Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security Analysis of Secure Routing Protocols over MANET


Affiliations
1 Department of Information Technology, Moze College of Engineering, India
2 Department of Information Technology, Bharati Vidyapeeth College of Engineering, Pune, India
     

   Subscribe/Renew Journal


Security is one of the important aspects in mobile ad-hoc network (MANET). Also routing algorithm in MANET is different than traditional routing. This paper assesses limits of traditional routing protocols if applied to MANET. This paper also reviews routing protocols currently used in MANET and put focus on security analysis of routing protocol over several possible security attacks like Attacks using modification, Denial of Service attack, Wormhole attack, Impersonation attacks, Attacks Using fabrication, Rushing Attacks etc. Finally this paper emphasis on need for more robust protocol to detect wormhole attacks.


Keywords

MANET, Routing Algorithms, Security Analysis, Secure Routing Protocol, Network Lifetime.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 157

PDF Views: 4




  • Security Analysis of Secure Routing Protocols over MANET

Abstract Views: 157  |  PDF Views: 4

Authors

Pradnya R. Patange
Department of Information Technology, Moze College of Engineering, India
S. P. Medhane
Department of Information Technology, Bharati Vidyapeeth College of Engineering, Pune, India

Abstract


Security is one of the important aspects in mobile ad-hoc network (MANET). Also routing algorithm in MANET is different than traditional routing. This paper assesses limits of traditional routing protocols if applied to MANET. This paper also reviews routing protocols currently used in MANET and put focus on security analysis of routing protocol over several possible security attacks like Attacks using modification, Denial of Service attack, Wormhole attack, Impersonation attacks, Attacks Using fabrication, Rushing Attacks etc. Finally this paper emphasis on need for more robust protocol to detect wormhole attacks.


Keywords


MANET, Routing Algorithms, Security Analysis, Secure Routing Protocol, Network Lifetime.