Analyzing security of Authenticated Routing Protocol (ARAN)

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Ad hoc network allow nodes to communicate beyond their irect wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol or ad hoc network operate in an ad hoc fashion, as on emand routing protocol often have low verhead and faster reaction time than other type of routing ased on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network traffic, inject them in the path between source and destination and can thus control network traffic. So many secure routing protocols have een developed that deals with these attacks. This paper nalyzes the security aspects of one commonly used secure routing protocol ARAN

Authors and Affiliations

Seema Mehla , Bhawna Gupta , Preeti Nagrath

Keywords

Related Articles

HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers...

Optimizing a multiple criteria dynamic layout problem using a simultaneous data envelopment analysis modeling Optimizing a DLP using DEA<br />

The main characteristic of today's manufacturing environments is volatility. Under such a volatile environment some parameters like demand is not stable. To operate efficiently under such environments, the facilities mus...

An Approach to Active Queue Management in Computer Network

Active queue management is a key technique for reducing the packet drop rate in the internet. This packet dropping mechanism is used in a router to minimize congestion when the packets are dropped before queue gets full...

Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications

In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we hav...

Mining Best-N Frequent Patterns in a Video Sequence

Video mining is used to discover and describe interesting patterns in video data, which has become one of the core problem areas of the data mining research community. Compared to the mining of other types of data (e.g.,...

Download PDF file
  • EP ID EP85371
  • DOI -
  • Views 164
  • Downloads 0

How To Cite

Seema Mehla, Bhawna Gupta, Preeti Nagrath (2010). Analyzing security of Authenticated Routing Protocol (ARAN). International Journal on Computer Science and Engineering, 2(3), 664-668. https://europub.co.uk/articles/-A-85371