SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2393
A Review Paper on Secure Routing Technique for MANETs
Sonali Sharma1, Simranjit Kaur2
1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and
Technology(Badhani), Punjab,India
2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and
Technology(Badhani), Punjab,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The mobile adhoc networks are the decentralized type of network in which mobile nodes can join or leave the
network they want. Due to self configuring nature of network, active and passive attacks are possible in the network. The active
attacks are those which reduce network performance in terms of various parameters. The jelly fish is the active type of attack
which reduce network performance and in this paper various secure routing techniques are reviewed and discussed
Key Words: AODV, DSR, MANET
1.INTRODUCTION
In day-to-day communication wirelessnetworks playsa prominent role. There are many applications where it is widely used
likemilitary applications, industrial applicationsand in personal area networks. Due toitssimplicityofinstallation,scalability,
flexibility it is very popular in other applications also. In the case of wired network it has fixed infrastructure like cell phones,
microwave and RADAR etc.
Wireless network hasfurther two categories: Infrastructure and Infrastructure less. In Infrastructure wirelessnetworks,the
base stations are fixed, the mobile node can move while communicating. Moreover when nodesgo out of the range ofonebase
station it comes to the range of other base stations. In infrastructure less network or an adhoc network, base station is not
fixed and router moves in any direction during communication. So this network makes their own route for flu using routing
protocol.
In coming generation, MANET will be widely used in various applications due to its independent nature. It can join and leave
network any time. Topology of the network changes dynamically and covers wide geographically area of network for
communication.
Because of its decentralized nature its scalability is better than infrastructure network. Inanycrucialscenariossuchasmilitary
conflicts, natural disasters etc, ad-hoc network provides better performance due to the minimum configuration and quick
operations.
Ad-hoc networks can be classified into three categoriesdepending on their applications: Mobile Ad-hoc Networks(MANETs),
Wireless Mesh Networks (WMNs) and Wireless Sensor Networks (WSN).
1.1 MANET
MANET is a self configuring network, in which topology is dynamic. These nodes are struggling to cope with the normal effect
of radio communication channels, multi-user interference; multi-path fadingetc.Thedesignofanoptimumroutingprotocolfor
MANET is highly difficult. To determine the connectivity of network organizations, there is a need of an efficientalgorithm link
scheduling, and routing in such dynamic scenarios, becomes very important. The efficiency of a routing algorithm dependson
the proficient and winning route computation. Usually the shortest path algorithm is a successful method to calculate the
optimal way in static networks. But this idea is not possible in MANET platform. There are many factors which can be
considered for routing. Networks should adaptively change their routing paths depending on scenarios at any instance to
improve any of these affects.
1.2 MANET Architecture
A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime
without using any pre-existing network infrastructure. All available nodes are awareofallothernodeswithinrange.Theentire
collection of nodes is organized in a number of ways. As shown in Fig 1.2 there are more than one path from one node to
another . The nodes in a MANET can be of untrustworthy capabilities. Mobile phones, laptop computers and Personal Digital
Assistants (PDAs) are some examplesof nodesin ad-hoc networks. In MANETsnodes are frequently movablebutitcanconsist
of fixed nodes as well such as access points to Internet.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2394
Fig.1- A Simple Mobile Ad Hoc Networks
The nodes in MANETs are interrelated using the multi-hop communication paths. Simply it mentions that all the nodes in the
hop must be prepared to contribute in the procedure of deliver a packet by forwarding it from source to destination. Packets
are travel through multiple paths. A single file is divided into several data packets, and then these packets are forwarded
through different paths. At the destination node, all these packets are combined in sequence to generate the original file.
1.3 Ad Hoc Routing Protocols
The principle objective of these protocols is to create an optimal pathway with minimal number of intermediary nodes
between source and destination, the route should have less overhead and reasonable bandwidth consumption in order to
transmit the message on time.
The protocol should be able to perform in an effective &efficient manner throughout the networking environment
consisting of heterogeneousad hoc networksi.e., from small to large Multi-hop networks. There are three categoriesofthese
routing protocols, which include proactive routing protocols, reactive routing protocols and hybrid routing protocols with
respect to the routing topology used in MANET. Proactive routing protocols constantly retain the updated state of the
network topology and are typically table-driven. The Proactive routing protocolsincludes DSDV,OLSRroutingprotocols.The
second category includesreactive routing protocolsalso known as source-initiated on-demand routing protocols, these are
demand driven reactive protocols. Therefore the do not follow the procedure creating & updating routingtableswithrouting
information at regular intervals. As they are on demand routing protocols, so they start route discovery only when they are
asked to. DSR & AODV are example of these types of routing protocols. Hybrid protocols are the one which utilizes the
advantages of both reactive and proactive approaches. It includes Zone Routing Protocol.
