2019
DOI: 10.33166/aetic.2019.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks

Abstract: Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are consideredin th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…Figure 9 shows 22% used 15 nodes, 21% used 50 nodes, 14% used 25 and 30 nodes,11% used 100 nodes,6% used 60 nodes, 3% used 12,40,45 and 200 nodes as calculate base on Table 11. The lowest number of nodes was 3 [56] used a topology size of 1000x800m 2 , and the highest one was 200 [67,75] used in VANET. Table 10 shows authors who used a fixed number of the node with fixed topology.…”
Section: Number Of Nodesmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 9 shows 22% used 15 nodes, 21% used 50 nodes, 14% used 25 and 30 nodes,11% used 100 nodes,6% used 60 nodes, 3% used 12,40,45 and 200 nodes as calculate base on Table 11. The lowest number of nodes was 3 [56] used a topology size of 1000x800m 2 , and the highest one was 200 [67,75] used in VANET. Table 10 shows authors who used a fixed number of the node with fixed topology.…”
Section: Number Of Nodesmentioning
confidence: 99%
“…Base on all the challenges mentioned above, scholars have created different protocols to improve communication in MANE. They developed proactive protocol [1], reactive protocol [2], and hybrid protocol [3].…”
Section: Introductionmentioning
confidence: 99%
“…Ensuring Ad-Hoc network security requires satisfying many requirements [4]- [8]. One important requirement is confidentiality.…”
Section: Ad-hoc Routing Protocols Securitymentioning
confidence: 99%
“…In [18] and [19] new flooding attacks prevention routing protocols have been proposed. In [20] a triple factor architecture of a secured scheme has been suggested for environments considering reactive routing protocols such AODV. In this architecture, each node computes the trust considering the direct information then verifies the reputation via gathering information from its neighboring nodes and uses a cryptographic algorithm to ensure security.…”
Section: Recent Work In Ad-hoc Network Securitymentioning
confidence: 99%
“…Designing a protocol that will include these criteria and give a better result in a different scenario is difficult to achieve. Various proto-cols have been proposed in the literature, such as Ad-hoc On-demand Distance Vector (AODV) [1], Dynamic Source Routing (DSR) [2], Dynamic Manet On-demand (DYMO) [3], Ad-hoc Ondemand Multipath Distance Vector (AOMDV) [4], Multicast Ad-hoc On-demand Distance Vector (MAODV) [5], Destination Sequenced Distance Vector (DSDV) [6],…”
Section: Introductionmentioning
confidence: 99%