Loading

Contemporary Compendium of Conventions (CCC) in MANET
Purushottam G Chilveri1, M. S. Nagmode2

1Purushottam G Chilveri, Research Scholar department of E&TC ZCOER , Savitribai Phule Pune University , Pune, India.
2Dr. M.S. Nagmode, E&TC, Savitribai Phule Pune University, Pune, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 1818-1828 | Volume-8 Issue-6, August 2019. | Retrieval Number: E7543068519 /2019©BEIESP| DOI: 10.35940/ijeat.E7543.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Incessantly a self configuring network for mobile devices known as Mobile Ad hoc Network (MANET) are associated wirelessly .In significant networks, this design might perhaps enforce increased computational costs owing to the costly credentials chaining overheads that would not adapt for ad-hoc applications with increased nodes. Here a survey is carried out to express a view on the secure and authentic MANET systems. The literature reviewed is on different and diverse techniques of related to MANET systems. Reviews of 65 papers is presented and stated the significant analysis. At first the analysis depicts various attacks that are contributed in different papers. Subsequently ,various measures like security, cost, simulation time etc are also analyzed. It analyses the encryption method also that is exploited in each paper. This paper further gives an insight regarding the tools adapted ,chronological review and performance achievements in each case. At the end the review extended for the different research issues to investigate further research on secure and authentic MANET system.
Keywords: MANET; Authentication Protocols; Security; Attacks; Encryption; Research Gaps.