A Survey of Secure Routing Protocols of Mobile AdHoc Network
International Journal of Computer Science and Engineering |
© 2015 by SSRG - IJCSE Journal |
Volume 2 Issue 2 |
Year of Publication : 2015 |
Authors : S.Ranjithkumar, N. Thillaiarasu |
How to Cite?
S.Ranjithkumar, N. Thillaiarasu, "A Survey of Secure Routing Protocols of Mobile AdHoc Network," SSRG International Journal of Computer Science and Engineering , vol. 2, no. 2, pp. 34-39, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I2P108
Abstract:
The mobile ad hoc network is a fast growing research due to their flexibility and independence of network infrastructure. It‟s a challenging task compared to conventional network because of its unique characteristics such as dynamic network topology, limited bandwidth and limited battery power. There are several efficient routing protocols have been proposed for MANET. These are efficient, but in the presence of malicious node there are vulnerable to various kinds of attacks. In this article, we compare the various routing protocols present in MANET and various attacks in the existing MANET protocols.
Keywords:
Routing Protocols; Malicious Node; node attack; Security;
References:
[1] Klaus Pl oßl, Thomas Nowey, Christian Mletzko “Towards a Security Architecture for Vehicular Ad Hoc Networks” The First International Conference on Availability, Reliability and Security, 2006, pp. 374 ARES 2006.
[2] Xiaoqi Li, Michael R. Lyu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks” IEEE Aerospace Conference, 2004.
[3] Mike Burmester, Breno de Medeiros “On the Security of Route Discovery in MANETs” IEEE Transactions on Mobile Computing, Issue No.09., vol.8., pp: 1180-1188 – September 2009.
[4] Payal N. Raj, Prashant B. Swadas B.V.M.Anand, “DPRAODV: a dynamic learning system against Black hole attack in AODV based MANET” IJCSI International Journal of Computer Science Issues, Vol. 2, 2009
[5] Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato “A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks” IEEE Transactions on Vehicular Technology, vol. 58, no. 5, June 2009 2471.
[6] R.B.Bobba, L.Eschenauer, V.D.Gligor, W.Arbaugh “Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks” IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. pp. 1511 - 1515 vol.3
[7] Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar “A Mechanism for Detection of Gray Hole Attack inMobile Ad Hoc Networks” 6th International Conference on Information, Communications & Signal Processing, 2007. pp. 1 – 5.
[8] M. Wang, L. Lamont,Communications Research CentreP. Mason, M. Gorlatova, “An Effective Intrusion Detection Approach for OLSR MANET Protocol” 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec). pp. 55- 60.
[9] El Defrawy, K. Tsudik, G.PRISM: Privacy-friendly Routing In Suspicious MANETs (and VANETs) IEEE International Conference on Network Protocols, 2008. pp.258 – 267.
[10] Y-C Hu and A. Perrig, “A Survey of Secure Wireless AdHoc Routing,” IEEE Sec. and Privacy, May– [11] K. Sanzgiriet al, “A Secure Routing Protocol for AdHoc Networks,” IEEE International Conference on Network Protocols, Nov. 2002.
[12] Y-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proc. Mobi Com ‟02, Atlanta, GA, Sept. 23– 28, 2002.
[13] M. G. Zapata and N. Asokan, “Securing Ad-Hoc RoutingProtocols,” ACM Wksp. Wireless Sec., Sept.2002, pp. 1–10.
[14] B. Wu et al., “A Survey of Attacks and Counter measures in Mobile Ad Hoc Networks” Wireless/Mobile Network Security, Springer, vol. 17, 2006.
[15] S. Marti et al., T. J, Giuli, Kevin Lai, Mary Baker “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th annual international conference on Mobile computing and networking, Pages 255-265