2018
DOI: 10.5815/ijcnis.2018.08.06
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Security Features in MANET Routing Protocols

Abstract: Abstract-Mobile ad-hoc network or MANET is an autoorganizing network of mobile nodes. It lacks centralized control and is connected by wireless links. One of the many benefits of MANETs is that it can be utilized where there is no proper infrastructural support for wireless access and wired backbone is not possible. One major drawbacks of MANET is that as it is an infracture-less network, created on the fly, so here each node also functions as a router. So, each node participates in the routing of packets and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Sajyth and Sujatha 21 discussed Data confidentiality, reliable bee cluster routing protocol, packet forwarding rate and used them to identify the attack. Vyas 22 implemented the concept of MANET multi‐hop routing mechanisms are essential but can cause difficult problems such as a lack of data privacy in the communication process. Mukhedkar 23 compared ECC (Elliptic Curve Cryptography), combined with the Bee clustering technique, Yadav 24 explained the energy saving, and Sharma 25 provides a secure data transmission system.…”
Section: Related Workmentioning
confidence: 99%
“…Sajyth and Sujatha 21 discussed Data confidentiality, reliable bee cluster routing protocol, packet forwarding rate and used them to identify the attack. Vyas 22 implemented the concept of MANET multi‐hop routing mechanisms are essential but can cause difficult problems such as a lack of data privacy in the communication process. Mukhedkar 23 compared ECC (Elliptic Curve Cryptography), combined with the Bee clustering technique, Yadav 24 explained the energy saving, and Sharma 25 provides a secure data transmission system.…”
Section: Related Workmentioning
confidence: 99%
“…Hash-based secure routing is presented toward QoS development which combines security features with the existing on demand routing algorithms. 5 An energy efficient Dynamic Probabilistic Routing Algorithm is discussed. This traditional flooding mechanism generates the large number of duplicate packets which were transferred all along the network which increases the network contention, collision, and retransmission.…”
Section: Related Workmentioning
confidence: 99%
“…The disturbance in the remote channel created an extraordinary probabilistic controlling calculation to adapt to package duplication and mistakes. The number of hubs in the neighborhood MANET climate was considered to work out the retransmission probability [6].…”
Section: Literature Surveymentioning
confidence: 99%