Different Routing Protocols And Their Vulnerabilities And Their Measures

HIMADRI, NATH SAHA and BIPASHA, BANERJEE and DEBIKA, BHATTACHARYYA and DEBOPAM, GHOSH and ROHIT, SINGH and SULAGNA, MUKHERJEE (2014) Different Routing Protocols And Their Vulnerabilities And Their Measures. In: International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2014, 08-09 March, 2014, Kuala Lumpur, Malaysia.

[img]
Preview
Text
20140321_045444.pdf - Published Version

Download (781kB) | Preview
Official URL: https://www.seekdl.org/conferences/paper/details/2...

Abstract

Mobile Ad-hoc Network (MANET) is a wireless network model which is infrastructure-less and consists of mobile nodes. Since MANET does not have any centralized base station and is robust in nature, it is a major center of attraction. Due to the open nature, access to trusted authorities, the security in MANET poses a huge threat. Also energy constraint is another factor to be considered and thus, routing in MANET is a big challenge .In this paper we have discussed in depth about the various routing protocols in MANET and classify them. We have also discussed and compared their vulnerabilities in form of attacks, and classify these attacks. Brief descriptions of these attacks are given, mainly emphasizing on the network level attacks. Further we briefly review the existing secured MANET routing protocols to tackle these attacks and discuss their efficiency and shortcomings.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: reactive, proactive, hybrid, MANET, position based routing, attacks in MANET, Secured Routing Protocol.
Depositing User: Mr. John Steve
Date Deposited: 13 May 2019 07:48
Last Modified: 13 May 2019 07:48
URI: http://publications.theired.org/id/eprint/2269

Actions (login required)

View Item View Item