International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Routing Protocols in Mobile Ad Hoc Networks

Author Affiliations

  • 1 Baba Banarasi Das University, Lucknow, UP, INDIA

Res. J. Engineering Sci., Volume 1, Issue (6), Pages 36-39, December,26 (2012)


With recent performance advancements in computer and wireless communications technologies, advanced mobile wireless computing is expected to see increasingly widespread use and application, much of which will involve the use of the Internet Protocol (IP) suite. The vision of mobile ad hoc networking is to support robust and efficient operation in mobile wireless networks by incorporating routing functionality into mobile nodes. Such networks are envisioned to have dynamic, sometimes rapidly-changing, random, multihop topologies which are likely composed of relatively bandwidth-constrained wireless links. The design of network protocols for MANETs is a complex issue. These networks need efficient distributed algorithms to determine network organization (connectivity), link scheduling, and routing. An efficient approach is to consider routing algorithms in which network connectivity is determined in the process of establishing routes. Message routing in a decentralized environment where network topology fluctuates is not a well-defined problem. While the shortest path (based on a given cost function) from a source to a destination in a static network is usually the optimal route, this idea is not easily extended to MANETs. Factors such as power expended, variable wireless link quality, propagation path loss, fading, multiuser interference, and topological changes, become relevant issues Some applications of MANET technology could include industrial and commercial applications involving cooperative mobile data exchange. In addition, mesh-based mobile networks can be operated as robust, inexpensive alternatives or enhancements to cell-based mobile network infrastructures. A MANET protocol should function effectively over a wide range of networking contexts--from small, collaborative, ad hoc groups to larger mobile, multihop network.


  1. Papadimitratos P. and Haas Z.J., Secure Message Transmission in Mobile Ad Hoc Networks, submitted for publication
  2. Papadimitratos P., Secure Routing: Methods for Protecting Routing Infrastructures–A Survey, work in progress. JUNE
  3. Lamport L., Shostak R. and Pease M., The Byzantine Generals Problem, ACM Trans. Program, Languages, 4(3), 382-401 (1982)
  4. Stajano F. and Anderson R., The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks, Security Protocols, 7th International Workshop, LNCS, Springer- Verlag (1999)
  5. Zhou L. and Haas Z.J., Securing Ad Hoc Networks, IEEE Network Magazine, 13(6), (2009)
  6. IEEE Std. 802.11, Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications (1999)
  7. Zucceratto R. and Adams C., Using Elliptic Curve Diffie- Hellman in the SPKM GSS-API, Internet Draft, IETF, Aug. (1999)
  8. Johnson D.B. et al, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, Internet Draft, IETF MANET Working Group, March 2nd (2011)
  9. Krawczyk H., Bellare M. and Canetti R., HMAC Keyed-Hashing for Message Authentication, RFC 2104, February (1997)
  10. Adamson B., Tactical Radio Frequency Communication Requirements for IPng, RFC 1677, (2011)
  11. Madhavi W. Subbarao, Performance of Routing Protocols for Mobile Ad-Hoc Networks 2011-12, Panagiotis Papadimitratos and Zygmunt J. Haas Wireless Networks Laboratory (2012)