Open Access   Article Go Back

A Survey of Routing Protocols and Security Issues in MANET

K. Sumathi1 , D. Vimal Kumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 518-523, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.518523

Online published on Oct 31, 2018

Copyright © K. Sumathi, D. Vimal Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Sumathi, D. Vimal Kumar, “A Survey of Routing Protocols and Security Issues in MANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.518-523, 2018.

MLA Style Citation: K. Sumathi, D. Vimal Kumar "A Survey of Routing Protocols and Security Issues in MANET." International Journal of Computer Sciences and Engineering 6.10 (2018): 518-523.

APA Style Citation: K. Sumathi, D. Vimal Kumar, (2018). A Survey of Routing Protocols and Security Issues in MANET. International Journal of Computer Sciences and Engineering, 6(10), 518-523.

BibTex Style Citation:
@article{Sumathi_2018,
author = {K. Sumathi, D. Vimal Kumar},
title = {A Survey of Routing Protocols and Security Issues in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {518-523},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3056},
doi = {https://doi.org/10.26438/ijcse/v6i10.518523}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.518523}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3056
TI - A Survey of Routing Protocols and Security Issues in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - K. Sumathi, D. Vimal Kumar
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 518-523
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
328 241 downloads 184 downloads
  
  
           

Abstract

Mobile Ad-hoc network (MANET) is a type of ad hoc network that can change locations and configure itself on the fly and wireless communications. The mobile nodes communicate with each node without any centralized manner. The MANETs does not have any pre-defined network topology. The MANET node wants to send the data between two nodes to establish wireless connection to exchange the data. After data sending is finished the connection is ended. The mobile network topology is regularly changing the location due to nodes moving, resource limitation and bandwidth limitation of mobile node. There are many types of routing protocol available in MANET. In this paper, we discuss about different type of existing MANET routing protocols and its security problems. The MANET routing protocols offered for secure packets sending and face some common attack in ad hoc networks. The routing protocol are subjected to situation against the most frequently identified attack sink hole, grey hole, spoofing, black hole attack and wormhole attack etc. A survey of various issues in MANET regarding security is done considering all major aspects.

Key-Words / Index Term

Mobile Ad-hoc Network, Security Issues, Routing Protocols, Attacks

References

[1] Ali Dorri “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”, Springer Science Business Media New York 2016.
[2] Gayathri Dhananjayan and Janakiraman Subbiah, “T2AR: trust‑aware ad‑hoc routing protocol for MANET”, Springer Plus (2016) 5:995.
[3] Nadav Schweitzer, Ariel Stulman, Member, Asaf Shabtai and Roy David Margalit “Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks”, in: IEEE Transactions on Mobile Computing, Volume: 16 Issue: 8, 2017.
[4] Neelam Janak Kumar Patel, Dr. Khushboo Tripathi, “Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method”, IJSRSET, Volume 4, Issue 4, 2018.
[5] R C Poonia, D. Bhargava, and B.Suresh Kumar. “CDRA: Cluster-based dynamic routing approach as a development of the AODV in vehicular ad-hoc networks”, In Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon, pp.397-401. IEEE, 2015.
[6] S. Hazra, and S.K. Setua. “Black Hole Attack Defending Trusted On-Demand Routing in Ad-Hoc Network”, In Advanced Computing, Networking and Informatics-Volume 2, pp.59-66. Springer International Publishing, 2014.
[7] S. Jain, M. Jain, H. Kandwal, “Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray hole Attacks in Mobile Ad-hoc Networks”, Intl. Journal of Computer Application 1(7): 37-42, Feb. 2010.
[8] A.Siddiqua, S.Kotari, and AAKhan Mohammed. “Preventing black hole attacks in MANETs using secure knowledge algorithm”, Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon. IEEE, 2015.
[9] N.Choudhary and L.Tharani. “Preventing black Hole attack in AODV using timer-based detection mechanism”, Signal processing and communication engineering systems (SPACES), 015 international conferenceon. IEEE,2015.
[10] AK Jain and V Tokekar. “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile adhoc Networks”, Pervasive computing (ICPC), 2015 international conference on. IEEE, 2015.