Performance Evaluation of Secured Reactive Routing Protocols in MANETs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

A Mobile ad-hoc network (MANET) is mobile; multi-hop; infrastructure less wireless network which is capable of autonomous operation. Security is one of the biggest issue in MANETs as they are infrastructure-less and autonomous. Therefore; in MANET networks with security needs; there must be two considerations kept in mind: one to make the routing protocol secure and second one to protect the data transmission. Our endeavour in this paper would focus on achieving the routing and secure information exchange with the help of public key cryptography. This will facilitate the user nodes to perform routing; mutual authentications; generation and secure exchange of public and private keys. As a result of which ensuring confidentiality; integrity and authentication of data exchange in a more suitable and secured way.

Keywords: Mobile ad-hoc network MANET, On demand Distance Vector AODV Protocol, On demand Multipath Distance Vector AOMDV, Routing, Security

Edition: Volume 3 Issue 6, June 2014

Pages: 273 - 276

Share this Article

How to Cite this Article?

Shwetha T R, Dr Arun Biradar, "Performance Evaluation of Secured Reactive Routing Protocols in MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132266, Volume 3 Issue 6, June 2014, 273 - 276

210 PDF Views | 131 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile ad-hoc network MANET'

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Views: 152 , Downloads: 126 | CTR: 83 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Views: 157 , Downloads: 133 | CTR: 85 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Similar Articles with Keyword 'On demand Distance Vector AODV Protocol'

Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1154 - 1158

Route Optimization using Membrane Computing in Opportunistic Network

Ritu, Manjot Kaur Sidhu

Share this Article

Views: 152 , Downloads: 126 | CTR: 83 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Views: 210 , Downloads: 131 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Similar Articles with Keyword 'Routing'

Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Views: 75 , Downloads: 59 | CTR: 79 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 129 , Downloads: 96 | CTR: 74 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this Article

Similar Articles with Keyword 'Security'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 38 , Downloads: 31 | CTR: 82 % | Weekly Popularity: ⮙13

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 167 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top