CFP last date
20 May 2024
Reseach Article

A Survey of Security Issues and Routing Protocols in Mobile Adhoc Networks

Published on March 2013 by Tholkapia Arasu, Y. Arockia Jesuraj, R. Kowsalya
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 2
March 2013
Authors: Tholkapia Arasu, Y. Arockia Jesuraj, R. Kowsalya
35533f50-c73d-475c-9fec-f8ca54a90ee0

Tholkapia Arasu, Y. Arockia Jesuraj, R. Kowsalya . A Survey of Security Issues and Routing Protocols in Mobile Adhoc Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 2 (March 2013), 1-5.

@article{
author = { Tholkapia Arasu, Y. Arockia Jesuraj, R. Kowsalya },
title = { A Survey of Security Issues and Routing Protocols in Mobile Adhoc Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 2 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icicic2013/number2/11291-1323/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A Tholkapia Arasu
%A Y. Arockia Jesuraj
%A R. Kowsalya
%T A Survey of Security Issues and Routing Protocols in Mobile Adhoc Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 2
%P 1-5
%D 2013
%I International Journal of Computer Applications
Abstract

Mobile Ad hoc network consist of a lot of ad hoc nodes connecting to enjoy communication. The nodes have internal capabilities and connect to the end users. There is a need for optimal path to be allocated to users. This allows for easy access and provides data in a efficient manner. The conventional algorithms in usage though efficient suffer from issues like congestion, data loss. This needs to be handled as part of the network model. There is overhead in providing data as it needs to be secured. This paper analyzes and provides directions for combining security and routing protocols in ad hoc network. A complete tabulation has been prepared and provides research directions for providing optimal and secured communication in mobile ad hoc network.

References
  1. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Single-copy routing in intermittently connected mobile networks," in Proc. IEEE Conf. Sensor and Ad Hoc Communications and Networks (SECON), 2004, pp. 235–244.
  2. P. Gupta and P. Kumar, "Capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388–404, 2000.
  3. H. Wu, R. Fujimoto, R. Guensler, and M. Hunter, "Mddv: Mobilitycentric data dissemination algorithm for vehicular networks," in Proc. ACM SIGCOMM Workshop on Vehicular Ad Hoc Networks (VANET), 2004.
  4. R. C. Shah, S. Roy, S. Jain, and W. Brunette, "Data mules: Modeling and analysis of a three-tier architecture for sparse sensor networks," Elsevier Ad Hoc Netw. J. , 2003.
  5. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. The paperiss, "Delay-tolerant networking: An approach to interplanetary Internet," IEEE Commun. Mag. , vol. 41, no. 6, pp. 128–136, Jun. 2003.
  6. J. Heidemann, W. Ye, J. Wills, A. Syed, and Y. Li, "Research challenges and applications for underwater sensor networking," in Proc. IEEE Wireless Communications and Networking Conf. , 2006.
  7. J. Scott, P. Hui, J. Crowcroft, and C. Diot, "Haggle: A networking architecture designed around mobile users," in Proc. IFIP Conf. Wireless On-Demand Network Systems and Services (WONS), 2006.
  8. M. Papadopouli and H. Schulzrinne, "Seven degrees of separation in mobile ad hoc networks," in Proc. IEEE GLOBECOM, 2000.
  9. C. E. Perkins, Ad Hoc Networking, 1st ed. Reading, MA: Addison- The papersley, 2001.
  10. A. Vahdat and D. Becker, "Epidemic routing for partially connected ad hoc networks," Duke Univ. , Durham, NC, Tech. Rep. CS-200006, Apr. 2000.
  11. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with Zebranet," in Proc. ACM ASPLOS, 2002.
  12. A. Lindgren, A. Doria, and O. Schelen, "Probabilistic routing in intermittently connected networks," SIGMOBILE Mobile Comput. Commun. Rev. , vol. 7, no. 3, 2003.
  13. X. Zhang, G. Neglia, J. Kurose, and D. Towsley, "Performance modeling of epidemic routing," in Proc. IFIP Networking, 2006.
  14. Q. Li and D. Rus, "Communication in disconnected ad hoc networks using message relay," J. Parallel Distrib. Comput. , vol. 63, no. 1, pp. 75–86, 2003.
  15. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. The paperiss, "Delay-tolerant networking: An approach to interplanetary Internet, IEEE Commun. Mag. , vol. 41, no. 6, pp. 128–136, Jun. 2003.
  16. Qayyum, Mohammed; Subhash, P. ; Husamuddin, Mohammed, "Security issues of data query processing and location monitoring in MANETS", International Conference on Communication, Networking & Broadcasting,pp. 1-5,2012
  17. Sheikh, R. ; Singh Chande, M. ; Kumar Mishra, D. ," Security issues in MANET: A review", Seventh International Conference On Wireless And Optical Communications Networks (WOCN), pp. 1-4,2010
  18. Liu Chunli; Liu DongHui ," Computer network security issues and countermeasures", IEEE Symposium on Robotics and Applications (ISRA), Pp. 328-331,2012
  19. Ahmed, S. ; Buragga, K. ; Ramani, A. K. ,"Security issues concern for E-Learning by Saudi universities", 13th International Conference on Advanced Communication Technology (ICACT), Pp. 1579-1581, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Computational Complexity pnr srt faces nrpa Searching Algorithm