Security Challenges Related to Routing in Mobile Ad hoc Networks (MANET) and Proposed Solutions
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2012, Vol 2, Issue 6
Abstract
A freely roaming nodes forming as a group of network for effective communication is called Mobile Ad hoc Networks (MANET). In MANET nodes have the liberty of moving around the network with no defensive boundaries and often nodes join and leave the network as per their need due to this nature MANET’s are insecure. In this insecure environment Routing is a critical aspect which must be done properly for secure and reliable delivery of a data and communication. In order to have a secure system we need design a system which provides security to the mechanism of routing i.e. Route Discovery in a efficient way, Route maintenance with less cost and there should be secure Packet forwarding/delivery. In this paper we are trying to study the mechanism of routing as well as various attacks on functionality of routing. We are also studying different solutions to the various attacks on the routing mechanism of MANET and try to propose a best solution.
Authors and Affiliations
J. Rajeshwar| Research Scholar, Dept of Computer Science and Engineering, JNTUH College of Engineering, JNTUH, Kukatpally, Hyderabad A.P, India, Dr. G. Narsimha| Assistant Professor, Department of Information Technology, JNTUH College of Engineering, Kondagattu, Jagityal, Karim Nagar, A.P, India
Indian Stock Market Prediction Using Differential Evolutionary Neural Network Model
This paper presents a scheme using Differential Evolution based Functional Link Artificial Neural Network (FLANN) to predict the Indian Stock Market Indices. The Model uses Back-Propagation (BP) algorithm and Differentia...
Design of Compact Composite Right-Left-Handed Transmission Line Unit Cells
A new unit cell composite right/left-handed (CRLH) metamaterial using microstrip technology with coupled line is proposed. It is simple and has a small size. The proposed unit cell can be designed in several frequenc...
Reconstruction of Cloud Contaminated Remote Sensing Images Using Inpainting Strategy
This paper focuses a method for cloud detection and their reconstruction technique. Detecting these portions of an image and then filling in the missing data is an important photo editing work. The filling-in approach su...
Monitoring and Protection of Oil and Gas Condition in Industrial Using Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are one of the fastest growing and emerging technologies in the field of Wireless networking today. WSNs have a vast amount of applications including environmental monitoring, military, ec...
Key Management Scheme for Preventing False Data in Wireless Sensor Network
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In...