Submit Search
Upload
IRJET-A Review Paper on Secure Routing Technique for MANETS
âą
0 likes
âą
31 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i6/IRJET-V5I6447.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
A Literature Survey of MANET
A Literature Survey of MANET
IRJET Journal
Â
A0110104
A0110104
IJRES Journal
Â
The resistance of routing protocols against DDOS attack in MANET
The resistance of routing protocols against DDOS attack in MANET
IJECEIAES
Â
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
Â
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
Â
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
Â
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
Â
Ds35676681
Ds35676681
IJERA Editor
Â
Recommended
A Literature Survey of MANET
A Literature Survey of MANET
IRJET Journal
Â
A0110104
A0110104
IJRES Journal
Â
The resistance of routing protocols against DDOS attack in MANET
The resistance of routing protocols against DDOS attack in MANET
IJECEIAES
Â
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
Â
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
Â
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
Â
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
Â
Ds35676681
Ds35676681
IJERA Editor
Â
Mane ts
Mane ts
Nunna Swathi
Â
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
cscpconf
Â
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Editor IJMTER
Â
E1073644
E1073644
IJERD Editor
Â
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
Â
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
Â
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
Â
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
Â
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
IRJET Journal
Â
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Mohammad Siraj
Â
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Rahul Singh
Â
Paper id 311201512
Paper id 311201512
IJRAT
Â
10.1.1.258.7234
10.1.1.258.7234
ŰŽÙÙ Ű§ŰĄ ŰŽÙÙ۱۩
Â
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
Â
N0363079085
N0363079085
ijceronline
Â
MANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
Â
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
IJSRED
Â
Paper id 252014122
Paper id 252014122
IJRAT
Â
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
Laurie Smith
Â
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Editor IJMTER
Â
eaodv
eaodv
Chandu Chiru
Â
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET Journal
Â
More Related Content
What's hot
Mane ts
Mane ts
Nunna Swathi
Â
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
cscpconf
Â
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Editor IJMTER
Â
E1073644
E1073644
IJERD Editor
Â
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
Â
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
Â
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
Â
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
Â
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
IRJET Journal
Â
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Mohammad Siraj
Â
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Rahul Singh
Â
Paper id 311201512
Paper id 311201512
IJRAT
Â
10.1.1.258.7234
10.1.1.258.7234
ŰŽÙÙ Ű§ŰĄ ŰŽÙÙ۱۩
Â
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
Â
N0363079085
N0363079085
ijceronline
Â
MANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
Â
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
IJSRED
Â
Paper id 252014122
Paper id 252014122
IJRAT
Â
What's hot
(18)
Mane ts
Mane ts
Â
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
Â
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Â
E1073644
E1073644
Â
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
Â
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
Â
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
Â
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Â
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Â
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Â
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Â
Paper id 311201512
Paper id 311201512
Â
10.1.1.258.7234
10.1.1.258.7234
Â
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Â
N0363079085
N0363079085
Â
MANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Â
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Â
Paper id 252014122
Paper id 252014122
Â
Similar to IRJET-A Review Paper on Secure Routing Technique for MANETS
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
Laurie Smith
Â
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Editor IJMTER
Â
eaodv
eaodv
Chandu Chiru
Â
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET Journal
Â
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
Â
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
IRJET Journal
Â
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
Â
Ft3410671073
Ft3410671073
IJERA Editor
Â
J018216275
J018216275
IOSR Journals
Â
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
prjpublications
Â
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
Â
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
Â
Paper id 28201444
Paper id 28201444
IJRAT
Â
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Natasha Barnett
Â
Aodv
Aodv
Akshita Sharma
Â
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Â
50120130405022
50120130405022
IAEME Publication
Â
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
International Journal of Engineering Inventions www.ijeijournal.com
Â
A Background Study Of MANET
A Background Study Of MANET
Angela Shin
Â
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
Â
Similar to IRJET-A Review Paper on Secure Routing Technique for MANETS
(20)
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
Â
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Â
eaodv
