Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

被引:0
|
作者
Mehdi Boulaiche
机构
[1] University of 20 August 1955 Skikda,
来源
关键词
Wireless ad-hoc networks; Secure routing; Reputation; Adversary; Security attack; Survey;
D O I
暂无
中图分类号
学科分类号
摘要
The diverse network technologies and low-end wireless technologies have enabled the deployment of self-organized wireless ad hoc networks. Nodes forming such networks have the ability to autonomously organize and cooperate among them to form an infrastructure that allows data communication in the network. Routing protocols constitute the core of this cooperation. Many routing protocols have been developed to achieve data communication in wireless ad hoc networks and a large number of high quality research papers have appeared and addressed the issue of routing at length. Although they have proved their effectiveness, these routing protocols have been designed for trustworthy environments without any security requirements. However, the presence of an adversary in the network can degrade the routing functionalities and may breaking down the entire network. Therefore, securing routing protocols in such networks becomes an issue. In this paper, we survey the-state-of-the-art of secure routing protocols proposed in the literature that address routing security issue, classifying secure routing protocols in categories according to the secured protocol, and finally discussing the proposed solutions.
引用
收藏
页码:483 / 517
页数:34
相关论文
共 50 条
  • [1] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks
    Boulaiche, Mehdi
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 483 - 517
  • [2] Secure Implementation Of Routing Protocols For Wireless Ad Hoc Networks
    Amutha, S.
    Balasubramanian, Kannan
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 960 - 965
  • [3] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [4] A survey of secure wireless ad hoc routing
    Hu, YC
    Perrig, A
    IEEE SECURITY & PRIVACY, 2004, 2 (03) : 28 - 39
  • [5] A survey of routing protocols for energy constrained ad hoc wireless networks
    Vassileva, Natalia
    Barcelo-Arroyo, Francisco
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 521 - 526
  • [6] A Survey on Current & Traditional Routing Protocols for Ad Hoc Wireless Networks
    Kumar, Amresh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (10): : 83 - 91
  • [7] A Survey of Secure Mobile Ad Hoc Routing Protocols
    Abusalah, Loay
    Khokhar, Ashfaq
    Guizani, Mohsen
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04): : 78 - 93
  • [8] Routing protocols in ad hoc networks: A survey
    Boukerche, Azzedine
    Turgut, Begumhan
    Aydin, Nevin
    Ahmad, Mohammad Z.
    Boeloeni, Ladislau
    Turgut, Damla
    COMPUTER NETWORKS, 2011, 55 (13) : 3032 - 3080
  • [9] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [10] A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad Hoc Networks
    Natsheh, Essam
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2008, 4 (02) : 22 - 37