A survey on MANETs: architecture, evolution, applications, security issues and solutions
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free...
| Main Authors: | Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Najeeb, Athaur Rahman, Mashkuri, Yaacob |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
UAD Insitute of Scientific Publication and Press (LPPI)
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/65941/ http://irep.iium.edu.my/65941/1/65941_A%20Survey%20on%20MANETs.pdf http://irep.iium.edu.my/65941/7/65941_A%20survey%20on%20MANETs_scopus.pdf |
Similar Items
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Radio Access Technology (RAT) selection mechanism using
TOPSIS method in Heterogeneous Wireless Networks (HWN)
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Security of self-organizing networks: MANET, WSN, WMN, VANET
Published: (2011)
Published: (2011)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
A performance comparison of proactive and reactive routing protocols of Mobile Ad-hoc Network (MANET)
by: Azad, Saiful, et al.
Published: (2007)
by: Azad, Saiful, et al.
Published: (2007)
Review paper of gateway selection schemes for MANET of NEMO (MANEMO)
by: Mahmood, Zainab S., et al.
Published: (2013)
by: Mahmood, Zainab S., et al.
Published: (2013)
Effect of 3 key factors on average end to end delay and jitter in MANET
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
Performance evaluation in MANETs environment
by: Qabajeh, Mohammad M., et al.
Published: (2012)
by: Qabajeh, Mohammad M., et al.
Published: (2012)
Quality of Service (QOS) issues in manets
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
A computationally efficient P-LRU based optimal cache heap object replacement policy
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
RFDA: Reliable framework for data administration based on split-merge policy
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Testbed on MANET (ToM): private testbed
facility for MANET Experiment
by: Muchtar, Farkhana, et al.
Published: (2019)
by: Muchtar, Farkhana, et al.
Published: (2019)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Architectural framework for mobile multicast support in wireless mesh networks
by: Sanni, Mistura L., et al.
Published: (2013)
by: Sanni, Mistura L., et al.
Published: (2013)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2017)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2017)
Evaluating the effect of voice activity detection in
isolated Yoruba Word Recognition System
by: Aibinu, Abiodun Musa, et al.
Published: (2011)
by: Aibinu, Abiodun Musa, et al.
Published: (2011)
Performance evaluation of AODV ,OLSR, and GRP for
transmitting video conferencing over MANETs
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
Issues in location-based multicast routing in manets
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
UHF RFID antenna architectures and applications
by: Uddin, Md. Jasim, et al.
Published: (2010)
by: Uddin, Md. Jasim, et al.
Published: (2010)
Architecture of M-HMIPV6/CXTP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Carrier aggregation in long term evolution advanced
by: M. Al-Shibly, Mohammed Abduljawad, et al.
Published: (2012)
by: M. Al-Shibly, Mohammed Abduljawad, et al.
Published: (2012)
Autonomic protocol and architecture for devices in Internet of things
by: Ashraf, Qazi Mamoon, et al.
Published: (2014)
by: Ashraf, Qazi Mamoon, et al.
Published: (2014)
Energy-efficient scalable routing protocol based on ACO for WSNS
by: Sharmin, Afsah, et al.
Published: (2019)
by: Sharmin, Afsah, et al.
Published: (2019)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Quality-driven scheduling for long-term evolution system
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2011)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2011)
Comparison between scheduling techniques in long term evolution
by: Habaebi, Mohamed Hadi, et al.
Published: (2013)
by: Habaebi, Mohamed Hadi, et al.
Published: (2013)
ReSA: architecture for resources sharing between
clouds
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A simulation tool for downlink long term evolution-advanced
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2014)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2014)
Simulation of packet scheduling in cognitive long term evolution-advanced
by: Mansor, Mohama 'Ismat Hafizi, et al.
Published: (2017)
by: Mansor, Mohama 'Ismat Hafizi, et al.
Published: (2017)
An investigation of packet scheduling algorithms for long term evolution-advanced
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
An efficient technique for human verification using finger stripes geometry
by: Rahman, Md. Arafatur, et al.
Published: (2007)
by: Rahman, Md. Arafatur, et al.
Published: (2007)
Similar Items
-
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013) -
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020) -
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018) -
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018) -
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)