SlideShare a Scribd company logo
1 of 3
Download to read offline
© 2021, AJCSE. All Rights Reserved 45
RESEARCH ARTICLE
A Survey on Secure Routing Protocol for Data Transmission in ad hoc
Networks
B. R. Sahana
Department of CSE, VVIET, Mysuru, Karnataka, India
Received on: 05-03-2021; Revised on: 15-05-2021; Accepted on: 10-06-2021
ABSTRACT
A routing protocol specifies how routers communicate with each other, disseminating information that
enables them to select routes between any two nodes on a computer network. A routing protocol shares
this information first among immediate neighbors, and then throughout the network. This way, routers
gain knowledge of the topology of the network. Mobile ad hoc network (MANET) is an autonomous
system of mobile nodes connected by wireless links. Each node operates not only as an end system, but
also as a router to forward packets. The nodes are free to move about and organize themselves into a
network. These nodes change position frequently.An ad hoc network can change locations and configure
itself on the fly. Attacking the routing process can result in a crash of router or a severe degradation
of service. Securing these routers in ad hoc Networks is a big issue. This paper surveys some of the
techniques that how to secure the MANET followed by the methods to enhance the security level. This
paper also discusses about the different protocols used to secure the ad hoc networks.
Key words: Computer network, Routing protocol, Ad-hoc network, MANET, Data transmission, End-
to-end security
INTORDUCTION
Most routing protocols for ad hoc network were
originally designed without having security in
mind. It is specified that all nodes in network
without securing the routing protocol are not
sufficient. This networks with security needs,
there must be two security systems; one to protect
the data transmission; and one to make the
routing protocol secure.[1]
Securing ad hoc routing
presents challenges because each user brings to
the network with their own mobile unit, without
the centralized policy or control of a traditional
network. We need to solve these security related
issues using some of the suitable techniques
available and secure the ad hoc routing protocol.
Ad-hoc on-demand distance vector (AODV) is a
technique which is used to solve these security
issues. The rest of the paper discusses some of the
securing techniques to secure the ad hoc networks
for data transmission.
Address for correspondence:
B. R. Sahana,
E-mail: sahana3lok@gmail.com
Survey
I. A secure routing protocol for ad hoc networks
A routing protocol specifies how routers
communicate with each other, disseminating
information that enables them to select routes
between any two nodes on a computer network.
Routing security has received varying levels of
attention over the past several years. Attacking the
routing process can result in a crash of router or a
severe degradation of service.The routing protocol
attack could launched to stop the routing process
fromfunctioningproperly.[2]
Theauthorofthispaper
examines security threats against ad hoc routing
protocols by examining AODV Routing Protocol
and dynamic source routing protocol. From these
threats, they identify three different environments
with distinct security requirements. They have
proposed a solution for one that is managed-open
scenario where no network infrastructure is pre
deployed, but a small amount of prior security
coordination is expected. Authenticated routing
for ad hoc networks (ARAN), which detects and
protects against malicious actions by the third
parties in one particular ad hoc environment. This
introduces authentication, message integrity and
Available Online at www.ajcse.info
Asian Journal of Computer Science Engineering 2021;6(2):45-47
ISSN 2581 – 3781
Sahana: Routing protocol for data transmission
AJCSE/Apr-Jun-2021/Vol 6/Issue 2 46
non-repudiation to an ad hoc environment. This
has minimal performance cost for the increased
security in terms of processing and networking
