SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Security issues and Challenges in
MANET-VANET-FANET: A Survey
 Security is one of the key important factors in ad hoc network
due to the open wireless medium and dynamic topology of the
network.
 MANET, VANET and FANET are type of ad hoc network and their
applications are served the end users in real environment.
VANET and FANET are next generation network and due to safety
applications more attractions for end users in these networks.
 It will provide the survey on security issues and challenges in
the field of MANET, VANET and FANET. The successful
implementation of these networks in real environment, it is
require the network will be secure and end user can take
benefit from their life safety applications.
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
3
V2I
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
 Security and privacy pay an important role to make the VANET
superstitions, popular and unique all the transportation
system.
 For this purpose identify the some security requirement to
fulfill the privacy needs and provide secure wireless
communication between the two vehicles.
 Every communication model has a special set of security
requirements.
 Identification
 Authentication
 Element authentication
 Privacy conservation
 Non- repudiation
 Confidentiality
 Availability
 Trust
Security issues and challenges in MANET,VANET and FANET: A Survey
 Mobile ad-hoc network (MANET) is a collection of wireless nodes that are
interconnected each other and dynamically setup anyplace or anytime
exclusive of having the pre-existence transportation.
 There are two variations mobile network: infrastructure and substructure
small network. In the case of Infrastructure network mobile communicate
through the base station that are connected to fixed infrastructure and
the infrastructure of less networks is known as the mobile ad- hoc
networks.
 Mobile ad-hoc network correspond to the composite distributed system
MANET requisite exceptionally flexible technology without any fixed base
station.
Figure 1. Architecture of Mobile ad-hoc Network (MANET) [1]
 VANET is a basically development system that increase the traffic safety
and reduce the road accidents. VANET is a wireless technology that
moves the car through the nodes and transfers the messages one node to
another node.
 Node are communicating single hop multi hop and also provide the huge
range of network to capture the signals and send the messages.
Defiantly, VANET technology enhances the security and traffic
transportation. Vehicular communication is involved of the nearby
vehicles and the appropriate design of VANET to provide the better
safety driving.
Figure 2. Architecture of Vehicular ad-hoc network (VANET) [2]
 Rapid technology advances on electronic device and communication
technologies, it has been probable to construct unmanned aerial
vehicle (UAV) system, which can fly separately or can be manage
slightly.
 FANET especially case of MANET attribute and the high degree mobility.
The FANET topology change more frequently, when the ordinary
infrastructure is out of service or not available. The major essential
component routing in FANET bandwidth play the critical role in the
process of large amount of data routing decision.
Figure 3. Architecture of Flying ad-hoc network (FANET) [4]
Figure 4. Architecture of MANET, VANET and FANET [5]
 The Security issues and challenges in MANET are given below:-
 Active Attacks: Active Attack achieves the attacker for
duplicate; transform and removal of exchange also try to modify
the behavior of protocol. Number of times identify the active
attack however active attack fewer used by an attacker.
Basically active attack modifies the data packets, inject the
packet and drop the packet.
 Passive Attacks: Passive attack is difficult to be identifying.
Routing packet and attacker may understand about a node.
Passive attack objective the privacy characteristic of network
and complete for distinguish the communication prototype
among nodes.
 The Security issues in VANET are given below:-
 Threats to Availability
 The threats to availability of vehicle-to-vehicle and vehicle-to-
roadside communication are given below:
 1)Denial of Service Attack: Denial service attack can be complete with
approve of indoor and out door network. In the cause of VANET produce
the artificial messages like Flooding and Jamming.
 2)Broadcast Tampering: This attack is supported out by an insider. It
contributes false safety messages into the VANET to impose damage or
detriment to the road users. When attackers influence the traffic on a
clear route then accident can happen.
