A Review on MANET using Soft Computing and Dempster-Shafer Theory
Naveen Pathak1, Anand Bisen2
1Naveen Pathak Department of Computer Science, Vikrant Institute of Technology & Management (VITM), Gwalior (M.P), India.
2Anand Bisen, Department of Computer Science, Vikrant Institute of Technology & Management (VITM), Gwalior (M.P), India.
Manuscript received on February 18, 2017. | Revised Manuscript received on February 25, 2017. | Manuscript published on March 05, 2017. | PP: 30-36 | Volume-7 Issue-1, March 2017. | Retrieval Number: A2958037117/2017©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Mobile ad hoc networks (MANETs) is an substructure-less, dynamic network include of a sets of wirelessly mobility nodes which communicate with all different without the exploit of any centralized authority. Because of its fundamental characteristics, like as wireless medium, dynamic topology, distributed cooperation. In this paper we study MANET and its characteristics, application, security goals and different types security attacks, soft computing approach and dempster-shafer theory of evidence.
Keywords: MANET; soft computing appproch; dempster-shafer theory of evidence.