overhead. Existing ad hoc routing protocols
are subject to a variety of attacks that can allow
attackers to influence a victim’s selection of
routers or enable denial of service attacks. The
protocol ARAN successfully defeats all identified
attacks and provides a solution for security routing
in managed-open environment. In this paper,
the author demonstrate exploits that are possible
against ad hoc routing protocols, they define
various security environments and offers a secure
solution with an authenticated routing protocol.
II. End-to-end security implementation using
transport layer security (TLS) protocol
End-to-End security has been emerging need for
mobiledeviceswiththewidespreaduseofpersonal
digital assistants (PDA) and mobile phones. With
more and more network connected application,
security has become one of the most popular
concepts in mobile community. Mobile networks
are open to many kind of attacks. The open data
communication in these networks may cause
against the security, integrity, and authenticity
of data. TLS protocol is an end-to-end security
protocol, commonly used on the internet together
with SSL protocol.[3]
Main design goals of mobile
end-to-end security protocol are maintainability
and extensibility. Cryptographic operations are
performed with a free library, bouncy castle
cryptography package. This paper presents a
solution to end-to-end security needs of mobile
devices, such as PDAs and mobile phones. The
author of this paper concluded that communication
between mobile and fixed network create
particular problems can be minimized through
the implementation of end-to-end security in this
proxy based environment. End-to-end security
solution presented in this paper is implemented for
mobile devices using JAVA platform to show that
it is possible and efficient to use TLS in mobile
network. The work guarantees the security of any
transmission at most much as TLS.
III. Optimized Link State Routing Protocol for ad
hoc Networks
Link state routing protocols are one of the two
main classes of routing protocols used in packet
switching networks for computer communication
and distance-vector routing protocol.[4]
With an
advent of new technologies and demand for the
flexibility and ease in working environment, the
use of mobile wireless computing is growing
fast. As the network size increases, it becomes
common for the nodes to be dispersed in a layer
area for the radio range of individual nodes. In this
condition, a routing technique has to be employed
such that the out of range nodes may communicate
with each other through intermediate nodes. The
problems of routing in mobile ad hoc network
(MANET) are been discussed in this paper. The
author proposes and discusses an optimized link
state routing protocol, named OLSR, for mobile
wireless networks. The protocol is based on the
link state algorithm and it is proactive in nature.
It employs periodic exchange of messages to
maintain topology information of the network at
each node. It is an optimization over pure link state
protocol as it compacts the size of the information
sent in the messages and reduces number of
retransmission to flood these messages. It provides
optimal routes in terms of number of hops, which
are immediately available when needed. This
protocol is best suited for large and dense ad hoc
networks. It reduces the size of the control packets
instead of all links. It minimizes flooding of this
control traffic using only the selected nodes called
multipoint relays.
IV. Secure end-to-end data transmission in
multipath routing protocol
Ad hoc networks often defined as an infrastructure
less network. Without the usual routing
infrastructure such as fixed routers and routing
backbones. Typically, the ad hoc nodes are mobile
and the underlying communication medium is
wireless. Each ad hoc node may be capable of
acting as a router. Some aspect of ad hoc network
has security problems. Routing is one such aspect.