 3)Malware: This attack is frequently approved by insiders more than
outsiders and when a firm ware update is done it can be downloaded
into the system.
The Security challenges in VANET are given below:-
 Real Time Constraints: VANET achieve the real time constraints so,
required the specific timing to deliver the massages. Achieve this goal
use very fast cryptographic algorithm.
 Data consistency Liability: Data consistency is important in VANET and
avoids the unnecessary information because authenticate node execute
the malicious.
 Key Distribution: VANET use the key to send and receive the messages
encrypts the message and after procedure complete decrypt the
message that’s why key distribution is an important procedure and
perform the major challenge.
 High mobility: High mobility is required in VANET nodes are connected
each other’s and transfer the signals to communicate the other vehicle
so very fast mobility level is required. VANET required less execution
time.
 Non- repudiation: In this procedure node cannot refuse but does not
send the messages and signals.
 Data verification and privacy: To preserve the integrity, regular bases
check the verification and privacy is very essential characteristic in
VANET.
The Security issues in VANET are given below:-
 National Regulations: UAV is used many application areas in
FANET. Many countries 'present the air regulation does not allow
restricted UAV operations in civil airspace.
 Routing: Data routing between UAC major challenges the
routing conventions should be able to update routing tables
animatedly conferring to topology changes, so must require to
develop new routing algorithms and networking modals for
assemble the flexible Modal.
 Path Planning: Path planning is play very vital role in FANET so;
acquire new algorithms methods and dynamic path planning is
very essential to achieve the goals. Many case each UAV has to
change its preceding path, and new ones must be recalculated
animatedly.
The Security challenges in VANET are given below:-
 Routing: In FANET routing is diverse from the other ad hoc network
because the node movement is very high and the topology modify very
frequently two major challenges are to be shown in routing:
 Routing algorithm work high mobility
 Routing algorithm should be quick to update
 Security: In FANET mange the secure routing point is: Make sure
Confidentiality, Integrity and Availability of precious information in
FANET so these networks are essential to mange. Lack of physical
security node compromises there is another issue in FANET. Trust
management is another important point. In FANET nodes leave and
join very frequently. Accessibility routing algorithms for ad-hoc
networks are unable in the opposition to frequent network topology
modify and malicious attacks in FANET.
 Quality of Service (QOS): The parameters quality of services able is to
be improved. In FANET different type of data are transformed like
image, video, audios, text.
Table 1. Comparison different types of ad-hoc networks [5]
 The applications are core component of ad hoc network and
basic purpose of these applications to serve the users.
 The behavior of the nodes in MANET, VANET and FANET are
dynamic nature due to different types of topology and network
nature.
 In this slide, emphasis various security issues in MANET, VANET
and FANET and also discuss in detail the key security challenges
in the field of MANET, VANET and FANET.
 In future work, we will discuss in detail the security solution of
security issues and challenges in MANET, VANET and FANET.
1. R. Nandakumar K. Nirmala “Security Challenges inMobile Ad Hoc Networks - A
Survey” Australian Journal of Basic and Applied Sciences, Vol. 10(1), pp. 654-
659,January 2016.
2. S. Banu Priya1, C.Theebendra2 “A Study on securitychallenges in mobile ad
hoc network” International journal of research in computer applications and
robotics, ISSN2320-7345 February 2016.
3. [3] N. Siddiqui, M. Shahid Husain, and M. Akbar “Analysis of security
challenges in vehicular adhoc network,” in Proc. Department of Computer
Science & Engineering, Integral University, Lucknow, India ACEIT, 2016.
4. Khuldeep Kumar,Sandeep Kumar Arrora “Review ofVehicles Ad HocNetwork
Security” International Journal of Grid and Distributed Computing Vol. 9, No.
11 (2016).
5. Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016,September). Performance
Analysis of Vehicular Adhoc Network Using Different Highway Traffic
Scenarios inCloud Computing. In International Conference on Future
Intelligent Vehicular Technologies (pp. 157-166).Springer.
 This is journal research paper and complete
research paper is available on research gate.
19
20

