International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016


Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh [9] | Mahima Sharma [2]


Abstract: Networks popularity and demand has motivated the development of mobile adhoc networks (MANETs). MANETs are a kind of wireless adhoc network which is infrastructure less. Each device or nodes are free to move independently in any random direction due to this links between the devices is not constant. This dynamic nature of network topology makes security issues more complex. In this paper, we discuss the solutions for security threats in AODV protocol. Security threats like wormhole attack, black hole attack, eaves dropping etc can defended by using cryptographic techniques like RSA, DES, AES. Main issues with security mechanisms that are available is their effect on performance of algorithm like more processing power, packet drop, throughput etc. Finally, concluding over the solutions for security through these algorithms so that performance and security can be enhanced in future.


Keywords: MANET, adhoc, AODV, AES, DES, RSA


Edition: Volume 5 Issue 4, April 2016,


Pages: 1002 - 1007


How to Cite this Article?

Ankita Singh, Mahima Sharma, "Cryptography Techniques based on Security of AODV in MANETs - A Survey", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 1002-1007, https://www.ijsr.net/get_abstract.php?paper_id=NOV162694

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [24]

Share this Article


Top