Improving Security in MANETs

A. Jayanand*, T.Jeba Rajan**
* Assistant Professor, Maria College of Engineering and Technology, Attoor, Tamilnadu.
** Principal, Kings Engineering College, Sriperumpudur, Tamilnadu.
Periodicity:April - June'2011
DOI : https://doi.org/10.26634/jse.5.4.1442

Abstract

The recent emergence of a new technology, MANET i.e., Mobile Ad-Hoc Networks, has seen increased emphasis on organized and secure wireless interconnection of various communication devices that can operate in concert with wired networking infrastructure. The malicious attacks on security of such networks always render them vulnerable and time and again new theories have to be formulated to nullify such attacks. A further study is made through this paper into a possible way of secured routing so that MANET still retain its presence as the one of the most secure and effective communication methods studded with exceptionally advanced technologies known in the wired and wireless networking arena.

Keywords

MANET, Ad-Hoc, Routing Protocols, Endaira, Ariadne.

How to Cite this Article?

A. Jayanand andT. Jeba Rajan (2011). Improving Security In MANETs. i-manager’s Journal on Software Engineering, 5(4), 6-11. https://doi.org/10.26634/jse.5.4.1442

References

[1]. Abidin, A.F.A., Usop, N.S.M., & N.H.N. Zulkifli. (2010). An Analysis on Endaira:A Provably Secure On-Demand Source Routing Protocol. International Journal on Computer Science and Engineering, Vol. 02, No. 03, 437- 442.
[2]. Acharya, A., Misra, A., & Bansal, S. (2003). MACA-P: AMAC for concurrent transmissions in multi-hop wireless networks. In Proceedings of the first IEEE PerCom 2003 conference, pp. 505–508.
[3]. Chris Karlof, & David Wagner. (2011). Secure Routing in Wireless Sensor Networks : Attacks a n d Countermeasures. Retrieved on Jan 24, 2011 from http://citeseer.nj. nec.com/576488.html.
[4]. Ganesan, D., Govindan, R., Shenker, S., & Estrin, D. (2001). Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4).
[5]. Gowsiga,S., & Manavalasundaram, V.K. (2010). A Mechanism with Security for Route Discovery in MANETs. Proceedings of the International conference “Comutational System and Communication Technology”.
[6]. Hu ,Y.-C., Perrig, A., & Johnson, D.B. (2001). Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science. Rice University. Retrieved on Jan 24, 2011 from http://citeseer.nj.nec.com/hu01packet.html.
[7]. Jiang, S., Rao, J., He, X., Ling, X., & Ko, C.C. (2002). A simple distributed PRMA for MANETs. IEEE Transactions on Vehicular Technology, 51(2), 293–305.
[8]. Karpijoki, Vesa. (2001). Security in Ad Hoc Networks. Retrieved on Jan 24, 2011 from http://citeseer.nj. nec.com/karpijoki01security.html.
[9]. Muqattash, A., & Krunz, M. (2004). A single-channel solution for transmission power control in wireless ad hoc networks. In Proceedings of MobiHoc, Tokyo, Japan.
[10]. Stajano, Frank & Anderson, Ross. (1999). The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Retrieved on Jan 24, 2011 from http://www.uk. research.att.com/˜fms/; http://www.cl.cam.ac.uk/˜rja14/.
[11]. Toh, C., Guichal, G., & Bunchua, S. (2000). ABAM: On-demand associativity-based multicast routing for ad hoc mobile networks. In Proceedings of 52nd IEEE Vehicular Technology Conference (VTC Fall 2000), Vol. 3, pp. 987–993.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.