A Survey of Performance based Secure Routing Protocols in MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and TORA are used. As the network is wireless, security becomes the major issue in Mobile Ad hoc Networks. Some of the attacks such as modification, fabrication, impersonation and denial of service attacks are due to misbehavior of malicious nodes, which disrupts the transmission. To avoid such attacks some of cryptographic algorithms and key management schemes and some existing security protocols are used. In this paper we represent a survey of performance based secure routing techniques in MANET. The security techniques are categorized based upon different approaches. The security type is borrowed from intrusion detection as either misuse detection or anomaly detection. This paper provides the major improvement in the secure techniques in MANET research using these approaches the features and categories in the surveyed work.
Authors and Affiliations
Hariom Soni , Asst. Prof. Preeti Verma
Design and Implementation of Floating Point Multiplier for Better Timing Performance
IEEE Standard 754 floating point is the most common representation today for real numbers on computers. This paper gives a brief overview of IEEE floating point and its representation. This paper describes a sing...
A Novel Approach to Improve Avalanche Effect of AES Algorithm
With the rapid progression of digital data exchange in electronic way, security of information is becoming more important in data storage and transmission. Therefore numerous ways of protecting information are bein...
Performance analysis of Meandered loop and Top loaded monopole antenna for Wireless Applications
This paper presents the design of multiple antennas for various wireless applications. In this paper the combination of top loaded monopole antenna and meandered loop antenna that operates on frequencies of 600MHz...
Web usage mining: Review on preprocessing of web log file
Web log data is one of the major source which contain all the information regarding the users visited links browsing pattern, time spent on a particular page. A web server log file contain information about user nam...
Feature Based Image Sequence Retargeting in the Uncompressed Video Domain
The system propose a video retargeting algorithm to resize images based on the extracted saliency information from the compressed domain. The system utilizes DCT coefficients in JP2 bit stream to perform saliency d...