Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security in Routing Protocol for Mobile Ad Hoc Network

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013
© 2013 by IJCA Journal
NCIPET2013 - Number 4
Year of Publication: 2013
Authors:
S. V. Shirbhate
V. M. Thakare
S. S. Sherekar

S V Shirbhate, V M Thakare and S S Sherekar. Article: Security in Routing Protocol for Mobile Ad Hoc Network. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 NCIPET 2013(4):5-9, December 2013. Full text available. BibTeX

@article{key:article,
	author = {S. V. Shirbhate and V. M. Thakare and S. S. Sherekar},
	title = {Article: Security in Routing Protocol for Mobile Ad Hoc Network},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013},
	year = {2013},
	volume = {NCIPET 2013},
	number = {4},
	pages = {5-9},
	month = {December},
	note = {Full text available}
}

Abstract

Today's mobilizing world, corporation and government agencies are progressively used embedded and wireless technologies. Since the advent of wireless communication, the need for mobile ad hoc networks has been growing exponentially. MANET is a developing research area with applied applications. Due to fundamental characteristics of MANET, it is useful and more popular in mobilizing world. But these features such as open medium, dynamic topology, distributed cooperation and constrained capability are particularly vulnerable to MANET. The security is one of the important challenges in MANET. MANET's topology poses many new challenges such as routing problem which can be solved by routing protocols. Routing plays an important role in security of the entire network. Routing is the central part of wireless ad hoc network. This paper focuses on the routing protocols and some of the vulnerabilities, specifically discussing attacks against routing protocol and analyzes the role of routing protocols in security.

References

  • Annapurna P Patil ,Narmada Sambaturu , Krittaya Chunhaviriyakul, "Convergence Time Evaluation of Algorithms in MANETs", International Journal of Computer Science and Information Security(IJCSIS) ,Vol. 5, No. 1,ISSN 1947-5500,PP. 144-148, 2009.
  • Anand Patwardhan, Michaela Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks" , in the Proceedings of the 3rd International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, Hawaii,PP. 1-9. 2005.
  • Bo Sun, Kui Wu, Udo W. Pooch, " Routing Anomaly Detection in Mobile Ad Hoc Networks", 0-7803-7945-4/03,IEEE, PP. 25-31, 2003.
  • Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine 0163-6804/02, PP. 70-75. October 2002.
  • S. Kannan, T. Kalaikumaran,S. Karthik and V. P. Arunachalam, "A Study on Various Attack Detection Methods in Mobile Ad-Hoc Networks", International Journal of Signal System Control and Engineering Application 3(3)ISSN: 1997-5422 published in Medwell Journals,pp. 34-39,2010.
  • Yi-an Huang, Wei Fan,Wenke Lee, Philip S. Yu, "Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies", Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS'03) 1063-6927/03, IEEE Computer Society,2003.
  • Mr. Kamaljit I. Lakhtaria,Mr. Paresh Patel, " Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter", Global Journal of Computer Science and Technology Vol. 10 Issue 4 Ver. 1. 0 ,PP. 114-118,June 2010.
  • S. Mangai, A. Tamilarasi, " An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System In Mobile Ad Hoc Network", Journal of Computer Science 7(4), ISSN 1549-3636, PP. 505-511,2011
  • Santoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile AdHoc Networks By Dynamic Learning Method", International Journal Of Network Security ,Vol. 5, No. 3, pp. 338-346,Nov,2007.
  • Abhay Kumar Rai, Rajiv Ranjan Tewari, Saurabh Kant Upadhyay, "Different Types Of Attacks On Integrated MANET –Internet Communication", International Journal Of Computer Science and Security (IJCSS) volume (4), Issue (3), PP. 265-274, 2010.
  • Baolin Sun, Hua Chen,Layuan Li, "An Intrusion Detection System for AODV ", Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05),0-7695-2284-X/05 , IEEE, 2005.