Computer Networks and Internet Research Journal, Volume 9, Issue 1, ICGST LLC, Delaware, USA, July 2009 (original) (raw)
Related papers
607 JCS Science Publications PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD
2015
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes ’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. Th...
A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks
2010
Notice of Violation of IEEE Publication Principles "A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks" by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal in the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 825 - 830 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles: "Security in Mobile Ad Hoc Networks: Challenges and Solutions" by Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang in IEEE Wireless Communications Vol. 11 Issue 1, 2005, pp.38 - 47"ZRP versus DSR and TORA: A comprehensive survey on ZRP performance" by Spilio Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias in the 10th IEEE Conference on Emerging Technologies and Factory Automation (EFTA), 2005, pp. 1017 - 1024Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor co- nectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10.0.
IJERT-An Analysis of Issues in Security and Routing Protocol in MANET
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/an-analysis-of-issues-in-security-and-routing-protocol-in-manet https://www.ijert.org/research/an-analysis-of-issues-in-security-and-routing-protocol-in-manet-IJERTV3IS10391.pdf The Mobile Adhoc Network (MANET) consists of several wireless mobile nodes and due to its mobility their network topology changed dynamically. So the network does not have any fixed infrastructure. In this paper discussed about the various problem and security attacks in each layer in the MANET and also about what are the security services in mobile adhoc network. Routing in adhoc network is main issues because of node mobility and limited resource. Here we discussed two types of routing protocol In this paper also reviewed about the working principles of on demand routing protocol AODV and DSR.Finally compare both the protocol. This will provide guidance for the security related research works in this area.
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks
Computing Research Repository, 2010
Efficiency and simplicity of random algorithms have made them a lucrative alternative for solving complex problems in the domain of communication networks. This paper presents a random algorithm for handling the routing problem in Mobile Ad hoc Networks [MANETS].The performance of most existing routing protocols for MANETS degrades in terms of packet delay and congestion caused as the number of mobile nodes increases beyond a certain level or their speed passes a certain level. As the network becomes more and more dynamic, congestion in network increases due to control packets generated by the routing protocols in the process of route discovery and route maintenance. Most of this congestion is due to flooding mechanism used in protocols like AODV and DSDV for the purpose of route discovery and route maintenance or for route discovery as in the case of DSR protocol. This paper introduces the concept of random routing algorithm that neither maintains a routing table nor floods the entire network as done by various known protocols thereby reducing the load on network in terms of number of control packets in a highly dynamic scenario. This paper calculates the expected run time of the designed random algorithm.
A Review Paper on Ad Hoc Network Security
… Journal of Computer Science and Security …, 2007
In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the proposed solutions and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.
Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review
International Journal of Computer Applications, 2016
Mobile ad hoc networks(MANETs) is an infrastructure-less dynamic network consisting of collection of wireless mobile nodes that communicate with each other without using any centralized authority. MANETs are considered vulnerable to several kinds of security attacks like worm-hole attacks, black hole attacks, denial-of-service attacks and rushing attack etc. The routing protocol specifies a set of rules using which routers in network share information with each other and report updates to neighbourhood routers. The routing protocol enables a network to make dynamic adjustment to its conditions. Moreover, routing decisions need not to be predetermined and static. Different security mechanisms have been developed by numerous researchers so far in order to prevent such security threats in a network. In this regard, this paper discusses the existing security mechanisms and routing protocols in Mobile Ad-hoc Network in detail.
DESIGNING, IMPLEMENTATION & SECURITY ISSUES OF ROUTING PROTOCOLS
With the growing use of the Internet infrastructure for commercial applications, the demand for quality of service has rapidly increased. Hence, wireless Sensor Networks (WSN) are emerging as both an important new tier in the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors. Ad hoc networks are simple peer-to-peer networks, self-organized and with no fixed infrastructure hence the Adhoc networks are more easily attacked than a wired network. They are used in the military oriented tactical operations, for emergency law enforcement, and in rescue missions. Confidentiality, integrity, availability, non-repudiation and the authentication are the basic requirements of the information security. Reachability information is shared between the routers by the routing protocols. As traffic is received at a router, it is forwarded based on the reachability information stored in the router's forwarding table, and the other information stored in the packet's header.
Threats & Security Issues in Ad hoc network: A Survey Report
2013
With the advancement in radio technologies like Bluetooth, IEEE 802.11, a new concept of networking has emerged; this is known as ad hoc networking where potential mobile users arrive within the range for communication. As network is becoming an increasingly important technology for both military and commercial distributed and group based applications, security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks or internal attack and external attacks, the security services such as confidentiality, authenticity and data integrity are also necessary for both wired and wireless networks to protect basic applications. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc ne...
A New Method for Comparing the Security of Routing Protocols in Mobile Ad Hoc Networks
International Journal of Distributed and Parallel systems, 2012
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure or Ad Hoc. Network structures are composed of fixed gates and wired networks. A mobile host can communicate with the other through a bridge called base station. A mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route maintenance .The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats aAd Hocnetwork and also security objectives against these threats will be reviewed and some important routing protocols for these kinds of networks, are compared and evaluated. This comparison, unlike previous comparisons, covers wide range of protocols and develops software NS2.