The author of this paper considers the security of
routing protocols for ad hoc networks. They use
AODV routing protocol and develop a security
mechanism to protect its routing information.
AODV is a reactive routing protocol for ad hoc
and mobile networks that maintains routes only
between nodes which need to communicate. The
routing messages do not contain information about
the whole route path, but only about the source and
destination. It uses destination sequence number to
Sahana: Routing protocol for data transmission
AJCSE/Apr-Jun-2021/Vol 6/Issue 2 47
specify how fresh a route is and which is used to
grant loop freedom. Two mechanisms are used to
secure the AODV messages, Digital signatures to
authenticate the non-mutable fields of messages and
hash chain to secure the hop count information. For
the secureAODV operations, the author suggests to
look at the secure AODV routing method.
V. Secure message transmission (SMT) in MANET
Secure communication is an important aspect
of any networking environment and it is a
significant challenge in ad hoc networks. MANET
paradigm seeks to enable communication across
networks whose topology and membership can
change frequently. Its distinctive feature is that
network nodes need to collaborate with their
peers in supporting the network functionality.
In environment, malicious or selfish nodes can
disrupt or even deny the communication of
potentially any node within the ad hoc network
domain.[5]
The challenges in addressing these
security vulnerabilities is due to the characteristics
of MANET. The author of this paper proposes the
SMT protocol to safeguard the data transmission
against arbitrary malicious behavior of network
nodes. SMT is a lightweight and effective protocol
that can operate solely in an end-to-end manner.
It exploits redundancy of multi-path routing and
adaptsitsoperationtoremainefficientandeffective
even in highly adverse environment. SMT is
better suited to support quality of service for real
time communication in the ad hoc environment.
SMT protocol to secure data forwarding operation
for MANET routing protocol takes advantage of
topological and transmission redundancies and
utilizes feedback, exchanged between the two
communication end-nodes. SMT remains effective
even under highly adverse condition. The author
confirms that SMT can naturally complement
protocols that secure the route discovery and can
shield the network operation from adversarial
behavior by delivering up to 83% more data packs
as compared with protocol that lack the secure
data transmission feature.
CONCLUSION
Ad hoc routers can be secured using various
techniques available; hence, we tend to use
different protocols which may provide better
security while transferring the data using routers.
The paper discusses about some of the securing
mechanism in different networks. The securing
protocols are not only limited to fight against
arbitrary malicious behavior of the nodes, they
are also efficient and effective protocols that can
operate solely in an end-to-end manner.[5]
These
securing mechanisms can be enhanced so that
they can adapt its operation to remain efficient and
effective even in highly adverse environment.
REFERENCES
1. Security in Mobile Ad Hoc Networks; 2015. Available
from: http://www.research.ac.upc.edu/compnet/saodv.
html. [Last accessed on 2015 Dec 10].
2. Security Techtarget. Routing Protocol Security; 2015.
Available from: https://www.google.co.in. [Last
accessed on 2015 Dec 10].
3. Transport Layer Security-Wikipedia-the Free
Encyclopedia; 2015. Available from: https://www.
en.wikipedia.org/wiki/Transport_layer_security. [Last
accessed on 2015 Dec 10].
4. Link State Routing Protocol-Wikipedia, the Free
Encyclopedia; 2015. Available from: http://www.
en.wikipedia.org/wiki/Link-State-Routing-Protocol.
[Last accessed on 2015 Dec 10].
5. Secure Message Transmission in Mobile ad HOC
Networks; 2015. Available from: http://www.
infoscience.epfl.ch/record/124938. [Last accessed on
2015 Dec 10].

