V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew
{"title":"EAACK - Enhanced Adaptive Acknowledgment","authors":"V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew","doi":"10.1109/ICCMC.2018.8487752","DOIUrl":null,"url":null,"abstract":"Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"118 1","pages":"140-148"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.