Open Access Open Access  Restricted Access Subscription Access

Security Challenges In Ad Hoc Networks


Affiliations
1 Information Technology Department, SSSIST, Sehore, India
 

Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes.

In this article we present a study of secure ad hoc routing protocols for wireless Networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated ondemand approaches. The comparison between the secure routing protocols and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.


Keywords

Wireless Network, Ad hoc Network, Security Service, Routing Protocols, Routing Authentication, Hash function and Secure Routing Protocols.
User
Notifications
Font Size

Abstract Views: 167

PDF Views: 0




  • Security Challenges In Ad Hoc Networks

Abstract Views: 167  |  PDF Views: 0

Authors

Ashutosh Yadav
Information Technology Department, SSSIST, Sehore, India
Gajendra Singh Chandel
Information Technology Department, SSSIST, Sehore, India

Abstract


Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes.

In this article we present a study of secure ad hoc routing protocols for wireless Networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated ondemand approaches. The comparison between the secure routing protocols and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.


Keywords


Wireless Network, Ad hoc Network, Security Service, Routing Protocols, Routing Authentication, Hash function and Secure Routing Protocols.