We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Comprehensive Review of Security Issues in Manets

by Saloni Sharma, Anuj Kumar Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 21
Year of Publication: 2013
Authors: Saloni Sharma, Anuj Kumar Gupta
10.5120/12097-8277

Saloni Sharma, Anuj Kumar Gupta . A Comprehensive Review of Security Issues in Manets. International Journal of Computer Applications. 69, 21 ( May 2013), 32-37. DOI=10.5120/12097-8277

@article{ 10.5120/12097-8277,
author = { Saloni Sharma, Anuj Kumar Gupta },
title = { A Comprehensive Review of Security Issues in Manets },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 21 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number21/12097-8277/ },
doi = { 10.5120/12097-8277 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:55.999310+05:30
%A Saloni Sharma
%A Anuj Kumar Gupta
%T A Comprehensive Review of Security Issues in Manets
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 21
%P 32-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

During the past few years the emergence of Mobile adhoc networks (MANETS) and its various uses in different fields of communication has been observed. It has led to an instant growth in wireless technology. Many routing protocols have been designed and implemented for proper functioning of mobile adhoc networks. The prime objective of these routing protocols is to provide a specific and much effective route in a network. AODV which is a reactive protocol for MANETs is considered as the most effective routing protocol by Internet Engineering Task force. Due to MANET's infrastructure less nature, security is a prime issue to be maintained. This paper submits the brief introduction about mobile adhoc networks, their counter attacks, different routing protocols and their consecutive security measures.

References
  1. imrich chlamtac , marco conti, jennifer j. -n. liu "mobile ad hoc networking: imperatives and challenges" in proceedings of 2003 elsevier
  2. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Carde "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks" in proceedings of WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D. -Z. Du (Eds. ) pp. – - – °c 2006 Springer.
  3. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani "A Survey of Secure Mobile Ad Hoc Routing Protocols" in proceedings of ieee communications surveys & tutorials, vol. 10, no. 4, fourth quarter 2008.
  4. Davide Cerri and Alessandro Ghioni "Securing AODV: The A-SAODV Secure Routing Prototype" in proceedings of IEEE Communications 0163-6804/08/$25. 00 © 2008 IEEE.
  5. Anuj K. Gupta "Secure Routing Techniques for mobile adhoc networks" in proceedings of 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6–7March 2009.
  6. Mohd Anuar Jaafar and Zuriati AhmadZukarnain "Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment" in proceedings of European Journal of Scientific Research ISSN 1450-216X Vol. 32 No. 3 (2009), pp. 430-443.
  7. R. Devi, B. Sumathi, T. Gandhimathi, G. Alaiyarasi "Performance Metrics of MANET in Multi-Hop Wireless Ad Hoc Network Routing Protocols" in proceedings of International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005 National Conference on Architecture, Software system and Green computing.
  8. G. S. Mamatha and Dr. S. C. Sharma "analyzing the manet variations, challenges, capacity and protocol issues" in proceedings of International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 1, No. 1, August 2010.
  9. Priyanka Goyal, Vinti Parmar, Rahul Rishi " MANET: Vulnerabilities, Challenges, Attacks, Application" in proceedings of IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
  10. Anil Suryavanshi and Dr. Poonam Sinha "Efficient techniques for saodv in mobile adhoc network" in proceedings of Journal of Global Research in Computer Science, Volume 2, No. 8, August 2011.
  11. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma "Review of Various Routing Protocols for MANETs" in proceedings of International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011.
  12. Robinpreet Kaur & Mritunjay Kumar Rai "A Novel Review on Routing Protocols in MANETs" in proceedings of Undergraduate Academic Research Journal (UARJ), ISSN : 2278 – 1129, Volume-1, Issue-1, 2012.
  13. Pankaj Sharma , Yogendra Kumar Jain "Trust based secure aodv in manet" in proceedings of Journal of Global Research in Computer Science Volume 3, No. 6, June 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Security Routing Protocol AODV SAODV ARAN. SEAD Ariadne