1.3.1 Proactive Routing Protocol
These routing protocols constantly retain the updated state of the network topology by creating a routing table andhaving
the routing information before it is needed. Therefore they are also called as Table Driven protocols. All the nodes present in
the network creates& maintains routing information to every other node in the network which is kept in the routing tables
and is updated periodically asthe network topology changes. These protocolsmaintain various tables and are notsuitablefor
a larger network because the memory required maintaining node entries for each and every node in the routing table of
every node will raise an issue regarding cost, overhead and consumption of more bandwidth.
1.3.2 Reactive Routing Protocol
These protocols are also known as source-initiated on-demand routing protocols, these are demand driven reactive
protocols. Therefore they do not follow the procedure creating & updating routing tableswith routing information at regular
intervals. As they are on demand routing protocols, so they start route discovery only when they are asked. In order to send a
packet to another node in the network using this protocol, then this protocol initiatesa route discovery process forfindingthe
suitable route to the destination and establishing the connection in order to transmit and receive the packet. In this process
the RREQ packet is broadcasted throughout the network which adds a significant amount of controltraffictothenetworkdue
to query flooding.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2395
1.3.3 Hybrid Routing Protocol
These types of protocolsmake use of the strengthsof both the previously discussed protocolsby combining them together to
obtain better results. In the initial stage routing is done with some proactively prospected routesand then servesthe demand
from additionally activated nodesthrough reactive flooding. The basic idea isthat each node has a pre-defined zonecentredat
itself in terms of number of hopsand for the nodeswhich lie within the zone, the protocolusedtomaintain routinginformation
in the network is proactive. The nodeswhich lie outside itszone, it doesnot maintain routinginformationinapermanentbase.
Instead, reactive routing strategy is adopted when inter- zone connections are required.
1.4 Attacks in MANET
There are a variety of attackspossible in MANET. The attackscan be classified as active or passive attacks, internal or external
attacks, or different attacks classified on the basisof different protocols. A passive attackdoesnotdisruptthenormaloperation
of the network. The attacker only snoops the data exchanged in the network without altering it. It includes Eavesdropping,
jamming and traffic analysis and monitoring. In case of active attacks, the attacker attempts to alter or destroy the data being
exchanged in the network. This attack disrupts the normal functioning of the network. Active attacks can be internal or
external. External attacks are carried out by nodes that do not belong to the network. Internal attacks are from compromised
nodesthat are part of the network. Since the attacker is already part of the network, internal attacksare more severeandhard
to detect than external attacks.The ultimate goalsof the security solutions for MANETsis to provide security services, suchas
authentication, confidentiality, integrity, authentication, non-repudiation, andavailabilitytomobileusers.Thevariouspossible
attacks are
Fig 2. Classification of attacks in MANET
1.5 Jelly Fish Attack
JellyFish attack is concerned with transport layer of MANET stack. The JF attacker disrupts the TCP connection which is
established for communication. JellyFish (JF) attacker wishesto intrude into forwarding group and then it delaysdatapackets
unnecessarily for some amount of time before forwarding them. Due to JF attack, high end to end delay takes place in the
network. So the performance of network (i.e.throughput etc) decreases substantially. Application i.e. file transfer requires
reliable and congestion controlled delivery. It is provided by Transmission Control Protocol (TCP). JF attacker disrupts the
whole functionality of TCP, so performance of real time applications become worse. JF attack is further divided into three
categories- JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack.
Jelly fish attacks are targeted against closed-loop flows. The goal of jellyfish node is to diminish the good put, which can be
achieved by dropping some of packets. When a maliciousnodeslaunchesforwarding rejection attacks it alsomaycomplywith
all routing procedures. The Jellyfish attack is one of those kinds. A maliciousnode launching Jellyfishattacksmaykeepactivein
both route discovering and packet forwarding in order to prevent it from detection and diagnosis, but the malicious node can
attack the traffic via itself by reordering packets, dropping packets periodically, or increasing jitters. The Jellyfish attack is
especially harmful to TCP traffic in that cooperative nodescan hardly differentiate these attacksfrom the networkcongestion.
