Security Issues of Routing Protocols in MANETs
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2
Abstract
There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.
Authors and Affiliations
Kaushal Gandhi, Rajneesh Narula, Sumeer Khullar, Anish Arora
SPICE-like Models for Nonlinear Capacitors and Inductors
Some new models for nonlinear capacitors and nonlinear inductors built with SPICE-like element primitives are presentedhere. They have the advantage that they can be used for simulation in SPICE of those circuits which c...
The Power Savings Possibilities by Light in the Smart Home Care
When designing a visualisation environment for controlling the building service system in Smart Home Care in order to meet the needs of seniors, emphasis is placed not only on the ease of operation and safety of the elde...
Detecting the Sybil Attack in Wireless Sensor Network :Survey
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passive...
The Eportfolio as Support for the Professional Development of Preservice Teachers: a Theoretical and Practical Overview
The portfolio is rapidly gaining attention in initial teacher training programs. It serves multiple uses and ends in the professional development and reflective practice of preservice teachers, and the technical advances...
Image Enhancement based on Contrast Enhancement & Fuzzification Histogram Equalization and Comparison with Contrast Enhancement Techniques
Contrast Enhancement is a technique which comes into the part of Image Enhancement. Contrast Enhancement is used to enhance the visual quality of any captured or other image. Contrast Enhancement can be performed with th...