Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i32/100190
Year: 2016, Volume: 9, Issue: 32, Pages: 1-6
Original Article
P. Khurana1 , A. Sharma1 and Pradeep Kumar Singh2*
1 Department of Computer Science and Engineering, Amity University, Noida - 201313, Uttar Pradesh, India; [email protected]
[email protected]
2 Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh, India; [email protected]
*Author for correspondence
Pradeep Kumar Singh
Department of Computer Science and Engineering
Email:[email protected]
Objectives: Mobile network, ad-hoc network or Wireless ad-hoc network is the latest networking trend today. In the past fifteen years the no. of Mobile phone users has grown exponentially. The perks offered by this wireless mode of networking are open to all: anywhere, anytime, un tethered access to a huge no. of global users. Statistical Analysis: This paper consists of systematic review and analysis of various existing techniques which helps us to cope against such disasters with an actual and sorted representation. In the end, we wind up our results with the merits and demerits of existing methods along with the liabilities of future scope in this area. Findings: The review studies have shown various mobile software vulnerabilities with their advantages, disadvantages along with their future scopes. Application: The application of mobile software networks is innumerable, from mobile browsers to e-commerce to mobile money, there uses are extensive and important.
Keywords: Ad-hoc Network, Authentication, Malware, Mobile Network, Reliability, Vulnerabilities,
Subscribe now for latest articles and news.