Reference also described that malicious nodes may even abuse directional antenna and dynamic power techniques to avoid
upstream nodes to detect their misbehaviors of dropping packets. This attack mainly targets closed-loop flows as such flows
respond to network conditions likepacket lossand packet delay. It targetsTCP’scongestion controlmechanism.Themaingoal
of the Jellyfish nodes is to reduce the good put of all the flowsto near-zero by either reordering the packetsordroppingasmall
fraction of packets.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2396
2. LITERATURE SURVEY
3. CONCLUSIONS
In this work, it has been concluded that due to decentralized nature of the mobile adhoc network, malicious nodes enter the
network which trigger various type of active and passive attacks. The secure and efficient routing techniques has been
reviewed in this paper. In future technique will be proposed which detected and isolate malicious nodes from the network.
REFERENCES
[1] S.S. Tyagi, R.K. Chauhan, “Performance analysis of ProActive and ReActive routing protocols for ad hoc networks”,
International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30
[2] K. Pandey, A. Swaroop, “A Comprehensive Performance Analysis Of Proactive,Reactive and Hybrid MANETs Routing
Protocols”, International Journal of computerScience Issues, Vol. 8, Issue 6, No 3, November 2011, pp. 432-441.
[3] Internet Engineering Task Force, MANET working group charter.Available from IETF MANETgroup Character Sector,Jan.
2010.
[4] K. Majumder and S.K. Sarkar, “Performance analysis of AODV and DSR Routing ProtocolsinHybridNetworkScenario”,Proc.
IEEE transactions on networking, Dec. 2009, pp. 1-4.
Author Year Description
Outcome
S.S. Tyagi, R.K.Chauhan 2010
Performance analysis of ProActive
and ReActive routing protocols for
ad hoc networks
AODV and DSR are proved to be
better than DSDV.
K. Pandey, A. Swaroop 2011
A Comprehensive Performance
Analysis Of Proactive, Reactive and
Hybrid MANETs Routing Protocols
In terms of throughput, AODV
performance is better than other
protocols. Furthermore, DSDV
performancespoorlyfromtimeto
time.ZRP throughput does not
change even with a change in
mobility or pause time because of
its hybrid nature
Mohammad Wazid,
Vipin Kumar and RH
Goudar
2012
Comparative Performance Analysis
of Routing Protocols in Mobile Ad
Hoc Networksunder JellyFishAttack
Under JF attack DSR protocol
shows maximum time efficiency
and TORA protocol showshighest
throughput.
ManjotKaur , Malti
Rani, AnandNayyar
2014
A Comprehensive Study of Jelly Fish
Attack in Mobile Ad hoc Networks
JellyFish Attack exploits the end
to end congestion control
mechanism of Transmission
Control Protocol (TCP).
S. Mohseni, R. Hassan,
A. Patel, and R. Razali
2010
Comparative Review Study of
Reactive and Proactive Routing
Protocols in MANETs
While it is not clear that any
particular algorithm. Each
protocol has definite advantages
as well as disadvantages and is
well suited for certain situations.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2397
[5] Mohammad Wazid, Vipin Kumar and RH Goudar, “Comparative PerformanceAnalysisofRoutingProtocolsinMobileAdHoc
Networks under JellyFish Attack”, 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012
[6] ManjotKaur , Malti Rani, AnandNayyar, “A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks”, ,
International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 199-203
[7] S.A. Ade1& P.A. Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in MANET”,
International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, , Dec. 2010, pp. 545-548
[8] S. Mohseni, R. Hassan, A. Patel, and R. Razali, “Comparative Review Study of Reactive and Proactive Routing Protocols in
MANETs”, 4th IEEE International Conference on Digital Ecosystems and Technologies 2010 IEEE, Apr. 2010, pp.- 304-309.
[9] S.S. Tyagi, R.K. Chauhan, “Performance analysis of ProActive and ReActive routing protocols for ad hoc networks”,
International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30
[10] T.P. Singh, Dr. R.K. Singh, J. Vats, “Effect of quality parameterson energy efficient Routing protocolsinMANETs”,Vol.3No-
7, July 2011,pp. 2620-2626.
[11] W. Kiess, M. Mauve, "A survey on real-world implementations of mobile ad-hoc networks”, Vol. 5, Issue 3, Apr. 2007, pp
324-339.
[12] X. Hong, K. Xu, M. Gerla, “ Scalable routing protocolsfor mobile ad hic networks”,Network IEEE, Vol. 16, Issue4,july2002,
pp. 11-21.

