Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016
Cryptography Techniques based on Security of AODV in MANETs - A Survey
Ankita Singh, Mahima Sharma
Networks popularity and demand has motivated the development of mobile adhoc networks (MANETs).MANETs are a kind of wireless adhoc network which is infrastructure less. Each device or nodes are free to move independently in any random direction due to this links between the devices is not constant.This dynamic nature of network topology makes security issues more complex. In this paper, we discuss the solutions for security threats in AODV protocol. Security threats like wormhole attack, black hole attack, eaves dropping etc can defended by using cryptographic techniques like RSA, DES, AES. Main issues with security mechanisms that are available is their effect on performance of algorithm like more processing power, packet drop, throughput etc. Finally, concluding over the solutions for security through these algorithms so that performance and security can be enhanced in future.
Keywords: MANET, adhoc, AODV, AES, DES, RSA
Edition: Volume 5 Issue 4, April 2016
Pages: 1002 - 1007
How to Cite this Article?
Ankita Singh, Mahima Sharma, "Cryptography Techniques based on Security of AODV in MANETs - A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162694, Volume 5 Issue 4, April 2016, 1002 - 1007
129 PDF Views | 104 PDF Downloads
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'adhoc'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1353 - 1357Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
Manpreet Kaur, Pooja Saini
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1594 - 1600Hybrid Solution for Hidden Terminal Problem on VANETS
Sukhjinder Singh, Amandeep Kaur Virk
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1742 - 1748A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Similar Articles with Keyword 'AES'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2084 - 2088A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections
Rupali Tanaji Waghmode, Nikita J. Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1598 - 1601A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
Supriya S. Sankpal, Rupali A. Mahajan
Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1056 - 1059Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair, Navin K. S.
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1398 - 1401A Review on Encryption Techniques to Secure a Cloud
Ramandeep Kaur, Ashish Verma
Similar Articles with Keyword 'DES'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1663 - 1668PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat, Preeti Sondhi
Similar Articles with Keyword 'RSA'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1303 - 1305Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes
N. Laxmi Manasa
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2250 - 2253Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach
Kalyani Thodage