![]() |
10.5120/ijca2016912315 |
Sandeep Dalal and Jyoti Mahendia. Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review. International Journal of Computer Applications 156(13):1-5, December 2016. BibTeX
@article{10.5120/ijca2016912315, author = {Sandeep Dalal and Jyoti Mahendia}, title = {Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review}, journal = {International Journal of Computer Applications}, issue_date = {December 2016}, volume = {156}, number = {13}, month = {Dec}, year = {2016}, issn = {0975-8887}, pages = {1-5}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume156/number13/26766-2016912315}, doi = {10.5120/ijca2016912315}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Mobile ad hoc networks(MANETs) is an infrastructure-less dynamic network consisting of collection of wireless mobile nodes that communicate with each other without using any centralized authority. MANETs are considered vulnerable to several kinds of security attacks like worm-hole attacks, black hole attacks, denial-of-service attacks and rushing attack etc. The routing protocol specifies a set of rules using which routers in network share information with each other and report updates to neighbourhood routers. The routing protocol enables a network to make dynamic adjustment to its conditions. Moreover, routing decisions need not to be predetermined and static. Different security mechanisms have been developed by numerous researchers so far in order to prevent such security threats in a network. In this regard, this paper discusses the existing security mechanisms and routing protocols in Mobile Ad-hoc Network in detail.
References
- Priyanka Goyal, Vinti Parmar & Rahul Rishi, “MANET: Vulnerabilities, hallenges,Attacks, Application”,IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
- Gagandeep, Aashima & Pawan Kumar “Analysis of Different Security Attacks within MANETs on Protocol Stack”.
- International Journal of Engineering & Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012
- Mohammad Wazid , Rajesh Kumar Singh & R. H. Goudar, “A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques “ International Journal of Computer Applications® (IJCA) International Conference on Computer Communication & Networks CSI- COMNET-2011.
- Fan-Hsun Tseng, Li-Der Chou & Han-Chieh Chao “ A survey of black hole attacks within wireless mobile ad hoc networks” Human-centric Computing & Information Sciences 2011
- Sunil Taneja & Ashwani Kush, “ A Survey of Routing Protocols within Mobile Ad-Hoc Networks”, International Journal of Innovation, Management & Technology, Vol. 1, No. 3, 279-285, August 2010.
- Gary Breed Editorial Director, “Wireless Ad-Hoc Networks: Basic Concepts”, High Frequency Electronics,March 2007.
- Hongmei Deng, Wei Li, & Dharma P. Agrawal, “Routing Security within Wireless Ad Hoc Networks” IEEE Communications Magazine • October 2002
- Mohseni, S.; Hassan, R.; Patel, A.; Razali, R, “Comparative review study of reactive & proactive routing protocols within MANETs”, 4th IEEE International Conference on Digital Ecosystems & Technologies, 304-309, 2010.
- Humayun Bakht, “ Survey of Routing Protocols for Mobile Ad-hoc Network”, International Journal ofvInformation & Communication Technology Research, 258-270, October 2011.
- Mohit Kumar & Rashmi Mishra “An Overview of MANET: History, Challenges & Applications” , Indian Journal of Computer Science & Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
- C. Perkins, E. Belding-Royer & S. Das, “Ad-Hoc On-Demand Distance Vector (AODV) Routing”, RFC3561, July 003.
Keywords
Mobile ad-hoc network (MANET), Destination sequenced distance vector (DSDV), Ad-hoc On-demand Distance Vector routing (AODV), Dynamic Source Routing (DSR)