scispace - formally typeset
Proceedings ArticleDOI

Survey of hash security on DSR routing protocol

Supriya Das, +1 more
- Vol. 2016, pp 520-524
TLDR
The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
Abstract
Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network. This paper presents the literature review of DSR routing protocol and previously proposed approaches that plays a major role for enhancing the performance of DSR routing protocol. The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network.

read more

Citations
More filters
Book ChapterDOI

BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET

TL;DR: A model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node is introduced and shows enhanced throughput and minimal overhead-latency with increasing number of wormhole nodes.
References
More filters
Proceedings ArticleDOI

An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network

TL;DR: An adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design with path-based method to overhear the next hop’s action and the adaptive threshold strategy contributes to decreasing the false positive rate.
Journal ArticleDOI

Security Frameworks for Wireless Sensor Networks-Review

TL;DR: This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.
Proceedings ArticleDOI

Wormhole Attack Avoidance Technique in Mobile Adhoc Networks

TL;DR: This technique for wormhole avoidance addresses the malicious nodes and avoids the routes having wormhole nodes without affecting the overall performance of the network.
Journal ArticleDOI

Proficiency Analysis of AODV, DSR and TORA Ad-hoc Routing Protocols for Energy Holes Problem in Wireless Sensor Networks☆

TL;DR: It is observed that A ODV and DSR protocol outperform TORA in terms of throughput and packet delivery ratio whereas in case of Work efficiency AODV outperforms DSR and TORA protocol.
Proceedings ArticleDOI

Analysis and evaluation optimization dynamic source routing (DSR) protocol in Mobile Adhoc network based on ant algorithm

Istikmal
TL;DR: The results of this research indicate the performance of DSR-ant has a better performance than standard DSR routing protocol, and DSR optimization using ant algorithm can improved performance with a smaller delay and the number hop to transfer information between node.
Related Papers (5)