Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Performance Evaluation of Secured Reactive Routing Protocols in MANETs
Shwetha T R, Dr Arun Biradar
A Mobile ad-hoc network (MANET) is mobile; multi-hop; infrastructure less wireless network which is capable of autonomous operation. Security is one of the biggest issue in MANETs as they are infrastructure-less and autonomous. Therefore; in MANET networks with security needs; there must be two considerations kept in mind: one to make the routing protocol secure and second one to protect the data transmission. Our endeavour in this paper would focus on achieving the routing and secure information exchange with the help of public key cryptography. This will facilitate the user nodes to perform routing; mutual authentications; generation and secure exchange of public and private keys. As a result of which ensuring confidentiality; integrity and authentication of data exchange in a more suitable and secured way.
Keywords: Mobile ad-hoc network MANET, On demand Distance Vector AODV Protocol, On demand Multipath Distance Vector AOMDV, Routing, Security
Edition: Volume 3 Issue 6, June 2014
Pages: 273 - 276
How to Cite this Article?
Shwetha T R, Dr Arun Biradar, "Performance Evaluation of Secured Reactive Routing Protocols in MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132266, Volume 3 Issue 6, June 2014, 273 - 276
210 PDF Views | 131 PDF Downloads
Similar Articles with Keyword 'Mobile ad-hoc network MANET'
Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 881 - 885A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs
Hansraj Bhakte, Rahul Kulkarni
Views: 152 , Downloads: 126 | CTR: 83 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 177 - 183Diminution of MANET Attacks by HOOSC Scheme
Amanpreet Kaur, Manjot Kaur Sidhu
Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 273 - 276Performance Evaluation of Secured Reactive Routing Protocols in MANETs
Shwetha T R, Dr Arun Biradar
Views: 157 , Downloads: 133 | CTR: 85 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 146 - 148A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network
Deepti Ranaut, Madal Lal
Similar Articles with Keyword 'On demand Distance Vector AODV Protocol'
Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1154 - 1158Route Optimization using Membrane Computing in Opportunistic Network
Ritu, Manjot Kaur Sidhu
Views: 152 , Downloads: 126 | CTR: 83 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 177 - 183Diminution of MANET Attacks by HOOSC Scheme
Amanpreet Kaur, Manjot Kaur Sidhu
Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 273 - 276Performance Evaluation of Secured Reactive Routing Protocols in MANETs
Shwetha T R, Dr Arun Biradar
Similar Articles with Keyword 'Routing'
Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Views: 75 , Downloads: 59 | CTR: 79 % | Weekly Popularity: ⮙7
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 262 - 265Data Gathering Optimization Using ACO and Genetic Algorithm in WSN
Shabir Ur Rashid, Mrigana Walia
Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 129 , Downloads: 96 | CTR: 74 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2176 - 2178Detection & Removal of Co-operative Blackhole Attack in MANETs
Mayuri Ghorpade, Prof. S. P. Medhane
Similar Articles with Keyword 'Security'
Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
Views: 38 , Downloads: 31 | CTR: 82 % | Weekly Popularity: ⮙13
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Views: 167 , Downloads: 40 | CTR: 24 %
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey