A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

被引:8
|
作者
Borkar, Gautam M. [1 ]
Mahajan, A. R. [2 ]
机构
[1] Rajiv Gandhi Inst Technol, Mumbai 400053, Maharashtra, India
[2] Govt Polytech Coll, Dept Informat Technol, Nagpur 440001, Maharashtra, India
关键词
wireless networks; communication; mobile ad-hoc network; MANET; attacks; routing protocols; PROTOCOL; WIRELESS; AUTHENTICATION; PRIVACY; MANETS; SCHEME; ALGORITHM; ENERGY; NODES;
D O I
10.1504/IJCNDS.2020.103858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in modern technology for transmitting the packets from source node to destination node. The absence of any central contrivance makes MANETs more prone to cyber-attacks. So it is expected to meet the different security requirements such as authentication, confidentiality, integrity, anonymity, and availability. So this paper, developed a detailed survey about the techniques used for solving the various issues like security, authentication and routing. In addition to that, the authentication problem is also focused by providing more security by means of identifying one another. Moreover, the problem of incorporating security into routing protocols, many algorithms have been employed which is very challenging to find out the optimal and efficient method that can be used globally. Finally paper analysed various existing techniques and then critically analysed the work done in the field of MANETs.
引用
收藏
页码:23 / 57
页数:35
相关论文
共 50 条
  • [41] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    [J]. 2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [42] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [43] Secure, disjoint, multipath source routing Protocol(SDMSR) for mobile ad-hoc networks
    Berton, Sebastien
    Yin, Hao
    Lin, Chuang
    Min, Geyong
    [J]. GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 387 - +
  • [44] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91
  • [45] EFFICIENT MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS
    Chuang, Po-Jen
    Chu, Ting-Yi
    [J]. 2013 IEEE 17TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2013, : 149 - 150
  • [46] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [47] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    [J]. SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [48] A secure routing protocol for mobile ad hoc networks
    [J]. Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [49] A Multipath Routing Survey for Mobile Ad-Hoc Networks
    Adibi, Sasan
    Erfani, Shervin
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 984 - +
  • [50] Angular routing protocol for mobile ad-hoc networks
    Giruka, VC
    Singhal, M
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 551 - 557