2013
DOI: 10.3844/jcssp.2013.607.619
|View full text |Cite
|
Sign up to set email alerts
|

Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: A Review

Abstract: Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emerge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…It is at this level that operates routing protocols (Gopalakrishnan and Ganeshkumar, 2014;Mahdi et al, 2013) and data packets are broadcast. A malicious node can thus divert the normal operation of the protocol by issuing false information in his messages.…”
Section: Network Layermentioning
confidence: 99%
“…It is at this level that operates routing protocols (Gopalakrishnan and Ganeshkumar, 2014;Mahdi et al, 2013) and data packets are broadcast. A malicious node can thus divert the normal operation of the protocol by issuing false information in his messages.…”
Section: Network Layermentioning
confidence: 99%