A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

被引:9
作者
Borkar, Gautam M. [1 ]
Mahajan, A. R. [2 ]
机构
[1] Rajiv Gandhi Inst Technol, Mumbai 400053, Maharashtra, India
[2] Govt Polytech Coll, Dept Informat Technol, Nagpur 440001, Maharashtra, India
关键词
wireless networks; communication; mobile ad-hoc network; MANET; attacks; routing protocols; PROTOCOL; WIRELESS; AUTHENTICATION; PRIVACY; MANETS; SCHEME; ALGORITHM; ENERGY; NODES;
D O I
10.1504/IJCNDS.2020.103858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in modern technology for transmitting the packets from source node to destination node. The absence of any central contrivance makes MANETs more prone to cyber-attacks. So it is expected to meet the different security requirements such as authentication, confidentiality, integrity, anonymity, and availability. So this paper, developed a detailed survey about the techniques used for solving the various issues like security, authentication and routing. In addition to that, the authentication problem is also focused by providing more security by means of identifying one another. Moreover, the problem of incorporating security into routing protocols, many algorithms have been employed which is very challenging to find out the optimal and efficient method that can be used globally. Finally paper analysed various existing techniques and then critically analysed the work done in the field of MANETs.
引用
收藏
页码:23 / 57
页数:35
相关论文
共 91 条
[31]  
Hashmi Saorsh, 2010, Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), P17, DOI 10.1109/SECURWARE.2010.11
[32]  
Huang YA, 2002, INT CON DISTR COMP S, P478
[33]  
Istikmal A., 2017, PROC 11 INT C TELECO, P1
[34]  
Jaisankar N, 2010, COMM COM INF SC, V70, P217
[35]   A secure credit-based cooperation stimulating mechanism for MANETs using hash chains [J].
Janzadeh, Hamed ;
Fayazbakhsh, Kaveh ;
Dehghan, Mehdi ;
Fallah, Mehran S. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (08) :926-934
[36]  
Jawaligi SS., 2017, WIRELESS SENSOR NETW, V9, P117, DOI [10.4236/wsn.2017.94007, DOI 10.4236/WSN.2017.94007]
[37]   Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks [J].
Jhaveri, Rutvij H. ;
Patel, Narendra M. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
[38]  
Ji LS, 2001, IEEE INFOCOM SER, P1192, DOI 10.1109/INFCOM.2001.916314
[39]  
Khelil A., 2002, Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, P54, DOI DOI 10.1145/570758.570768
[40]   Detecting unauthorized and compromised nodes in mobile ad hoc networks [J].
Komninos, Nikos ;
Vergados, Dimitris ;
Douligeris, Christos .
AD HOC NETWORKS, 2007, 5 (03) :289-298