CFP last date
20 December 2024
Reseach Article

Security in Routing Protocol for Mobile Ad Hoc Network

Published on December 2013 by S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
National Conference on Innovative Paradigms in Engineering & Technology 2013
Foundation of Computer Science USA
NCIPET2013 - Number 4
December 2013
Authors: S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
1aa78f60-1337-4f8e-a9ae-50927229b4e4

S. V. Shirbhate, V. M. Thakare, S. S. Sherekar . Security in Routing Protocol for Mobile Ad Hoc Network. National Conference on Innovative Paradigms in Engineering & Technology 2013. NCIPET2013, 4 (December 2013), 5-9.

@article{
author = { S. V. Shirbhate, V. M. Thakare, S. S. Sherekar },
title = { Security in Routing Protocol for Mobile Ad Hoc Network },
journal = { National Conference on Innovative Paradigms in Engineering & Technology 2013 },
issue_date = { December 2013 },
volume = { NCIPET2013 },
number = { 4 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 5-9 },
numpages = 5,
url = { /proceedings/ncipet2013/number4/14717-1349/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Innovative Paradigms in Engineering & Technology 2013
%A S. V. Shirbhate
%A V. M. Thakare
%A S. S. Sherekar
%T Security in Routing Protocol for Mobile Ad Hoc Network
%J National Conference on Innovative Paradigms in Engineering & Technology 2013
%@ 0975-8887
%V NCIPET2013
%N 4
%P 5-9
%D 2013
%I International Journal of Computer Applications
Abstract

Today's mobilizing world, corporation and government agencies are progressively used embedded and wireless technologies. Since the advent of wireless communication, the need for mobile ad hoc networks has been growing exponentially. MANET is a developing research area with applied applications. Due to fundamental characteristics of MANET, it is useful and more popular in mobilizing world. But these features such as open medium, dynamic topology, distributed cooperation and constrained capability are particularly vulnerable to MANET. The security is one of the important challenges in MANET. MANET's topology poses many new challenges such as routing problem which can be solved by routing protocols. Routing plays an important role in security of the entire network. Routing is the central part of wireless ad hoc network. This paper focuses on the routing protocols and some of the vulnerabilities, specifically discussing attacks against routing protocol and analyzes the role of routing protocols in security.

References
  1. Annapurna P Patil ,Narmada Sambaturu , Krittaya Chunhaviriyakul, "Convergence Time Evaluation of Algorithms in MANETs", International Journal of Computer Science and Information Security(IJCSIS) ,Vol. 5, No. 1,ISSN 1947-5500,PP. 144-148, 2009.
  2. Anand Patwardhan, Michaela Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks" , in the Proceedings of the 3rd International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, Hawaii,PP. 1-9. 2005.
  3. Bo Sun, Kui Wu, Udo W. Pooch, " Routing Anomaly Detection in Mobile Ad Hoc Networks", 0-7803-7945-4/03,IEEE, PP. 25-31, 2003.
  4. Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine 0163-6804/02, PP. 70-75. October 2002.
  5. S. Kannan, T. Kalaikumaran,S. Karthik and V. P. Arunachalam, "A Study on Various Attack Detection Methods in Mobile Ad-Hoc Networks", International Journal of Signal System Control and Engineering Application 3(3)ISSN: 1997-5422 published in Medwell Journals,pp. 34-39,2010.
  6. Yi-an Huang, Wei Fan,Wenke Lee, Philip S. Yu, "Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies", Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS'03) 1063-6927/03, IEEE Computer Society,2003.
  7. Mr. Kamaljit I. Lakhtaria,Mr. Paresh Patel, " Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter", Global Journal of Computer Science and Technology Vol. 10 Issue 4 Ver. 1. 0 ,PP. 114-118,June 2010.
  8. S. Mangai, A. Tamilarasi, " An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System In Mobile Ad Hoc Network", Journal of Computer Science 7(4), ISSN 1549-3636, PP. 505-511,2011
  9. Santoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile AdHoc Networks By Dynamic Learning Method", International Journal Of Network Security ,Vol. 5, No. 3, pp. 338-346,Nov,2007.
  10. Abhay Kumar Rai, Rajiv Ranjan Tewari, Saurabh Kant Upadhyay, "Different Types Of Attacks On Integrated MANET –Internet Communication", International Journal Of Computer Science and Security (IJCSS) volume (4), Issue (3), PP. 265-274, 2010.
  11. Baolin Sun, Hua Chen,Layuan Li, "An Intrusion Detection System for AODV ", Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05),0-7695-2284-X/05 , IEEE, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Technology Routing Protocol Manet Security.