scispace - formally typeset
Proceedings ArticleDOI

Secure routing protocols for mobile ad hoc networks

Reads0
Chats0
TLDR
The major attacks that can target the operation of ad hoc routing protocol are discussed and a detailed survey of the well-known secured ad hoc routed protocols for mobile ad hoc networks is presented.
Abstract
Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of centralized administration or established infrastructure. Due to this characteristic, MANETs are particularly vulnerable to various security threats. In addition, the design of most MANET routing protocols assumes that there is no malicious node in the network. Hence, several efforts and researches have been made toward the design of a secure and robust routing protocol for ad hoc networks. In this paper, we discuss the major attacks that can target the operation of ad hoc routing protocol. A detailed survey of the well-known secured ad hoc routing protocols for mobile ad hoc networks is presented. In order to analyze the existent solutions for securing ad hoc routing protocols in a structured manner, we have classified them into three categories: solutions based on cryptography, solutions based on one-way hash chain and hybrid solutions. This paper also gives a brief summary and comparison of various protocols available for secured routing in MANET.

read more

Citations
More filters
Journal ArticleDOI

An Efficient Cluster-Based Approach to Thwart Wormhole Attack in Adhoc Networks

TL;DR: This work presents a technique to overcome the profound attacks like Wormhole and Blackhole by aggregating LGF with k++ Means Clustering aiming at route optimization and promoting security services.
Book ChapterDOI

Robust and Secure Routing Protocols for MANET-Based Internet of Things Systems—A Survey

TL;DR: In this paper, the authors discuss various existing secure MANET protocols that provide secure data transmission and can also be used in the IoT environment to provide robustness in the presence of a variety of threats and vulnerabilities.
Proceedings ArticleDOI

On demand secure routing protocol using Convex-Hull & K-mean approach in MANET

TL;DR: A new on-demand power saving routing algorithm for mobile ad-hoc networks based on node identification using k-means & Convex Hull that gives less hopping, energy saving on demand routing protocol.
Journal ArticleDOI

Defending against false data attacks in 3D grid-based MANET using soft computing approaches

TL;DR: A hybrid routing scheme that combines type 2 fuzzy logic system to find available paths from source to the destination node and particle swarm optimization to identify a best path among the selected paths is proposed and shows higher QoS than others.
Proceedings ArticleDOI

An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc Networks

TL;DR: A secure routing protocol based on an ad-hoc on-demand distance vector (AODV) that successfully achieves both security and communication efficiency and outperforms conventional secure protocols in terms of network load is proposed.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers

TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.

Optimized Link State Routing Protocol (OLSR)

TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).