CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review

by Sandeep Dalal, Jyoti Mahendia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 13
Year of Publication: 2016
Authors: Sandeep Dalal, Jyoti Mahendia
10.5120/ijca2016912315

Sandeep Dalal, Jyoti Mahendia . Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review. International Journal of Computer Applications. 156, 13 ( Dec 2016), 1-5. DOI=10.5120/ijca2016912315

@article{ 10.5120/ijca2016912315,
author = { Sandeep Dalal, Jyoti Mahendia },
title = { Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 13 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number13/26766-2016912315/ },
doi = { 10.5120/ijca2016912315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:29.242141+05:30
%A Sandeep Dalal
%A Jyoti Mahendia
%T Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 13
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks(MANETs) is an infrastructure-less dynamic network consisting of collection of wireless mobile nodes that communicate with each other without using any centralized authority. MANETs are considered vulnerable to several kinds of security attacks like worm-hole attacks, black hole attacks, denial-of-service attacks and rushing attack etc. The routing protocol specifies a set of rules using which routers in network share information with each other and report updates to neighbourhood routers. The routing protocol enables a network to make dynamic adjustment to its conditions. Moreover, routing decisions need not to be predetermined and static. Different security mechanisms have been developed by numerous researchers so far in order to prevent such security threats in a network. In this regard, this paper discusses the existing security mechanisms and routing protocols in Mobile Ad-hoc Network in detail.

References
  1. Priyanka Goyal, Vinti Parmar & Rahul Rishi, “MANET: Vulnerabilities, hallenges,Attacks, Application”,IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
  2. Gagandeep, Aashima & Pawan Kumar “Analysis of Different Security Attacks within MANETs on Protocol Stack”.
  3. International Journal of Engineering & Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012
  4. Mohammad Wazid , Rajesh Kumar Singh & R. H. Goudar, “A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques “ International Journal of Computer Applications® (IJCA) International Conference on Computer Communication & Networks CSI- COMNET-2011.
  5. Fan-Hsun Tseng, Li-Der Chou & Han-Chieh Chao “ A survey of black hole attacks within wireless mobile ad hoc networks” Human-centric Computing & Information Sciences 2011
  6. Sunil Taneja & Ashwani Kush, “ A Survey of Routing Protocols within Mobile Ad-Hoc Networks”, International Journal of Innovation, Management & Technology, Vol. 1, No. 3, 279-285, August 2010.
  7. Gary Breed Editorial Director, “Wireless Ad-Hoc Networks: Basic Concepts”, High Frequency Electronics,March 2007.
  8. Hongmei Deng, Wei Li, & Dharma P. Agrawal, “Routing Security within Wireless Ad Hoc Networks” IEEE Communications Magazine • October 2002
  9. Mohseni, S.; Hassan, R.; Patel, A.; Razali, R, “Comparative review study of reactive & proactive routing protocols within MANETs”, 4th IEEE International Conference on Digital Ecosystems & Technologies, 304-309, 2010.
  10. Humayun Bakht, “ Survey of Routing Protocols for Mobile Ad-hoc Network”, International Journal ofvInformation & Communication Technology Research, 258-270, October 2011.
  11. Mohit Kumar & Rashmi Mishra “An Overview of MANET: History, Challenges & Applications” , Indian Journal of Computer Science & Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
  12. C. Perkins, E. Belding-Royer & S. Das, “Ad-Hoc On-Demand Distance Vector (AODV) Routing”, RFC3561, July 003.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad-hoc network (MANET) Destination sequenced distance vector (DSDV) Ad-hoc On-demand Distance Vector routing (AODV) Dynamic Source Routing (DSR)