Abstract

Abstract The entire device is divided into various zones and the location of the mobile source and target node is then observed. If the mobile source and destination nodes are located in the same location, proactive routing is used to transmit the data packets between them. In MANET, nodes are self-assembled. These nodes are interacted with each other without any help from the local infra-structure. In this work discussed about the different types of the MANET security attacks, those are compared with each other. In addition, discussed about the characteristics of the MANETs and evaluation of performance of developed MANET with the help of the performance metrics.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call