More Related Content

Similar to A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks

Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 

Similar to A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks (20)

Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 

More from BRNSSPublicationHubI

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...BRNSSPublicationHubI
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachBRNSSPublicationHubI
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...BRNSSPublicationHubI
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...BRNSSPublicationHubI
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...BRNSSPublicationHubI
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamBRNSSPublicationHubI
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyBRNSSPublicationHubI
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...BRNSSPublicationHubI
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...BRNSSPublicationHubI
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyBRNSSPublicationHubI
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsBRNSSPublicationHubI
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...BRNSSPublicationHubI
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...BRNSSPublicationHubI
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineBRNSSPublicationHubI
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoBRNSSPublicationHubI
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...BRNSSPublicationHubI
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...BRNSSPublicationHubI
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionBRNSSPublicationHubI
 

More from BRNSSPublicationHubI (20)

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification Approach
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a Webcam
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: Survey
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical Systems
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial Video
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks

  • 1. © 2021, AJCSE. All Rights Reserved 45 RESEARCH ARTICLE A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks B. R. Sahana Department of CSE, VVIET, Mysuru, Karnataka, India Received on: 05-03-2021; Revised on: 15-05-2021; Accepted on: 10-06-2021 ABSTRACT A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently.An ad hoc network can change locations and configure itself on the fly. Attacking the routing process can result in a crash of router or a severe degradation of service. Securing these routers in ad hoc Networks is a big issue. This paper surveys some of the techniques that how to secure the MANET followed by the methods to enhance the security level. This paper also discusses about the different protocols used to secure the ad hoc networks. Key words: Computer network, Routing protocol, Ad-hoc network, MANET, Data transmission, End- to-end security INTORDUCTION Most routing protocols for ad hoc network were originally designed without having security in mind. It is specified that all nodes in network without securing the routing protocol are not sufficient. This networks with security needs, there must be two security systems; one to protect the data transmission; and one to make the routing protocol secure.[1] Securing ad hoc routing presents challenges because each user brings to the network with their own mobile unit, without the centralized policy or control of a traditional network. We need to solve these security related issues using some of the suitable techniques available and secure the ad hoc routing protocol. Ad-hoc on-demand distance vector (AODV) is a technique which is used to solve these security issues. The rest of the paper discusses some of the securing techniques to secure the ad hoc networks for data transmission. Address for correspondence: B. R. Sahana, E-mail: sahana3lok@gmail.com Survey I. A secure routing protocol for ad hoc networks A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. Routing security has received varying levels of attention over the past several years. Attacking the routing process can result in a crash of router or a severe degradation of service.The routing protocol attack could launched to stop the routing process fromfunctioningproperly.[2] Theauthorofthispaper examines security threats against ad hoc routing protocols by examining AODV Routing Protocol and dynamic source routing protocol. From these threats, they identify three different environments with distinct security requirements. They have proposed a solution for one that is managed-open scenario where no network infrastructure is pre deployed, but a small amount of prior security coordination is expected. Authenticated routing for ad hoc networks (ARAN), which detects and protects against malicious actions by the third parties in one particular ad hoc environment. This introduces authentication, message integrity and Available Online at www.ajcse.info Asian Journal of Computer Science Engineering 2021;6(2):45-47 ISSN 2581 – 3781
  • 2. Sahana: Routing protocol for data transmission AJCSE/Apr-Jun-2021/Vol 6/Issue 2 46 non-repudiation to an ad hoc environment. This has minimal performance cost for the increased security in terms of processing and networking overhead. Existing ad hoc routing protocols are subject to a variety of attacks that can allow attackers to influence a victim’s selection of routers or enable denial of service attacks. The protocol ARAN successfully defeats all identified attacks and provides a solution for security routing in managed-open environment. In this paper, the author demonstrate exploits that are possible against ad hoc routing protocols, they define various security environments and offers a secure solution with an authenticated routing protocol. II. End-to-end security implementation using transport layer security (TLS) protocol End-to-End security has been emerging need for mobiledeviceswiththewidespreaduseofpersonal digital assistants (PDA) and mobile phones. With more and more network connected application, security has become one of the most popular concepts in mobile community. Mobile networks are open to many kind of attacks. The open data communication in these networks may cause against the security, integrity, and authenticity of data. TLS protocol is an end-to-end security protocol, commonly used on the internet together with SSL protocol.