Analysis of Exposed Node Problem and Security Concerns in Adhoc Networks


  • T. L. Singal Chitkara Institute of Engineering and Technology, Rajpura, Punjab
  • Prachi Sharma Infosys Technologies Ltd., Mysore
  • Ravneet Kaur Infosys Technologies Ltd., Mysore



Exposed node, Adhoc network, Simulator, MANET GloMoSim, AODV, CSMA


“The paper contains the analysis of exposed node problem in mobile adhoc network. The problem is that before starting the transmission, a station wants to know whether there is activity around the receiver. If the transmission is taking place around the receiver, there will be collisions and the effective throughput will be decreased. A detailed study of the simulation on these exposed nodes is carried out using the GloMoSim software to calculate the throughput for the various transmission powers and different protocols, so as to compare the performances by varying different parameters. These simulation results with GloMoSim corroborate our theoretical analysis.”


Download data is not yet available.


ANSI/IEEE Standards 802.11, (1999) ‘Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications’.

Bhargava, S. and Agrawal, D.P. (2001) ‘Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks’, Vehicular Technology Conference, 7-11 Oct., Atlantic City, NJ.

Gummalla, C.V. and Limb, J.O. (2000) ‘Wireless medium access control protocols,’ IEEE Communications Surveys & Tutorials, 3, 2-15.

Saeed, M. J., Merabti, M. and Skwith, R.J. (2007) ‘Route Maintenance in Wireless Ad Hoc Networks’, paper presented at PGNet2007, 28-29 June, Liverpool John Moores University.

Talukdar, A.K. and Yawagal, R. (2005) ‘Mobile Computing’, (1st Ed), Tata Macgraw Hill, pp 324-326.



Xu, K., Gerla, M. and Bae, S. (2002) ‘How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?’,IEEE Globecom’02, 17-21 November, California University, Los Angeles, USA.

Xu, K., Gerla, M. and Bae, S. (2003) ‘Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks’, 1, 107-123.

Zhang, Y. and Lee, W. (2000) ‘Intrusion Detection in Wireless Ad Hoc Networks,’ 6th International Conference on Mobile Computing and Network, 6-11 August, pp. 275–283.




How to Cite

Singal, T. L. ., Sharma, P. ., & Kaur, R. . (2010). Analysis of Exposed Node Problem and Security Concerns in Adhoc Networks. Journal of Technology Management for Growing Economies, 1(1), 103–112.