More Related Content

PPTX
Internet of things (IoT)
PDF
Water Level Monitoring System using IOT
PPTX
PDF
Automatic water level monitoring and control system using IoT
PDF
Internet of Things- An Introduction
PPTX
PPTX
Women safety device with gps tracking and alerts
PPT
Ecg analysis in the cloud
Internet of things (IoT)
Water Level Monitoring System using IOT
Automatic water level monitoring and control system using IoT
Internet of Things- An Introduction
Women safety device with gps tracking and alerts
Ecg analysis in the cloud

What's hot (20)

PPTX
IEEE 802.11 Architecture and Services
PDF
IoT architecture
PPTX
IOT based air quality and monitoring by using arduino
PDF
Introduction to IoT Architectures and Protocols
PDF
Internet of Things (IoT) and Big Data
PPTX
Smart Garden IOT Project
PDF
IoT applications for connected vehicle and ITS
PDF
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
PPT
Introduction to Arduino & Raspberry Pi
PDF
Chapter 5 IoT Design methodologies
PPTX
IoT in Healthcare
PPT
5G MOBILE TECHNOLOGY PPT
PPTX
Iot in healthcare
PPTX
Introduction of VANET
PDF
Introduction to IoT Architecture
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Iot architecture
PDF
CCTV Camera Presentation
PPTX
Smart home Environment using iot
IEEE 802.11 Architecture and Services
IoT architecture
IOT based air quality and monitoring by using arduino
Introduction to IoT Architectures and Protocols
Internet of Things (IoT) and Big Data
Smart Garden IOT Project
IoT applications for connected vehicle and ITS
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Introduction to Arduino & Raspberry Pi
Chapter 5 IoT Design methodologies
IoT in Healthcare
5G MOBILE TECHNOLOGY PPT
Iot in healthcare
Introduction of VANET
Introduction to IoT Architecture
Sources of IoT (JNTUK - UNIT 1)
Iot architecture
CCTV Camera Presentation
Smart home Environment using iot
Ad

Similar to Security issues and challenges in MANET,VANET and FANET: A Survey (20)

PDF
Security issues and solutions in vehicular adhoc network a review approach
PDF
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
PDF
Vehicular Ad-hoc Network, its Security and Issues: A Review
PDF
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
PDF
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
PDF
Overview of VANET with Its Features and Security Attacks
PDF
A review on various security attacks in vehicular ad hoc networks
PDF
F0332838
DOC
A survey on vanet security through position and speed verification coniaps xx...
PDF
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
PPT
Issues of routing in vanet
PDF
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
PDF
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
PDF
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
PDF
A Survey on Vehicular Ad hoc Networks
Security issues and solutions in vehicular adhoc network a review approach
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Vehicular Ad-hoc Network, its Security and Issues: A Review
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
Overview of VANET with Its Features and Security Attacks
A review on various security attacks in vehicular ad hoc networks
F0332838
A survey on vanet security through position and speed verification coniaps xx...
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Issues of routing in vanet
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
A Survey on Vehicular Ad hoc Networks
Ad

More from Dr.Irshad Ahmed Sumra (20)

PPTX
Basic Concept of Smart Healthcare System
PPTX
Introduction to Smart Vehicles and its Working
PPTX
Introduction to Artificial Intelligence (AI)(AI) and its Applications
PPTX
Basic concept of Digital Logic Design and its working
PPTX
Basic concept of Data-Science and its Applications
PPTX
Basic concept of Data-Mining and it Applications
PPTX
The Transformative Power of AI in Biomedical Science
PPTX
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
PPTX
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Molecular-Life-Science
PPTX
Role of Artificial Intelligence(AI) in Mechanical Engineering
PPTX
AI Applications:AI-in-Electrical-Engineering
PPTX
AI application: AI in Earth Science and Future Trends
PPTX
AI in Civil Engineering and Future Trends
PPTX
AI in Aerospace Engineering science and AI future Trends
PPTX
Basic concept of Virtual-Reality and its Applications
PPTX
Basic Concept of VANET-Security-Challenges-and-Solutions
PPTX
Basic concept of Outcome-Based-Education-OBE and Key Features
PPTX
Basic Concept of Image-Processing and its Applications
Basic Concept of Smart Healthcare System
Introduction to Smart Vehicles and its Working
Introduction to Artificial Intelligence (AI)(AI) and its Applications
Basic concept of Digital Logic Design and its working
Basic concept of Data-Science and its Applications
Basic concept of Data-Mining and it Applications
The Transformative Power of AI in Biomedical Science
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
Artificial Intelligence(AI) in Molecular-Life-Science
Role of Artificial Intelligence(AI) in Mechanical Engineering
AI Applications:AI-in-Electrical-Engineering
AI application: AI in Earth Science and Future Trends
AI in Civil Engineering and Future Trends
AI in Aerospace Engineering science and AI future Trends
Basic concept of Virtual-Reality and its Applications
Basic Concept of VANET-Security-Challenges-and-Solutions
Basic concept of Outcome-Based-Education-OBE and Key Features
Basic Concept of Image-Processing and its Applications