More Related Content

What's hot

VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
N0363079085
N0363079085N0363079085
N0363079085ijceronline
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkIJSRED
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 

What's hot (18)

Mane ts
Mane tsMane ts
Mane ts
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
E1073644
E1073644E1073644
E1073644
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
N0363079085
N0363079085N0363079085
N0363079085
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 

Similar to IRJET-A Review Paper on Secure Routing Technique for MANETS

A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETIRJET Journal
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073IJERA Editor
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANETAngela Shin
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 

Similar to IRJET-A Review Paper on Secure Routing Technique for MANETS (20)

A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
eaodv
eaodveaodv
eaodv
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
J018216275
J018216275J018216275
J018216275
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Aodv
AodvAodv
Aodv
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
50120130405022
5012013040502250120130405022
50120130405022
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IRJET-A Review Paper on Secure Routing Technique for MANETS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2393 A Review Paper on Secure Routing Technique for MANETs Sonali Sharma1, Simranjit Kaur2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India 2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The mobile adhoc networks are the decentralized type of network in which mobile nodes can join or leave the network they want. Due to self configuring nature of network, active and passive attacks are possible in the network. The active attacks are those which reduce network performance in terms of various parameters. The jelly fish is the active type of attack which reduce network performance and in this paper various secure routing techniques are reviewed and discussed Key Words: AODV, DSR, MANET 1.INTRODUCTION In day-to-day communication wirelessnetworks playsa prominent role. There are many applications where it is widely used likemilitary applications, industrial applicationsand in personal area networks. Due toitssimplicityofinstallation,scalability, flexibility it is very popular in other applications also. In the case of wired network it has fixed infrastructure like cell phones, microwave and RADAR etc. Wireless network hasfurther two categories: Infrastructure and Infrastructure less. In Infrastructure wirelessnetworks,the base stations are fixed, the mobile node can move while communicating. Moreover when nodesgo out of the range ofonebase station it comes to the range of other base stations. In infrastructure less network or an adhoc network, base station is not fixed and router moves in any direction during communication. So this network makes their own route for flu using routing protocol. In coming generation, MANET will be widely used in various applications due to its independent nature. It can join and leave network any time. Topology of the network changes dynamically and covers wide geographically area of network for communication. Because of its decentralized nature its scalability is better than infrastructure network. Inanycrucialscenariossuchasmilitary conflicts, natural disasters etc, ad-hoc network provides better performance due to the minimum configuration and quick operations. Ad-hoc networks can be classified into three categoriesdepending on their applications: Mobile Ad-hoc Networks(MANETs), Wireless Mesh Networks (WMNs) and Wireless Sensor Networks (WSN). 1.1 MANET MANET is a self configuring network, in which topology is dynamic. These nodes are struggling to cope with the normal effect of radio communication channels, multi-user interference; multi-path fadingetc.Thedesignofanoptimumroutingprotocolfor MANET is highly difficult. To determine the connectivity of network organizations, there is a need of an efficientalgorithm link scheduling, and routing in such dynamic scenarios, becomes very important. The efficiency of a routing algorithm dependson the proficient and winning route computation. Usually the shortest path algorithm is a successful method to calculate the optimal way in static networks. But this idea is not possible in MANET platform. There are many factors which can be considered for routing. Networks should adaptively change their routing paths depending on scenarios at any instance to improve any of these affects. 1.2 MANET Architecture A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. All available nodes are awareofallothernodeswithinrange.Theentire collection of nodes is organized in a number of ways. As shown in Fig 1.2 there are more than one path from one node to another . The nodes in a MANET can be of untrustworthy capabilities. Mobile phones, laptop computers and Personal Digital Assistants (PDAs) are some examplesof nodesin ad-hoc networks. In MANETsnodes are frequently movablebutitcanconsist of fixed nodes as well such as access points to Internet.