Analyzing security of Authenticated Routing Protocol (ARAN)

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Ad hoc network allow nodes to communicate beyond their irect wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol or ad hoc network operate in an ad hoc fashion, as on emand routing protocol often have low verhead and faster reaction time than other type of routing ased on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network traffic, inject them in the path between source and destination and can thus control network traffic. So many secure routing protocols have een developed that deals with these attacks. This paper nalyzes the security aspects of one commonly used secure routing protocol ARAN

Authors and Affiliations

Seema Mehla , Bhawna Gupta , Preeti Nagrath

Keywords

Related Articles

Generation of a pool of variable size symmetric keys through Image

This paper introduces a new concept of the generation of a unending pool of keys through an image leaving behind the idea of sending keys every time for encryption and decryption. This can help in avoiding the problem of...

Introducing a New Language for Stream Applications

Stream programs represent an important class of high-performance computing. These programs are rich in parallelism and can be naturally targeted to distributed and multi-core architectures. Since computer architectures g...

Performance of SIFT based Video Retrieval

Video has become an important element of multimedia computing and communication environments, with applications as varied as broadcasting, education, publishing and military intelligence. In Video Retrieval system, each...

Palmprint Recognition in Eigen-space

This paper proposes a novel technique for palmprint recognition in context to biometric identification of a person. Palmprints are images of the inner portion of a person’s palm and consist of a complex pattern of random...

A Review on sensor based communication kit for impaired society

A gesture is used to classify and recognize a signal that enables communication among the impaired community. It is a technique that has been in use to make people feel comfortable just like the normal people behave. In...

Download PDF file
  • EP ID EP85371
  • DOI -
  • Views 155
  • Downloads 0

How To Cite

Seema Mehla, Bhawna Gupta, Preeti Nagrath (2010). Analyzing security of Authenticated Routing Protocol (ARAN). International Journal on Computer Science and Engineering, 2(3), 664-668. https://europub.co.uk/articles/-A-85371