[3] Main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, bouncy castle cryptography package. This paper presents a solution to end-to-end security needs of mobile devices, such as PDAs and mobile phones. The author of this paper concluded that communication between mobile and fixed network create particular problems can be minimized through the implementation of end-to-end security in this proxy based environment. End-to-end security solution presented in this paper is implemented for mobile devices using JAVA platform to show that it is possible and efficient to use TLS in mobile network. The work guarantees the security of any transmission at most much as TLS. III. Optimized Link State Routing Protocol for ad hoc Networks Link state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communication and distance-vector routing protocol.[4] With an advent of new technologies and demand for the flexibility and ease in working environment, the use of mobile wireless computing is growing fast. As the network size increases, it becomes common for the nodes to be dispersed in a layer area for the radio range of individual nodes. In this condition, a routing technique has to be employed such that the out of range nodes may communicate with each other through intermediate nodes. The problems of routing in mobile ad hoc network (MANET) are been discussed in this paper. The author proposes and discusses an optimized link state routing protocol, named OLSR, for mobile wireless networks. The protocol is based on the link state algorithm and it is proactive in nature. It employs periodic exchange of messages to maintain topology information of the network at each node. It is an optimization over pure link state protocol as it compacts the size of the information sent in the messages and reduces number of retransmission to flood these messages. It provides optimal routes in terms of number of hops, which are immediately available when needed. This protocol is best suited for large and dense ad hoc networks. It reduces the size of the control packets instead of all links. It minimizes flooding of this control traffic using only the selected nodes called multipoint relays. IV. Secure end-to-end data transmission in multipath routing protocol Ad hoc networks often defined as an infrastructure less network. Without the usual routing infrastructure such as fixed routers and routing backbones. Typically, the ad hoc nodes are mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting as a router. Some aspect of ad hoc network has security problems. Routing is one such aspect. The author of this paper considers the security of routing protocols for ad hoc networks. They use AODV routing protocol and develop a security mechanism to protect its routing information. AODV is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes which need to communicate. The routing messages do not contain information about the whole route path, but only about the source and destination. It uses destination sequence number to
  • 3. Sahana: Routing protocol for data transmission AJCSE/Apr-Jun-2021/Vol 6/Issue 2 47 specify how fresh a route is and which is used to grant loop freedom. Two mechanisms are used to secure the AODV messages, Digital signatures to authenticate the non-mutable fields of messages and hash chain to secure the hop count information. For the secureAODV operations, the author suggests to look at the secure AODV routing method. V. Secure message transmission (SMT) in MANET Secure communication is an important aspect of any networking environment and it is a significant challenge in ad hoc networks. MANET paradigm seeks to enable communication across networks whose topology and membership can change frequently. Its distinctive feature is that network nodes need to collaborate with their peers in supporting the network functionality. In environment, malicious or selfish nodes can disrupt or even deny the communication of potentially any node within the ad hoc network domain.[5] The challenges in addressing these security vulnerabilities is due to the characteristics of MANET. The author of this paper proposes the SMT protocol to safeguard the data transmission against arbitrary malicious behavior of network nodes. SMT is a lightweight and effective protocol that can operate solely in an end-to-end manner. It exploits redundancy of multi-path routing and adaptsitsoperationtoremainefficientandeffective even in highly adverse environment. SMT is better suited to support quality of service for real time communication in the ad hoc environment. SMT protocol to secure data forwarding operation for MANET routing protocol takes advantage of topological and transmission redundancies and utilizes feedback, exchanged between the two communication end-nodes. SMT remains effective even under highly adverse condition. The author confirms that SMT can naturally complement protocols that secure the route discovery and can shield the network operation from adversarial behavior by delivering up to 83% more data packs as compared with protocol that lack the secure data transmission feature. CONCLUSION Ad hoc routers can be secured using various techniques available; hence, we tend to use different protocols which may provide better security while transferring the data using routers. The paper discusses about some of the securing mechanism in different networks. The securing protocols are not only limited to fight against arbitrary malicious behavior of the nodes, they are also efficient and effective protocols that can operate solely in an end-to-end manner.[5] These securing mechanisms can be enhanced so that they can adapt its operation to remain efficient and effective even in highly adverse environment. REFERENCES 1. Security in Mobile Ad Hoc Networks; 2015. Available from: http://www.research.ac.upc.edu/compnet/saodv. html. [Last accessed on 2015 Dec 10]. 2. Security Techtarget. Routing Protocol Security; 2015. Available from: https://www.google.co.in. [Last accessed on 2015 Dec 10]. 3. Transport Layer Security-Wikipedia-the Free Encyclopedia; 2015. Available from: https://www. en.wikipedia.org/wiki/Transport_layer_security. [Last accessed on 2015 Dec 10]. 4. Link State Routing Protocol-Wikipedia, the Free Encyclopedia; 2015. Available from: http://www. en.wikipedia.org/wiki/Link-State-Routing-Protocol. [Last accessed on 2015 Dec 10]. 5. Secure Message Transmission in Mobile ad HOC Networks; 2015. Available from: http://www. infoscience.epfl.ch/record/124938. [Last accessed on 2015 Dec 10].