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf

Security issues and challenges in MANET,VANET and FANET: A Survey

  • 1. Security issues and Challenges in MANET-VANET-FANET: A Survey
  • 2.  Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network.  MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real environment. VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks.  It will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications. 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. 3 V2I
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5.  Security and privacy pay an important role to make the VANET superstitions, popular and unique all the transportation system.  For this purpose identify the some security requirement to fulfill the privacy needs and provide secure wireless communication between the two vehicles.  Every communication model has a special set of security requirements.  Identification  Authentication  Element authentication  Privacy conservation  Non- repudiation  Confidentiality  Availability  Trust
  • 7.  Mobile ad-hoc network (MANET) is a collection of wireless nodes that are interconnected each other and dynamically setup anyplace or anytime exclusive of having the pre-existence transportation.  There are two variations mobile network: infrastructure and substructure small network. In the case of Infrastructure network mobile communicate through the base station that are connected to fixed infrastructure and the infrastructure of less networks is known as the mobile ad- hoc networks.  Mobile ad-hoc network correspond to the composite distributed system MANET requisite exceptionally flexible technology without any fixed base station. Figure 1. Architecture of Mobile ad-hoc Network (MANET) [1]
  • 8.  VANET is a basically development system that increase the traffic safety and reduce the road accidents. VANET is a wireless technology that moves the car through the nodes and transfers the messages one node to another node.  Node are communicating single hop multi hop and also provide the huge range of network to capture the signals and send the messages. Defiantly, VANET technology enhances the security and traffic transportation. Vehicular communication is involved of the nearby vehicles and the appropriate design of VANET to provide the better safety driving. Figure 2. Architecture of Vehicular ad-hoc network (VANET) [2]
  • 9.  Rapid technology advances on electronic device and communication technologies, it has been probable to construct unmanned aerial vehicle (UAV) system, which can fly separately or can be manage slightly.  FANET especially case of MANET attribute and the high degree mobility. The FANET topology change more frequently, when the ordinary infrastructure is out of service or not available. The major essential component routing in FANET bandwidth play the critical role in the process of large amount of data routing decision. Figure 3. Architecture of Flying ad-hoc network (FANET) [4]
  • 10. Figure 4. Architecture of MANET, VANET and FANET [5]
  • 11.  The Security issues and challenges in MANET are given below:-  Active Attacks: Active Attack achieves the attacker for duplicate; transform and removal of exchange also try to modify the behavior of protocol. Number of times identify the active attack however active attack fewer used by an attacker. Basically active attack modifies the data packets, inject the packet and drop the packet.  Passive Attacks: Passive attack is difficult to be identifying. Routing packet and attacker may understand about a node. Passive attack objective the privacy characteristic of network and complete for distinguish the communication prototype among nodes.
  • 12.  The Security issues in VANET are given below:-  Threats to Availability  The threats to availability of vehicle-to-vehicle and vehicle-to- roadside communication are given below:  1)Denial of Service Attack: Denial service attack can be complete with approve of indoor and out door network. In the cause of VANET produce the artificial messages like Flooding and Jamming.  2)Broadcast Tampering: This attack is supported out by an insider. It contributes false safety messages into the VANET to impose damage or detriment to the road users. When attackers influence the traffic on a clear route then accident can happen.  3)Malware: This attack is frequently approved by insiders more than outsiders and when a firm ware update is done it can be downloaded into the system.
