Review of Security in Manets Using Cryptographic Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
Ad hoc on demand distance vector (AODV) is a routing protocol for Mobile Ad hoc networks. An ad hoc network is a collection of moveable nodes which works without the need of any centralized base station or any infrastructure. AODV is one of the widely used routing protocol and this protocol is under intensive research and development. Manets are highly vulnerable to threats and hacking attacks due to lack of any centralized station. In this review Paper the problem of securing mobile ad hoc networks routing protocol is verified and analyzed.
Authors and Affiliations
Gagandeep
Agile Testing Challenges and Critical success factors
it has been seen in recent years that agile software testing comes out as a most productive, promising and effective testing technique in large scale and small scale software development process. Testing is one of the pr...
A Prototypical Solution for Cyber Space
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive netwo...
Performance Analysis of Optical Wireless Communication Channel Link at Various Bit Rates
Optical wireless communication systems have got more popularity in last few years due to its advantage over conventional radio frequency communication systems. This paper reports the effect of using NRZ and RZ modulation...
Developing a Wireless Ad-Hoc Network using MAC Schemes
A mobile user can connect to a LAN by using a wireless connection which is known as Wireless LAN (WLAN). WLAN uses high frequency waves instead of wire to communicate between nodes. Here signals are of limited range. WLA...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...