CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Comparative study for Secure Routing in MANET

by Dr. M. K. Soni, Prof. P.K. Suri, Parul Tomar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 5
Year of Publication: 2010
Authors: Dr. M. K. Soni, Prof. P.K. Suri, Parul Tomar
10.5120/824-1167

Dr. M. K. Soni, Prof. P.K. Suri, Parul Tomar . A Comparative study for Secure Routing in MANET. International Journal of Computer Applications. 4, 5 ( July 2010), 17-22. DOI=10.5120/824-1167

@article{ 10.5120/824-1167,
author = { Dr. M. K. Soni, Prof. P.K. Suri, Parul Tomar },
title = { A Comparative study for Secure Routing in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2010 },
volume = { 4 },
number = { 5 },
month = { July },
year = { 2010 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number5/824-1167/ },
doi = { 10.5120/824-1167 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:17.072597+05:30
%A Dr. M. K. Soni
%A Prof. P.K. Suri
%A Parul Tomar
%T A Comparative study for Secure Routing in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 5
%P 17-22
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult to provide a secure environment in MANET. In this paper we are providing a detailed survey of different kind of attacks and proposed solutions for handling those attacks. This paper also gives a brief comparison of various protocols available for secured routing in MANET.

References
Index Terms

Computer Science
Information Sciences

Keywords

MANET SECURITY RREP RREQ TTL