Jin, J. Ma, Survey on mobile social networking in proximity (msnp): approaches, challenges and architecture, Springer Wireless Netw., 20 (6) (2014), pp. 1295-1311
- Y. Wu, Y. Zhao, M. Riguidel, G. Wang, P. Yi, Security and trust management in opportunistic networks: a survey Wiley Online Lib. Secur. Commun. Netw., 8 (9) (2015), pp. 1812-1827
- Y. Zhao, W. Song, Survey on social-aware data dissemination over mobile wireless networks, IEEE Access, 5 (2017), pp. 6049-6059
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.