alexa A Review on Secure Routing Protocols in MANET
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

A Review on Secure Routing Protocols in MANET

Komal Khedkar, Shubham Joshi
  1. M.E. Student, Dept. of C.E., D.P.C.O.E. Wagholi, Pune, Maharashtra, India
  2. Assistant Professor, Dept. of C.E., D.P.C.O.E. Wagholi, Pune, Maharashtra, India
Related article at Pubmed, Scholar Google
 

Abstract

Mobile Ad hoc network (MANET) is a collection of self configuring, multi-hop wireless network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is more vulnerable to different types of attacks and security threats because of its characteristics. A routing protocol in a mobile Ad hoc network should be secure against both inside and outside attackers. Most of the routing protocols in MANETs assume that all the nodes in a network will cooperate to each other while forwarding data packets to other nodes. But intermediate nodes may cause several problems like it can deny to forward the packet, can also extract useful information from the packet or may modify the content of packet. Such nodes are referred as malicious nodes. An Improvised Secure routing approach should be used to address these issues in MANET by applying suitable cryptography or encryption techniques which can prevent outside attackers. By applying intrusion detection system (IDS), internal attackers can be prevented. In this paper various previously used routing protocols are discussed. Analysis is done by considering various previously used mechanisms used by those protocols and aim is to find out one new authentication based approach for secure routing.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords