Security Challenges Related to Routing in Mobile Ad hoc Networks (MANET) and Proposed Solutions
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2012, Vol 2, Issue 6
Abstract
A freely roaming nodes forming as a group of network for effective communication is called Mobile Ad hoc Networks (MANET). In MANET nodes have the liberty of moving around the network with no defensive boundaries and often nodes join and leave the network as per their need due to this nature MANET’s are insecure. In this insecure environment Routing is a critical aspect which must be done properly for secure and reliable delivery of a data and communication. In order to have a secure system we need design a system which provides security to the mechanism of routing i.e. Route Discovery in a efficient way, Route maintenance with less cost and there should be secure Packet forwarding/delivery. In this paper we are trying to study the mechanism of routing as well as various attacks on functionality of routing. We are also studying different solutions to the various attacks on the routing mechanism of MANET and try to propose a best solution.
Authors and Affiliations
J. Rajeshwar| Research Scholar, Dept of Computer Science and Engineering, JNTUH College of Engineering, JNTUH, Kukatpally, Hyderabad A.P, India, Dr. G. Narsimha| Assistant Professor, Department of Information Technology, JNTUH College of Engineering, Kondagattu, Jagityal, Karim Nagar, A.P, India
Design of Pulse Triggered FlipFlop for Low Power Applications
Most important challenge in modern VLSI design along with area and speed is the power consumption. Flip flop is the basic element in digital system which plays very important role. In this paper, a low power pulse tri...
Analysis of Extremely Low VSWR Characteristics of Feed Network of Rectangular Microstrip Patch Antenna
This paper describes extremely low VSWR characteristics of coaxial and microstrip feed networks for slotloaded rectangular microstrip patch antennas. Both Inset feed and coaxial feed from the ground plane are considere...
Optimization of Data Hiding Requirements in Medical Imaging
Data hiding is the process of encoding hidden copyright information in an image by making small modifications to the pixel content. Data hiding process can be split into three main steps: watermark generation and embeddi...
Advance Technique in Demodulation of Non-Coherent Binary Phase Shift Keying
Demodulation of Non Coherent Binary Phase Shift Keying, by using STEL -2110A Chip Circuitry VDSP++4.5 software Technique, Both Time and Frequency recovery of the signal is possible, but in this paper only timing recovery...
Biometric Integration for Improved e-Business Applications
The aim of this project works was to design a framework for biometric authentication and integration scheme by means of biometrics characteristic to secure web applications and E-business authentication to improve se...