Open Access   Article Go Back

A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks

S.B. Kolla1 , B.B.K. Prasad2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 20-25, Apr-2014

Online published on Apr 30, 2014

Copyright © S.B. Kolla, B.B.K. Prasad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.B. Kolla, B.B.K. Prasad, “A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.20-25, 2014.

MLA Style Citation: S.B. Kolla, B.B.K. Prasad "A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks." International Journal of Computer Sciences and Engineering 2.4 (2014): 20-25.

APA Style Citation: S.B. Kolla, B.B.K. Prasad, (2014). A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks. International Journal of Computer Sciences and Engineering, 2(4), 20-25.

BibTex Style Citation:
@article{Kolla_2014,
author = {S.B. Kolla, B.B.K. Prasad},
title = {A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {20-25},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=102},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=102
TI - A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S.B. Kolla, B.B.K. Prasad
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 20-25
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3999 3779 downloads 3666 downloads
  
  
           

Abstract

A wireless Adhoc networks is the collection of wireless nodes that can co-operate by forwarding packets for each other to allow nodes to communicate directly. The deployment of Ad-hoc networks in security- and- safety in critical environments requires secure communication primitives. As WSN�s become more and more crucial to everyday functioning of the people. Securing in wireless ad-hoc networks is a challenging task. Low power wireless networks are an existing research direction in routing and security. This paper discusses a wide variety of vulnerabilities while routing and different existing securities to mitigate them.

Key-Words / Index Term

Security, Vulnerabilities, WSN, Ad-Hoc Networks,Routing, Packet Forwarding

References

[1]. C. Perkins and P. Bhagwat, �Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers,� in ACM SIGCOMM, pp. 234�244, Aug. 1994.
[2]. T. Clausen and P. Jacquet, �Optimized link state routing protocol (OLSR).� IETF Request for Comments 3626, 2003.
[3]. T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, �The optimized link state routing protocol, evaluation through experiments and simulation,� in IEEE Symposium on Wireless Personal Mobile Communications, Sept. 2001.
[4]. L. Viennot, �Complexity results on election of multipoint relays in wireless networks,� tech. rep., INRIA, France, 1998.
[5]. C. Perkins, E. Belding-Royer, and S. Das, �Ad hoc on-demand distance vector (AODV) routing.� IETF Request for Comments 3561, 2003.
[6]. D. Johnson, D. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, ch. 5, pp. 139�172. Addison-Wesley, 2001.
[7]. J. Hightower and G. Borriello, �Location systems for ubiquitous computing,� IEEE Computer, vol. 34, no. 8, pp. 57�66, Aug. 2001.
[8]. S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A.Woodward, �A distance routing effect algorithm for mobility (DREAM),� in ACM International Conference on Mobile Computing and Networking (MobiCom), (Dallas, USA), pp. 76�84, Oct. 1998.
[9]. S. Basagni, I. Chlamtac, and V. R. Syrotiuk, �Geographic messaging in wireless ad hoc networks,� in Annual IEEE International Vehicular Technology Conference, (Houston, USA), pp. 1957�1961, May 1999. 32 Rubinstein et al.
[10]. J. Li, J. Jannotti, D. De Couto, D. Karger, and R. Morris, �A scalable location service for geographic ad-hoc routing,� in ACM International Conference on Mobile Computing and Networking (MobiCom), (Boston, USA), pp. 120�130, Aug. 2000.
[11]. R. Morris, F. Kaashoek, D. Karger, D. Aguayo, J. Bicket, S. Biswas, D. De Couto, and J. Li, �The grid ad hoc networking project.� http://pdos.csail.mit.edu/grid/, 2003.
[12]. Byran Parno, Mark Luk, Evan Gaustad, and Aridane Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006
[13]. Y.-C. Hu, D. B. Johnson, and A. Perrig, �SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,� in IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 3�13, June 2002.
[14]. P. Papadimitratos and Z. Hass, �Secure routing for mobile ad hoc networks,� in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Jan. 2002.
[15]. Y.-C. Hu, A. Perrig, and D. B. Johnson, �Ariadne: A secure on-demand routing protocol for ad hoc networks,� in ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 12�23, Sept. 2002.
[16]. M. G. Zapata and N. Asokan, �Securing ad hoc routing protocols,� in ACM Workshop on Wireless Security (WiSe), pp. 1�10, Sept. 2002.
[17]. Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014.