The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Mobile network, ad-hoc network or Wireless ad-hoc network is the latest networking trend today. In the past fifteen years the no. of Mobile phone users has grown exponentially. The perks offered by this wireless mode of networking are open to all: anywhere, anytime, un tethered access to a huge no. of global users. Statistical Analysis: This paper consists of systematic review and analysis of various existing techniques which helps us to cope against such disasters with an actual and sorted representation. In the end, we wind up our results with the merits and demerits of existing methods along with the liabilities of future scope in this area. Findings: The review studies have shown various mobile software vulnerabilities with their advantages, disadvantages along with their future scopes. Application: The application of mobile software networks is innumerable, from mobile browsers to e-commerce to mobile money, there uses are extensive and important.

Keywords

Ad-hoc Network, Authentication, Malware, Mobile Network, Reliability, Vulnerabilities.
User