eaodv
Â
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
Â
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
Â
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
Â
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
Â
Ft3410671073
Ft3410671073
Â
J018216275
J018216275
Â
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
Â
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
Â
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Â
Paper id 28201444
Paper id 28201444
Â
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Â
Aodv
Aodv
Â
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Â
50120130405022
50120130405022
Â
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Â
A Background Study Of MANET
A Background Study Of MANET
Â
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
Model Call Girl in Narela Delhi reach out to us at đ8264348440đ
Model Call Girl in Narela Delhi reach out to us at đ8264348440đ
soniya singh
Â
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Â
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Â
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Â
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Â
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Â
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Â
Recently uploaded
(20)
Model Call Girl in Narela Delhi reach out to us at đ8264348440đ
Model Call Girl in Narela Delhi reach out to us at đ8264348440đ
Â
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Â
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Â
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Â
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Â
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Â
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Â
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Â
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Â
IRJET-A Review Paper on Secure Routing Technique for MANETS
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2393 A Review Paper on Secure Routing Technique for MANETs Sonali Sharma1, Simranjit Kaur2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India 2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The mobile adhoc networks are the decentralized type of network in which mobile nodes can join or leave the network they want. Due to self configuring nature of network, active and passive attacks are possible in the network. The active attacks are those which reduce network performance in terms of various parameters. The jelly fish is the active type of attack which reduce network performance and in this paper various secure routing techniques are reviewed and discussed Key Words: AODV, DSR, MANET 1.INTRODUCTION In day-to-day communication wirelessnetworks playsa prominent role. There are many applications where it is widely used likemilitary applications, industrial applicationsand in personal area networks. Due toitssimplicityofinstallation,scalability, flexibility it is very popular in other applications also. In the case of wired network it has fixed infrastructure like cell phones, microwave and RADAR etc. Wireless network hasfurther two categories: Infrastructure and Infrastructure less. In Infrastructure wirelessnetworks,the base stations are fixed, the mobile node can move while communicating. Moreover when nodesgo out of the range ofonebase station it comes to the range of other base stations. In infrastructure less network or an adhoc network, base station is not fixed and router moves in any direction during communication. So this network makes their own route for flu using routing protocol. In coming generation, MANET will be widely used in various applications due to its independent nature. It can join and leave network any time. Topology of the network changes dynamically and covers wide geographically area of network for communication. Because of its decentralized nature its scalability is better than infrastructure network. Inanycrucialscenariossuchasmilitary conflicts, natural disasters etc, ad-hoc network provides better performance due to the minimum configuration and quick operations. Ad-hoc networks can be classified into three categoriesdepending on their applications: Mobile Ad-hoc Networks(MANETs), Wireless Mesh Networks (WMNs) and Wireless Sensor Networks (WSN). 1.1 MANET MANET is a self configuring network, in which topology is dynamic. These nodes are struggling to cope with the normal effect of radio communication channels, multi-user interference; multi-path fadingetc.Thedesignofanoptimumroutingprotocolfor MANET is highly difficult. To determine the connectivity of network organizations, there is a need of an efficientalgorithm link scheduling, and routing in such dynamic scenarios, becomes very important. The efficiency of a routing algorithm dependson the proficient and winning route computation. Usually the shortest path algorithm is a successful method to calculate the optimal way in static networks. But this idea is not possible in MANET platform. There are many factors which can be considered for routing. Networks should adaptively change their routing paths depending on scenarios at any instance to improve any of these affects. 1.2 MANET Architecture A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. All available nodes are awareofallothernodeswithinrange.Theentire collection of nodes is organized in a number of ways. As shown in Fig 1.2 there are more than one path from one node to another . The nodes in a MANET can be of untrustworthy capabilities. Mobile phones, laptop computers and Personal Digital Assistants (PDAs) are some examplesof nodesin ad-hoc networks. In MANETsnodes are frequently movablebutitcanconsist of fixed nodes as well such as access points to Internet.