Security Issues of Routing Protocols in MANETs
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2
Abstract
There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.
Authors and Affiliations
Kaushal Gandhi, Rajneesh Narula, Sumeer Khullar, Anish Arora
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks...
AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM
This research paper examines memory managementissues associated with Smart card EEPROM and proposes a newtechnique for memory management for smart card files. Theentire work concentrates to suggest a new methodology onme...
ADVANCED FILE BASED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW
Cloud computing is a broad solution that delivers IT as a service. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permi...
Study on cerebral vascular image of spectral domain optical coherence tomography with compressive sensing
We propose a novel compressed sensing method to retrieve cerebral vascular image for spectral-domain optical coherence tomography (SD OCT). The compressed sensing method based on l1 norm minimization is applied to recons...
DEVELOPMENT OF AN INTRUSION DETECTION SYSTEM IN A COMPUTER NETWORK
The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has...