A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

被引:9
作者
Borkar, Gautam M. [1 ]
Mahajan, A. R. [2 ]
机构
[1] Rajiv Gandhi Inst Technol, Mumbai 400053, Maharashtra, India
[2] Govt Polytech Coll, Dept Informat Technol, Nagpur 440001, Maharashtra, India
关键词
wireless networks; communication; mobile ad-hoc network; MANET; attacks; routing protocols; PROTOCOL; WIRELESS; AUTHENTICATION; PRIVACY; MANETS; SCHEME; ALGORITHM; ENERGY; NODES;
D O I
10.1504/IJCNDS.2020.103858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in modern technology for transmitting the packets from source node to destination node. The absence of any central contrivance makes MANETs more prone to cyber-attacks. So it is expected to meet the different security requirements such as authentication, confidentiality, integrity, anonymity, and availability. So this paper, developed a detailed survey about the techniques used for solving the various issues like security, authentication and routing. In addition to that, the authentication problem is also focused by providing more security by means of identifying one another. Moreover, the problem of incorporating security into routing protocols, many algorithms have been employed which is very challenging to find out the optimal and efficient method that can be used globally. Finally paper analysed various existing techniques and then critically analysed the work done in the field of MANETs.
引用
收藏
页码:23 / 57
页数:35
相关论文
共 91 条
[1]  
Abdelghany M.A., 2011, 2011 IEEE Radio Frequency Integrated Circuits Symposium, P1
[2]   Scheduled-links multicast routing protocol in MANETs [J].
Abdulwahid, Hasan ;
Dai, Bin ;
Huang, Benxiong ;
Chen, Zijing .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 :56-67
[3]   A Hybrid Algorithm for Preserving Energy and Delay Routing in Mobile Ad-Hoc Networks [J].
Ahmadi, Mitra ;
Shojafar, Mohammad ;
Khademzadeh, Ahmad ;
Badie, Kambiz ;
Tavoli, Reza .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) :2485-2505
[4]  
Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
[5]   Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic [J].
Alsaqour, Raed ;
Abdelhaq, Maha ;
Saeed, Rashid ;
Uddin, Mueen ;
Alsukour, Ola ;
Al-Hubaishi, Mohammed ;
Alandal, Tariq .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 47 :32-46
[6]  
Aluvala S., 2016, PERSPECT SCI, V8, P680, DOI [10.1016/J.PISC.2016.06.057, DOI 10.1016/J.PISC.2016.06.057]
[7]  
[Anonymous], 2002, ACM SIGMOBILE Mobile Computing and Communications Review, DOI DOI 10.1145/581291.581312
[8]  
Ayyasamy R., 2011, INT J ADV INFORM SCI, V5
[9]  
Babu S., 2017, INT J RES SCI ENG, V3, P2394
[10]   Multiconstrained and multipath QoS aware routing protocol for MANETs [J].
Balachandra, Mamatha ;
Prema, K. V. ;
Makkithaya, Krishnamoorthy .
WIRELESS NETWORKS, 2014, 20 (08) :2395-2408