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2394 Fig.1- A Simple Mobile Ad Hoc Networks The nodes in MANETs are interrelated using the multi-hop communication paths. Simply it mentions that all the nodes in the hop must be prepared to contribute in the procedure of deliver a packet by forwarding it from source to destination. Packets are travel through multiple paths. A single file is divided into several data packets, and then these packets are forwarded through different paths. At the destination node, all these packets are combined in sequence to generate the original file. 1.3 Ad Hoc Routing Protocols The principle objective of these protocols is to create an optimal pathway with minimal number of intermediary nodes between source and destination, the route should have less overhead and reasonable bandwidth consumption in order to transmit the message on time. The protocol should be able to perform in an effective &efficient manner throughout the networking environment consisting of heterogeneousad hoc networksi.e., from small to large Multi-hop networks. There are three categoriesofthese routing protocols, which include proactive routing protocols, reactive routing protocols and hybrid routing protocols with respect to the routing topology used in MANET. Proactive routing protocols constantly retain the updated state of the network topology and are typically table-driven. The Proactive routing protocolsincludes DSDV,OLSRroutingprotocols.The second category includesreactive routing protocolsalso known as source-initiated on-demand routing protocols, these are demand driven reactive protocols. Therefore the do not follow the procedure creating & updating routingtableswithrouting information at regular intervals. As they are on demand routing protocols, so they start route discovery only when they are asked to. DSR & AODV are example of these types of routing protocols. Hybrid protocols are the one which utilizes the advantages of both reactive and proactive approaches. It includes Zone Routing Protocol. 1.3.1 Proactive Routing Protocol These routing protocols constantly retain the updated state of the network topology by creating a routing table andhaving the routing information before it is needed. Therefore they are also called as Table Driven protocols. All the nodes present in the network creates& maintains routing information to every other node in the network which is kept in the routing tables and is updated periodically asthe network topology changes. These protocolsmaintain various tables and are notsuitablefor a larger network because the memory required maintaining node entries for each and every node in the routing table of every node will raise an issue regarding cost, overhead and consumption of more bandwidth. 1.3.2 Reactive Routing Protocol These protocols are also known as source-initiated on-demand routing protocols, these are demand driven reactive protocols. Therefore they do not follow the procedure creating & updating routing tableswith routing information at regular intervals. As they are on demand routing protocols, so they start route discovery only when they are asked. In order to send a packet to another node in the network using this protocol, then this protocol initiatesa route discovery process forfindingthe suitable route to the destination and establishing the connection in order to transmit and receive the packet. In this process the RREQ packet is broadcasted throughout the network which adds a significant amount of controltraffictothenetworkdue to query flooding.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2395 1.3.3 Hybrid Routing Protocol These types of protocolsmake use of the strengthsof both the previously discussed protocolsby combining them together to obtain better results. In the initial stage routing is done with some proactively prospected routesand then servesthe demand from additionally activated nodesthrough reactive flooding. The basic idea isthat each node has a pre-defined zonecentredat itself in terms of number of hopsand for the nodeswhich lie within the zone, the protocolusedtomaintain routinginformation in the network is proactive. The nodeswhich lie outside itszone, it doesnot maintain routinginformationinapermanentbase. Instead, reactive routing strategy is adopted when inter- zone connections are required. 1.4 Attacks in MANET There are a variety of attackspossible in MANET. The attackscan be classified as active or passive attacks, internal or external attacks, or different attacks classified on the basisof different protocols. A passive attackdoesnotdisruptthenormaloperation of the network. The attacker only snoops the data exchanged in the network without altering it. It includes Eavesdropping, jamming and traffic analysis and monitoring. In case of active attacks, the attacker attempts to alter or destroy the data being exchanged in the network. This attack disrupts the normal functioning of the network. Active attacks can be internal or external. External attacks are carried out by nodes that do not belong to the network. Internal attacks are from compromised nodesthat are part of the network. Since the attacker is already part of the network, internal attacksare more severeandhard to detect than external attacks.The ultimate goalsof the security solutions for MANETsis to provide security services, suchas authentication, confidentiality, integrity, authentication, non-repudiation, andavailabilitytomobileusers.Thevariouspossible attacks are Fig 2. Classification of attacks in MANET 1.5 Jelly Fish Attack JellyFish attack is concerned with transport layer of MANET stack. The JF attacker disrupts the TCP connection which is established for communication. JellyFish (JF) attacker wishesto intrude into forwarding group and