Author’s Guidelines

Please read and follow these instructions carefully, doing so will ensure that the review and publication of your paper is as rapid and efficient as possible.

NOTE: 4 Publications Quaterly.

Loading Papers...

The IJACMS digital library includes manuscripts, articles and research papers from the different areas of technology. IJACMS provides an immediate, barrier-free access to the full content of research articles without any subscription of the digital library of this journal.

The primary audience of this publication comprises academics, graduate students, practitioners and all others interested in computer applications research. The journal welcomes and encourages articles from both practitioners and academics.

The publication costs are covered by the author/author’s, Institution or Researchers. So, copyright of the articles will remain retain with the authors who publish the articles, though the published material is freely available to all interested online readers.

Authors are requested to submit manuscripts, articles and research papers on

Click to submit Online

Comparative study of Routing mechanism in Manet

Volume 4 issue 1 Download Paper
Year of Publication: 2019
Authors: Shivani Thakur


The widespread use of mobile and hand-held devices can expand as Mobile ad hoc networks (MANET), which does not require any fixed infrastructure as that of cable networks. The main issue that is determined in MANET is related to the selection or designing of routing protocols. In this paper, a brief description about existing routing protocols along with their advantages and disadvantages is provided. Also, the issue of security along with its mitigating techniques such as Support Vector machine (SVM) and Artificial Neural Network (ANN) is discussed


1.       Li, Z., & Wu, Y. (2017). Smooth mobility and link reliability-based optimized link state routing scheme for MANETs. IEEE Communications Letters, 21(7), 1529-1532.

2.       Chen, Y. H., Wu, E. H. K., & Chen, G. H. (2015). Bandwidth-satisfied multicast by multiple trees and network coding in lossy manets. IEEE Systems Journal, 11(2), 1116-1127.

3.       Fang, Y., Zhou, Y., Jiang, X., & Zhang, Y. (2015). Practical performance of MANETs under limited buffer and packet lifetime. IEEE Systems Journal, 11(2), 995-1005.

4.       Lavania, K. K., Saini, G. L., Kothari Rooshabh, H., & Yagnik Harshraj, A. (2011). Privacy anxiety and challenges in mobile ad hoc wireless networks and its solution. International Journal of Scientific & Engineering Research, 2(9), 173-177.

Jiang, Y., Daneshrad, B., & Pottie, G. J. (2017). A Practical Approach to Joint Timing, Frequency Synchronization and Channel Estimation for Concurrent Transmissions in a MANET. IEEE Transactions on Wireless Communications, 16(6), 3461-3475.

Cho, J. H., Swami, A., & Chen, R. (2010). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562-583.

Cheng, B. N., & Moore, S. (2012, October). A comparison of MANET routing protocols on airborne tactical networks. In MILCOM 2012-2012 IEEE Military Communications Conference (pp. 1-6). IEEE.

Kaur, H., Sahni, V., & Bala, M. (2013). A survey of reactive, proactive and hybrid routing protocols in MANET: A review. network, 4(3), 498-500.

Prashar, L., & Kapur, R. K. (2016, September). Performance analysis of routing protocols under different types of attacks in MANETs. In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 405-408). IEEE.

Kim, D., Bae, H., & Toh, C. K. (2007). Improving TCP-Vegas performance over MANET routing protocols. IEEE transactions on Vehicular Technology, 56(1), 372-377.

Sinha, S., Saha, S., & Mishra, S. (2019, January). COR-HR: an efficient hybrid routing approach using coefficient of restitution in MANET. In Proceedings of the 20th International Conference on Distributed Computing and Networking (pp. 455-459). ACM.

12.    Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks, 24(2), 565-579.

13.    Jeevamaheswari, M., Jothi, R. A., & Palanisamy, V. (2018). AODV Routing Protocol to Defence Against Packet Dropping Gray Hole Attack In MANET.

14.    Gupta, P., Goel, P., Varshney, P., & Tyagi, N. (2019). Reliability Factor Based AODV Protocol: Prevention of Black Hole Attack in MANET. In Smart Innovations in Communication and Computational Sciences (pp. 271-279). Springer, Singapore.

15.    Sowah, R. A., Ofori-Amanfo, K. B., Mills, G. A., & Koumadi, K. M. (2019). Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN). Journal of Computer Networks and Communications, 2019.

16.    Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE systems journal, 9(1), 65-75.

17.    Ahir, S. A., Marathe, N., & Padiya, P. (2014, April). IAMTT-new method for resisting network layer denial of service attack on MANET. In 2014 Fourth International Conference on Communication Systems and Network Technologies (pp. 762-766). IEEE.

18.    Basomingera, R., & Choi, Y. J. (2019, January). Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks. In 2019 International Conference on Information Networking (ICOIN) (pp. 31-36). IEEE.

Suykens, J. A., & Vandewalle, J. (1999). Least squares support vector machine classifiers. Neural processing letters, 9(3), 293-300.

Hsu, K. L., Gupta, H. V., & Sorooshian, S. (1995). Artificial neural network modeling of the rainfall‐runoff process. Water resources research, 31(10), 2517-2530.



MANET, Proactive, Reactive, Hybrid Routing Protocols, SVM, ANN, Applications, features.