• Corpus ID: 822608

Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

@inproceedings{Gowda2013ReviewOS,
  title={Review of Security Approaches in Routing Protocol in Mobile Adhoc Network},
  author={Sumati Ramakrishna Gowda},
  year={2013}
}
In this paper the objective is to present a review of routing protocols in mobile ad hoc network (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology as well as limited range of transmission, very often some nodes cannot communicate directly with each other. Because of this phenomenon, all the QoS and security issues… 

Figures and Tables from this paper

COMPARATIVE REVIEW STUDY OF SECURITY OF ARAN AND AODV ROUTING PROTOCOLS IN MANETS

TLDR
Security aspects of ARAN (Authenticated Routing for Adhoc Network routing protocol) has been analyzed with respect to a commonly used routing protocol AODV (Adhoc On-Demand Distance Vector) i.e. how much these two protocols are resistant to Blackhole and IP-Spoofing attack under GloMoSim-2.03 simulator.

STUDY OF SECURITY OF ARAN AND AODV ROUTING PROTOCOLS IN MANETS

TLDR
Security aspects of ARAN (Authenticated Routing for Adhoc Network routing protocol) has been analyzed with respect to a commonly used routing protocol AODV (Adhoc On-Demand Distance Vector) i.e. how much these two protocols are resistant to Blackhole and IP-Spoofing attack under GloMoSim-2.03 simulator.

Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs

TLDR
The aim of this paper is to provide security against Denial of Service attack for position based routing in MANET by proposing Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM).

Highly Reputed Authenticated Routing in MANET (HRARAN)

TLDR
Simulation results in NS2 accurately predict the performance of proposed Authenticated Routing for Ad hoc Network (ARAN) in terms of packet delivery ratio, end-to-end delay, average path length, average route acquisition and control overhead under varying network conditions.

An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

  • Nidhi Lal
  • Computer Science
    Int. J. Interact. Multim. Artif. Intell.
  • 2014
TLDR
Issues regarding low performance of Watchdog protocol used in the MANET are discussed and an improved Watchdog mechanism is proposed, which is called by I-Watchdog protocol that overcomes the limitations of WatchDog protocol and gives high performance in terms of throughput, delay.

Identifying And Evaluating Jelly Fish Attack Using Aodv Protocol

TLDR
The open and dynamic operational environment of MANET makes it vulnerable to various network attacks.

Survey Analysis of Routing Protocols and Mobility Models in MANETs

TLDR
This paper discusses about various MANET routing protocols such as Proactive, Reactive, Hybrid, their types, comparison of routing protocols, mobility models in MANET, performance matrices that evaluate the performance of MANet routing protocols and applications of MANET.

Securing group based System and Providing key privacy in Multimedia Key Agreement System

TLDR
In number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs is presented, which will help in building secure MANET based application.

An Energy Efficient Multicast Route Establishment using AODV with PSO Algorithm and RSA for Secured Transmission

  • V. VinyaG. Rao
  • Computer Science
    International Journal of Intelligent Engineering and Systems
  • 2019
TLDR
The simulation results showed that MAODV-PSO-RSA method had improved 12.2 % of network performance compared to the existing methods such as Bio-Inspired Routing Protocol (BIRP) and Improved Frog Leap Inspired Protocol (IFLIP).

International Journal of Recent Technology and Engineering (IJRTE)

TLDR
The study has tried to figure out the root cause of repudiation attack in order to come up with more suitable and satisfactory counter measures, and focuses on a variety of dimensions for future research study in the domain of repudiated based on the previous published works and industry reports.

References

SHOWING 1-10 OF 102 REFERENCES

SECURE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS-A SURVEY AND TAXANOMY

TLDR
This paper attempts to review all such secure routing protocols comparing their relative metric and requirements and concludes that efficiency of existing routing protocol degrades in the presence of attacks.

A Scalable Secure Routing Protocol for MANETs

TLDR
This paper proposes a new model of routing protocol called ARANz, which is an extension of the original Authenticated Routing for Ad-Hoc Networks (ARAN) and aims to increase security, achieve robustness and solve the single point of failure and attack problems by introducing multiple Local Certificate Authority servers.

An Analysis of ASRP Secure Routing Protocol for MANET

TLDR
A secure routing protocol is proposed, named ASRP (Authenticate Secure Routing Protocol) bas ed on DSDV (Destinationsequence distance vector), designed to protect the network from malicious and selfish nodes.

Secure routing in a vehicular ad hoc network

TLDR
A novel secure routing protocol based on AODV for infrastructure-based MANET is proposed and the security is based on a centralized PKI and takes into account the specific requirements for security needed in a MANET environment.

A scalable, distributed and secure routing protocol for MANETs

TLDR
This paper proposed a new model of routing protocol called ARANz, which is an extension of the original Authenticated Routing for Ad-Hoc Networks (ARAN) and aims to increase security, achieve robustness and solve the single point of failure and attack problems by introducing multiple Local Certificate Authority servers.

Implementing and Evaluating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network

TLDR
This paper deliberate and implement one secure routing protocol FLSL (adaptive fuzzy logic based security level routing protocol) and study its performance under different scenarios and demonstrates the feasibility of the protocol.

Secure routing for mobile ad hoc networks

TLDR
The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

TLDR
The proposed protocol Secure Enhanced Authenticated Routing Protocol (SEARP) avoids congestion and balances the load to avoid link failure and achieves better packet delivery ratio with reduced delay and overhead compared to AODV protocol.

Simulation-based analysis of security exposures in mobile ad hoc networks

TLDR
A simulation study that identifies security issues that are specific to MANET and that illustrates the effects of those threats on network performance when the DSR routing protocol is used, showing that security issues have to be taken into account at the early stages of a routing protocol design.

Towards provable security for route discovery protocols in mobile ad hoc networks

TLDR
This paper shows that the security proof for endairA is flawed, and that the proposed route discovery algorithm is vulnerable to a hidden channel attack, and analyze the security framework used for route discovery and argues that composability is an essential feature for ubiquitous applications.
...