then it delaysdatapackets unnecessarily for some amount of time before forwarding them. Due to JF attack, high end to end delay takes place in the network. So the performance of network (i.e.throughput etc) decreases substantially. Application i.e. file transfer requires reliable and congestion controlled delivery. It is provided by Transmission Control Protocol (TCP). JF attacker disrupts the whole functionality of TCP, so performance of real time applications become worse. JF attack is further divided into three categories- JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. Jelly fish attacks are targeted against closed-loop flows. The goal of jellyfish node is to diminish the good put, which can be achieved by dropping some of packets. When a maliciousnodeslaunchesforwarding rejection attacks it alsomaycomplywith all routing procedures. The Jellyfish attack is one of those kinds. A maliciousnode launching Jellyfishattacksmaykeepactivein both route discovering and packet forwarding in order to prevent it from detection and diagnosis, but the malicious node can attack the traffic via itself by reordering packets, dropping packets periodically, or increasing jitters. The Jellyfish attack is especially harmful to TCP traffic in that cooperative nodescan hardly differentiate these attacksfrom the networkcongestion. Reference also described that malicious nodes may even abuse directional antenna and dynamic power techniques to avoid upstream nodes to detect their misbehaviors of dropping packets. This attack mainly targets closed-loop flows as such flows respond to network conditions likepacket lossand packet delay. It targetsTCPâscongestion controlmechanism.Themaingoal of the Jellyfish nodes is to reduce the good put of all the flowsto near-zero by either reordering the packetsordroppingasmall fraction of packets.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2396 2. LITERATURE SURVEY 3. CONCLUSIONS In this work, it has been concluded that due to decentralized nature of the mobile adhoc network, malicious nodes enter the network which trigger various type of active and passive attacks. The secure and efficient routing techniques has been reviewed in this paper. In future technique will be proposed which detected and isolate malicious nodes from the network. REFERENCES [1] S.S. Tyagi, R.K. Chauhan, âPerformance analysis of ProActive and ReActive routing protocols for ad hoc networksâ, International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30 [2] K. Pandey, A. Swaroop, âA Comprehensive Performance Analysis Of Proactive,Reactive and Hybrid MANETs Routing Protocolsâ, International Journal of computerScience Issues, Vol. 8, Issue 6, No 3, November 2011, pp. 432-441. [3] Internet Engineering Task Force, MANET working group charter.Available from IETF MANETgroup Character Sector,Jan. 2010. [4] K. Majumder and S.K. Sarkar, âPerformance analysis of AODV and DSR Routing ProtocolsinHybridNetworkScenarioâ,Proc. IEEE transactions on networking, Dec. 2009, pp. 1-4. Author Year Description Outcome S.S. Tyagi, R.K.Chauhan 2010 Performance analysis of ProActive and ReActive routing protocols for ad hoc networks AODV and DSR are proved to be better than DSDV. K. Pandey, A. Swaroop 2011 A Comprehensive Performance Analysis Of Proactive, Reactive and Hybrid MANETs Routing Protocols In terms of throughput, AODV performance is better than other protocols. Furthermore, DSDV performancespoorlyfromtimeto time.ZRP throughput does not change even with a change in mobility or pause time because of its hybrid nature Mohammad Wazid, Vipin Kumar and RH Goudar 2012 Comparative Performance Analysis of Routing Protocols in Mobile Ad Hoc Networksunder JellyFishAttack Under JF attack DSR protocol shows maximum time efficiency and TORA protocol showshighest throughput. ManjotKaur , Malti Rani, AnandNayyar 2014 A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks JellyFish Attack exploits the end to end congestion control mechanism of Transmission Control Protocol (TCP). S. Mohseni, R. Hassan, A. Patel, and R. Razali 2010 Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs While it is not clear that any particular algorithm. Each protocol has definite advantages as well as disadvantages and is well suited for certain situations.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2397 [5] Mohammad Wazid, Vipin Kumar and RH Goudar, âComparative PerformanceAnalysisofRoutingProtocolsinMobileAdHoc Networks under JellyFish Attackâ, 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012 [6] ManjotKaur , Malti Rani, AnandNayyar, âA Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networksâ, , International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 199-203 [7] S.A. Ade1& P.A. Tijare, âPerformance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in MANETâ, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, , Dec. 2010, pp. 545-548 [8] S. Mohseni, R. Hassan, A. Patel, and R. Razali, âComparative Review Study of Reactive and Proactive Routing Protocols in MANETsâ, 4th IEEE International Conference on Digital Ecosystems and Technologies 2010 IEEE, Apr. 2010, pp.- 304-309. [9] S.S. Tyagi, R.K. Chauhan, âPerformance analysis of ProActive and ReActive routing protocols for ad hoc networksâ, International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30 [10] T.P. Singh, Dr. R.K. Singh, J. Vats, âEffect of quality parameterson energy efficient Routing protocolsinMANETsâ,Vol.3No- 7, July 2011,pp. 2620-2626. [11] W. Kiess, M. Mauve, "A survey on real-world implementations of mobile ad-hoc networksâ, Vol. 5, Issue 3, Apr. 2007, pp 324-339. [12] X. Hong, K. Xu, M. Gerla, â Scalable routing protocolsfor mobile ad hic networksâ,Network IEEE, Vol. 16, Issue4,july2002, pp. 11-21.
Download now