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2394 Fig.1- A Simple Mobile Ad Hoc Networks The nodes in MANETs are interrelated using the multi-hop communication paths. Simply it mentions that all the nodes in the hop must be prepared to contribute in the procedure of deliver a packet by forwarding it from source to destination. Packets are travel through multiple paths. A single file is divided into several data packets, and then these packets are forwarded through different paths. At the destination node, all these packets are combined in sequence to generate the original file. 1.3 Ad Hoc Routing Protocols The principle objective of these protocols is to create an optimal pathway with minimal number of intermediary nodes between source and destination, the route should have less overhead and reasonable bandwidth consumption in order to transmit the message on time. The protocol should be able to perform in an effective &efficient manner throughout the networking environment consisting of heterogeneousad hoc networksi.e., from small to large Multi-hop networks. There are three categoriesofthese routing protocols, which include proactive routing protocols, reactive routing protocols and hybrid routing protocols with respect to the routing topology used in MANET. Proactive routing protocols constantly retain the updated state of the network topology and are typically table-driven. The Proactive routing protocolsincludes DSDV,OLSRroutingprotocols.The second category includesreactive routing protocolsalso known as source-initiated on-demand routing protocols, these are demand driven reactive protocols. Therefore the do not follow the procedure creating & updating routingtableswithrouting information at regular intervals. As they are on demand routing protocols, so they start route discovery only when they are asked to. DSR & AODV are example of these types of routing protocols. Hybrid protocols are the one which utilizes the advantages of both reactive and proactive approaches. It includes Zone Routing Protocol. 1.3.1 Proactive Routing Protocol These routing protocols constantly retain the updated state of the network topology by creating a routing table andhaving the routing information before it is needed. Therefore they are also called as Table Driven protocols. All the nodes present in the network creates& maintains routing information to every other node in the network which is kept in the routing tables and is updated periodically asthe network topology changes. These protocolsmaintain various tables and are notsuitablefor a larger network because the memory required maintaining node entries for each and every node in the routing table of every node will raise an issue regarding cost, overhead and consumption of more bandwidth. 1.3.2 Reactive Routing Protocol These protocols are also known as source-initiated on-demand routing protocols, these are demand driven reactive protocols. Therefore they do not follow the procedure creating & updating routing tableswith routing information at regular intervals. As they are on demand routing protocols, so they start route discovery only when they are asked. In order to send a packet to another node in the network using this protocol, then this protocol initiatesa route discovery process forfindingthe suitable route to the destination and establishing the connection in order to transmit and receive the packet. In this process the RREQ packet is broadcasted throughout the network which adds a significant amount of controltraffictothenetworkdue to query flooding.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2395 1.3.3 Hybrid Routing Protocol These types of protocolsmake use of the strengthsof both the previously discussed protocolsby combining them together to obtain better results. In the initial stage routing is done with some proactively prospected routesand then servesthe demand from additionally activated nodesthrough reactive flooding. The basic idea isthat each node has a pre-defined zonecentredat itself in terms of number of hopsand for the nodeswhich lie within the zone, the protocolusedtomaintain routinginformation in the network is proactive. The nodeswhich lie outside itszone, it doesnot maintain routinginformationinapermanentbase. Instead, reactive routing strategy is adopted when inter- zone connections are required. 1.4 Attacks in MANET There are a variety of attackspossible in MANET. The attackscan be classified as active or passive attacks, internal or external attacks, or different attacks classified on the basisof different protocols. A passive attackdoesnotdisruptthenormaloperation of the network. The attacker only snoops the data exchanged in the network without altering it. It includes Eavesdropping, jamming and traffic analysis and monitoring. In case of active attacks, the attacker attempts to alter or destroy the data being exchanged in the network. This attack disrupts the normal functioning of the network. Active attacks can be internal or external. External attacks are carried out by nodes that do not belong to the network. Internal attacks are from compromised nodesthat are part of the network. Since the attacker is already part of the network, internal attacksare more severeandhard to detect than external attacks.The ultimate goalsof the security solutions for MANETsis to provide security services, suchas authentication, confidentiality, integrity, authentication, non-repudiation, andavailabilitytomobileusers.Thevariouspossible attacks are Fig 2. Classification of attacks in MANET 1.5 Jelly Fish Attack JellyFish attack is concerned with transport layer of MANET stack. The JF attacker disrupts the TCP connection which is established for communication. JellyFish (JF) attacker wishesto intrude into forwarding group and then it delaysdatapackets unnecessarily for some amount of time before forwarding them. Due to JF attack, high end to end