Hardware Advancements Effects on MANET Development, Application and Research

  • Amr ElBanna
  • Ehab ElShafei
  • Khaled ElSabrouty
  • Marianne A. Azer
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 381)


Mobile devices’ development has remarkably improved in light of the fast growing hardware advancements. These advancements include multicore processor chips, ultra large main memories and batteries that last for hours even when running modern applications such as file transfer, voice communication and video streaming …etc. In this paper, we shed the light on recent and future trends of hardware advancements for mobile devices, and their impact on MANET developments. In addition, the effect of such advancements is investigated on application and different research areas.


Ad hoc Networks batteries processing power mobile devices capabilities 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kwang-Ting, C., Yi-Chu, W.: Using mobile GPU for general-purpose computing; a case study of face recognition on smartphones. In: International Symposium on VLSI Design, Automation and Test (VLSI-DAT), Hsinchu, pp. 91–97 (2011)Google Scholar
  2. 2.
    Collective information gathered from the manufacture’s websites (2013) and other tech sites,,,, and (accessed March 15, 2013)
  3. 3.
    Shah, A.: Samsung laying groundwork for server chips, Analysts Say (2012), (accessed March 25, 2013)
  4. 4.
    Moore, G.E.: Cramming More Components Onto Integrated Circuits. In: Proceedings of the IEEE Solid-State Circuits Society Newsletter, vol. 86, pp. 82–85 (1998)Google Scholar
  5. 5.
    Nguyen, V., Hao, S., Szajman, J.: WiiKey: An Innovative Smartphone Based Wi-Fi Application. In: International Multisymposiums Computer and Computational Sciences, IMSCCS 2008, Shanghai, pp. 91–97 (2008)Google Scholar
  6. 6.
    Perrucci, G.P., Fitzek, F.H.P., Widmer, J.: Survey on Energy Consumption Entities on the Smartphone Platform. In: IEEE 73rd Vehicular Technology Conference (VTC Spring), Yokohama, vol. 15, pp. 5–20 (2011)Google Scholar
  7. 7.
    Kalic, G., Bojic, I., Kusek, M.: Energy consumption in android phones when using wireless communication technologies. In: Proceedings of the 35th International Convention MIPRO, Opatija, pp. 754–759 (2012)Google Scholar
  8. 8.
    Gardner-Stephen, P.: Serval Project Developers (2010), (accessed April 10 , 2013)
  9. 9.
    Johnson, D., Ntlatlapa, N., Aichele, C.: A simple pragmatic approach to mesh routing using BATMAN. In: 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, Pretoria, South Africa (2008)Google Scholar
  10. 10.
    (CoCo), C.C.C., Next Generation Networking (2012), (accessed April 30, 2013)
  11. 11.
    Safdar, G.A., McGrath, C., McLoone, M.: Limitations of existing wireless networks authentication and key management techniques for MANETs. In: International Symposium Computer Networks, Istanbul, pp. 101–105 (2006)Google Scholar
  12. 12.
    Macintosh, A., et al.: Local Area Network Dynamic (LANDY) routing protocol: A position based routing protocol for MANET. In: 18th European Wireless Conference, European Wireless, EW 2012, Poznan, Poland, pp. 1–9 (2012)Google Scholar
  13. 13.
    Crawley, E., et al.: A framework for QoS-based routing in the internet, RFC (1998)Google Scholar
  14. 14.
    Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications 11, 48–60 (2004)CrossRefGoogle Scholar
  15. 15.
    Panos, C., Xenakis, C., Stavrakakis, I.: A novel Intrusion Detection System for MANETs. In: Proceedings of International Conference on Security and Cryptography, SECRYPT, Athens, pp. 1–10 (2010)Google Scholar
  16. 16.
    Shakshuki, E.M., Nan, K., Sheltami, T.R.: A Secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics 60, 1089–1098 (2013)CrossRefGoogle Scholar
  17. 17.
    Selby, A., Mitchell, C.: Algorithms for software implementations of RSA. In: IEEE Proceedings Computers and Digital Techniques, vol. 136, pp. 166–170 (1989)Google Scholar
  18. 18.
    Seys, S., Preneel, B.: Power consumption evaluation of efficient digital signature schemes for low power devices. In: IEEE International Conference Wireless and Mobile Computing, Networking and Communications, WiMob 2005, vol. 1, pp. 79–86 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Amr ElBanna
    • 1
  • Ehab ElShafei
    • 1
  • Khaled ElSabrouty
    • 1
  • Marianne A. Azer
    • 1
    • 2
  1. 1.Nile UniversityCairoEgypt
  2. 2.National Telecommunication InstituteCairoEgypt

Personalised recommendations