Open Access   Article Go Back

Components for Designing of Secure Routing Protocol

S.S. Zalte1 , V.R. Ghorpade2

  1. Researcher, Shivaji University, Kolhapur, India.
  2. Principal, Bharti Vidyapeeth’s College of Engineering, Kolhapur, India.

Correspondence should be addressed to: sheetal.zaltegaikwad@com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 313-316, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.313316

Online published on Dec 31, 2017

Copyright © S.S. Zalte, V.R. Ghorpade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.S. Zalte, V.R. Ghorpade, “Components for Designing of Secure Routing Protocol,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.313-316, 2017.

MLA Style Citation: S.S. Zalte, V.R. Ghorpade "Components for Designing of Secure Routing Protocol." International Journal of Computer Sciences and Engineering 5.12 (2017): 313-316.

APA Style Citation: S.S. Zalte, V.R. Ghorpade, (2017). Components for Designing of Secure Routing Protocol. International Journal of Computer Sciences and Engineering, 5(12), 313-316.

BibTex Style Citation:
@article{Zalte_2017,
author = {S.S. Zalte, V.R. Ghorpade},
title = {Components for Designing of Secure Routing Protocol},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {313-316},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1622},
doi = {https://doi.org/10.26438/ijcse/v5i12.313316}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.313316}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1622
TI - Components for Designing of Secure Routing Protocol
T2 - International Journal of Computer Sciences and Engineering
AU - S.S. Zalte, V.R. Ghorpade
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 313-316
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
689 439 downloads 291 downloads
  
  
           

Abstract

In Mobile Ad-hoc Network(MANET) there are so many routing protocols are commenced. But no one will fulfill all security requirements. The crucial issue in MANET is Security due to the openness, infrastructure less and variable topology of MANET. In the broad dispersion of MANET, so many routing protocols are incorporated initially with the assumption that security must be retrofitted. Thus the routing protocols are more prone to various attacks with the risk of destruction of data. In this paper, we have discussed various components which will be required or helpful for designing of secure routing protocol in MANET.

Key-Words / Index Term

MANET, security, attacks, secure routing protocols, components

References

[1] Hu Y., A.Perrig., “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security & Privacy, 2004.
[2] H. Yang, H. Luo, “Security in Mobile Ad Hoc Networks: Challenges and Solution”, IEEE Wireless Communications, 2004.
[3] V.Bhargavi, M.Seetha, S.Viswanadharaju, “ A Trust Based Secure Routing Scheme for MANETS”, IEEE, pp-565-570, 2016.
[4] J.L. Tornos, J.J.Piles and J. L. Salazar,“ ADSR: Authenticated DSR”, 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE,pp-1-8, 2011
[5] M.Pandya,A.K.Shrivastava.,“Improvising Performance with Security of AODV Routing Protocol for MANETs”, IJCA, 78 , p1-1-7,2003.
[6] K. V. Arya, S. S. Rajput ,“ Securing AODV Routing Protocol in MANET using NMAC with HBKS Technique”, 2014 International Conference on Signal Processing and Integrated Networks (SPIN), IEEE,pp-281-285, 2014
[7] A. Patwardhan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, “Secure Routing and Intrusion Detection in Ad Hoc Networks,” in Proc. of the 3rd IEEE – International conference on Pervasive Computing and Communications, March, pp. 191-199,2005.
[8] S. Soni, A. Parihar, “ Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks”, IJCA (0975 – 8887), Volume 135 – No.5, February 2016
[9] J. Kim, G. Tsudik,“SRDP: Secure route discovery for dynamic source routing in MANETs”, elsevier,Ad Hoc Networks 7, pp- 1097–1109,2009
[10] A.Rajaram ,S.Palaniswami, “ A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks”, IJCSI, Vol. 7, Issue 4, No 5,pp-37-45, July 2010
[11] Anitha, J. Akilandeswari, “ Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures”, InterJRI Computer Science and Networking, Vol. 2, Issue 1,pp-14-18, August 2010
[12] N. Raza1, M. U. Aftab1, M. Q. Akbar2, O. Ashraf3, M. Irfan4, “ Mobile Ad-Hoc Networks Applications and Its Challenges”, Communications and Network, 8,pp- 131- 136,August 2016 .
[13] A Ambhaikar, D Mitra,R.Deshmukh, “ Performance of MANET Routing Protocol for Improving Scalability ”, Published in IJAEA,