Open Access Open Access  Restricted Access Subscription Access

Performance Analysis and Special Security Issues of Secure Routing Protocols in Ad-Hoc Networks


Affiliations
1 School of IT, SEGi University, Kota Damansara, PJU 5, PJ, Malaysia
 

An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Mobile Ad-hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The analysis of the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. This paper presents the performance analysis and comparison of all the secure routing protocols principles with theirs characteristics, functionality, merits, demerits and security issues.

Keywords

Ad-Hoc Networks, Routing, Security Attacks, MANETs-Mobile Ad-Hoc Wireless NETworks.
User
Notifications
Font Size

Abstract Views: 116

PDF Views: 0




  • Performance Analysis and Special Security Issues of Secure Routing Protocols in Ad-Hoc Networks

Abstract Views: 116  |  PDF Views: 0

Authors

P. Rajamohan
School of IT, SEGi University, Kota Damansara, PJU 5, PJ, Malaysia
Wong Chee Kong
School of IT, SEGi University, Kota Damansara, PJU 5, PJ, Malaysia

Abstract


An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Mobile Ad-hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The analysis of the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. This paper presents the performance analysis and comparison of all the secure routing protocols principles with theirs characteristics, functionality, merits, demerits and security issues.

Keywords


Ad-Hoc Networks, Routing, Security Attacks, MANETs-Mobile Ad-Hoc Wireless NETworks.