delay takes place in the network. So the performance of network (i.e.throughput etc) decreases substantially. Application i.e. file transfer requires reliable and congestion controlled delivery. It is provided by Transmission Control Protocol (TCP). JF attacker disrupts the whole functionality of TCP, so performance of real time applications become worse. JF attack is further divided into three categories- JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. Jelly fish attacks are targeted against closed-loop flows. The goal of jellyfish node is to diminish the good put, which can be achieved by dropping some of packets. When a maliciousnodeslaunchesforwarding rejection attacks it alsomaycomplywith all routing procedures. The Jellyfish attack is one of those kinds. A maliciousnode launching Jellyfishattacksmaykeepactivein both route discovering and packet forwarding in order to prevent it from detection and diagnosis, but the malicious node can attack the traffic via itself by reordering packets, dropping packets periodically, or increasing jitters. The Jellyfish attack is especially harmful to TCP traffic in that cooperative nodescan hardly differentiate these attacksfrom the networkcongestion. Reference also described that malicious nodes may even abuse directional antenna and dynamic power techniques to avoid upstream nodes to detect their misbehaviors of dropping packets. This attack mainly targets closed-loop flows as such flows respond to network conditions likepacket lossand packet delay. It targetsTCP’scongestion controlmechanism.Themaingoal of the Jellyfish nodes is to reduce the good put of all the flowsto near-zero by either reordering the packetsordroppingasmall fraction of packets.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2396 2. LITERATURE SURVEY 3. CONCLUSIONS In this work, it has been concluded that due to decentralized nature of the mobile adhoc network, malicious nodes enter the network which trigger various type of active and passive attacks. The secure and efficient routing techniques has been reviewed in this paper. In future technique will be proposed which detected and isolate malicious nodes from the network. REFERENCES [1] S.S. Tyagi, R.K. Chauhan, “Performance analysis of ProActive and ReActive routing protocols for ad hoc networks”, International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30 [2] K. Pandey, A. Swaroop, “A Comprehensive Performance Analysis Of Proactive,Reactive and Hybrid MANETs Routing Protocols”, International Journal of computerScience Issues, Vol. 8, Issue 6, No 3, November 2011, pp. 432-441. [3] Internet Engineering Task Force, MANET working group charter.Available from IETF MANETgroup Character Sector,Jan. 2010. [4] K. Majumder and S.K. Sarkar, “Performance analysis of AODV and DSR Routing ProtocolsinHybridNetworkScenario”,Proc. IEEE transactions on networking, Dec. 2009, pp. 1-4. Author Year Description Outcome S.S. Tyagi, R.K.Chauhan 2010 Performance analysis of ProActive and ReActive routing protocols for ad hoc networks AODV and DSR are proved to be better than DSDV. K. Pandey, A. Swaroop 2011 A Comprehensive Performance Analysis Of Proactive, Reactive and Hybrid MANETs Routing Protocols In terms of throughput, AODV performance is better than other protocols. Furthermore, DSDV performancespoorlyfromtimeto time.ZRP throughput does not change even with a change in mobility or pause time because of its hybrid nature Mohammad Wazid, Vipin Kumar and RH Goudar 2012 Comparative Performance Analysis of Routing Protocols in Mobile Ad Hoc Networksunder JellyFishAttack Under JF attack DSR protocol shows maximum time efficiency and TORA protocol showshighest throughput. ManjotKaur , Malti Rani, AnandNayyar 2014 A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks JellyFish Attack exploits the end to end congestion control mechanism of Transmission Control Protocol (TCP). S. Mohseni, R. Hassan, A. Patel, and R. Razali 2010 Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs While it is not clear that any particular algorithm. Each protocol has definite advantages as well as disadvantages and is well suited for certain situations.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2397 [5] Mohammad Wazid, Vipin Kumar and RH Goudar, “Comparative PerformanceAnalysisofRoutingProtocolsinMobileAdHoc Networks under JellyFish Attack”, 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012 [6] ManjotKaur , Malti Rani, AnandNayyar, “A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks”, , International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 199-203 [7] S.A. Ade1& P.A. Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in MANET”, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, , Dec. 2010, pp. 545-548 [8] S. Mohseni, R. Hassan, A. Patel, and R. Razali, “Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs”, 4th IEEE International Conference on Digital Ecosystems and Technologies 2010 IEEE, Apr. 2010, pp.- 304-309. [9] S.S. Tyagi, R.K. Chauhan, “Performance analysis of ProActive and ReActive routing protocols for ad hoc networks”, International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30 [10] T.P. Singh, Dr. R.K. Singh, J. Vats, “Effect of quality parameterson energy efficient Routing protocolsinMANETs”,Vol.3No- 7, July 2011,pp. 2620-2626. [11] W. Kiess, M. Mauve, "A survey on real-world implementations of mobile ad-hoc networks”, Vol. 5, Issue 3, Apr. 2007, pp 324-339. [12] X. Hong, K. Xu, M. Gerla, “ Scalable routing protocolsfor mobile ad hic networks”,Network IEEE, Vol. 16, Issue4,july2002, pp. 11-21.