CFP last date
20 January 2025
Reseach Article

Performance Analysis of MANET Reactive Routing under Security

by K Sreenivasulu, E V Prasad, A. Subramanyam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 7
Year of Publication: 2012
Authors: K Sreenivasulu, E V Prasad, A. Subramanyam
10.5120/9704-4152

K Sreenivasulu, E V Prasad, A. Subramanyam . Performance Analysis of MANET Reactive Routing under Security. International Journal of Computer Applications. 60, 7 ( December 2012), 23-26. DOI=10.5120/9704-4152

@article{ 10.5120/9704-4152,
author = { K Sreenivasulu, E V Prasad, A. Subramanyam },
title = { Performance Analysis of MANET Reactive Routing under Security },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 7 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number7/9704-4152/ },
doi = { 10.5120/9704-4152 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:55.196203+05:30
%A K Sreenivasulu
%A E V Prasad
%A A. Subramanyam
%T Performance Analysis of MANET Reactive Routing under Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 7
%P 23-26
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) mainly depends on people's confidence in its security. In a MANET, a collection of mobile hosts with wireless network interfaces form a network without the aid of any fixed infrastructure or centralized administration. The characteristics of MANET pose challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. There are a wide variety of attacks that target the weakness of MANET, and Black-hole attack and Denial of Service attack (DOS) are the most prominent among this. Most of the research is focused on detect and how avoid these attacks by compromising on the performance of the network. This paper considers network Quality of Service (QoS) has one of the prime important factor and with the Overhead and packet-Delivery are the two important criteria evaluate the performance of the network in the presence of the security attacks. .

References
  1. Y. Xiao, X. Shen, and D. -Z. Du, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", WIRELESS/MOBILE NETWORK SECURITY, Springer 2006.
  2. Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks", JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
  3. Shivanajay Marwaha, "Challenges and Recent Advances in QoS Provisioning, Signaling, Routing and MAC protocols for MANETs".
  4. Giovanni Di Crescenzo, Renwei Ge, "Securing Reliable Server Pooling in MANET Against Byzantine Adversaries", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006.
  5. Yih-Chun Hu , Adrian Perrig , David B. Johnson "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols". Proc. of ACM WiSe 2003. September 2003.
  6. I. Aad, J. -P. Hubaux, and E. W. Knightly, "Denial of Service Resilience in Ad Hoc Networks",. Proc. of ACM MobiCom '04, 2004, pp. 202. 215.
  7. Yingbin Liang , "Secrecy Throughput of MANETs Under Passive and Active Attacks", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER 2011.
  8. Q. Gu, P. Liu, S. Zhu, and C. -H. Chu, "Defending Against Packet Injectionin Unreliable Ad Hoc Networks". Proc. of IEEE GLOBECOM'05, 2005.
  9. J. Kong, X. Hong, Y. Yi, J. -S. Park, J. Liu, and M. Gerla, "A SecureAd-hoc Routing Approach using Localized Self-healing Communities", in Proc. Of ACM MobiHoc '05. , 2005.
Index Terms

Computer Science
Information Sciences

Keywords

MANET QOS AODV Security Attacks