  • 13. The Security challenges in VANET are given below:-  Real Time Constraints: VANET achieve the real time constraints so, required the specific timing to deliver the massages. Achieve this goal use very fast cryptographic algorithm.  Data consistency Liability: Data consistency is important in VANET and avoids the unnecessary information because authenticate node execute the malicious.  Key Distribution: VANET use the key to send and receive the messages encrypts the message and after procedure complete decrypt the message that’s why key distribution is an important procedure and perform the major challenge.  High mobility: High mobility is required in VANET nodes are connected each other’s and transfer the signals to communicate the other vehicle so very fast mobility level is required. VANET required less execution time.  Non- repudiation: In this procedure node cannot refuse but does not send the messages and signals.  Data verification and privacy: To preserve the integrity, regular bases check the verification and privacy is very essential characteristic in VANET.
  • 14. The Security issues in VANET are given below:-  National Regulations: UAV is used many application areas in FANET. Many countries 'present the air regulation does not allow restricted UAV operations in civil airspace.  Routing: Data routing between UAC major challenges the routing conventions should be able to update routing tables animatedly conferring to topology changes, so must require to develop new routing algorithms and networking modals for assemble the flexible Modal.  Path Planning: Path planning is play very vital role in FANET so; acquire new algorithms methods and dynamic path planning is very essential to achieve the goals. Many case each UAV has to change its preceding path, and new ones must be recalculated animatedly.
  • 15. The Security challenges in VANET are given below:-  Routing: In FANET routing is diverse from the other ad hoc network because the node movement is very high and the topology modify very frequently two major challenges are to be shown in routing:  Routing algorithm work high mobility  Routing algorithm should be quick to update  Security: In FANET mange the secure routing point is: Make sure Confidentiality, Integrity and Availability of precious information in FANET so these networks are essential to mange. Lack of physical security node compromises there is another issue in FANET. Trust management is another important point. In FANET nodes leave and join very frequently. Accessibility routing algorithms for ad-hoc networks are unable in the opposition to frequent network topology modify and malicious attacks in FANET.  Quality of Service (QOS): The parameters quality of services able is to be improved. In FANET different type of data are transformed like image, video, audios, text.
  • 16. Table 1. Comparison different types of ad-hoc networks [5]
  • 17.  The applications are core component of ad hoc network and basic purpose of these applications to serve the users.  The behavior of the nodes in MANET, VANET and FANET are dynamic nature due to different types of topology and network nature.  In this slide, emphasis various security issues in MANET, VANET and FANET and also discuss in detail the key security challenges in the field of MANET, VANET and FANET.  In future work, we will discuss in detail the security solution of security issues and challenges in MANET, VANET and FANET.
  • 18. 1. R. Nandakumar K. Nirmala “Security Challenges inMobile Ad Hoc Networks - A Survey” Australian Journal of Basic and Applied Sciences, Vol. 10(1), pp. 654- 659,January 2016. 2. S. Banu Priya1, C.Theebendra2 “A Study on securitychallenges in mobile ad hoc network” International journal of research in computer applications and robotics, ISSN2320-7345 February 2016. 3. [3] N. Siddiqui, M. Shahid Husain, and M. Akbar “Analysis of security challenges in vehicular adhoc network,” in Proc. Department of Computer Science & Engineering, Integral University, Lucknow, India ACEIT, 2016. 4. Khuldeep Kumar,Sandeep Kumar Arrora “Review ofVehicles Ad HocNetwork Security” International Journal of Grid and Distributed Computing Vol. 9, No. 11 (2016). 5. Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016,September). Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios inCloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166).Springer.
  • 19.  This is journal research paper and complete research paper is available on research gate. 19
  • 20. 20