A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 135 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Now-a-days in wireless devices; Mobile Ad-hoc Network become an important part for communication for mobile devices. Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Due to the absence of the central infrastructure; we face many challenges or problems during sending data from one mobile node to another mobile node. In this paper; we discuss about features of MANET; their advantages and disadvantages and security issues and their solutions in the mobile ad-hoc network. Cryptography is the way of hiding information during transmission over a channel. There are lots of cryptographic algorithms available to protect our data from intruders.RSA also one of the effective public key cryptographic algorithm which needs time and memory.

Keywords: Mobile Ad-hoc Network MANET, Attacks, Cryptography, AES, DES, RSA, MD5, DSA

Edition: Volume 3 Issue 6, June 2014

Pages: 146 - 148

Share this Article

How to Cite this Article?

Deepti Ranaut, Madal Lal, "A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201442, Volume 3 Issue 6, June 2014, 146 - 148

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Mobile Ad-hoc Network MANET'

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 110 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Downloads: 126 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Downloads: 132 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Downloads: 135 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 41 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'AES'

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article

Similar Articles with Keyword 'DES'

Downloads: 126 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'RSA'

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 97 | Weekly Hits: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'MD5'

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

Downloads: 110 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Similar Articles with Keyword 'DSA'

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Downloads: 108 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Downloads: 110 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 221 - 224

A Review Paper on Preventing Forged Acknowledgement in Manets

Ajit N. Gedam, M. P. Wankhade

Share this Article

Downloads: 123 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2293 - 2297

Object Oriented Modeling of DSA for Authentication of Student in E-Learning

Ambalika Ghosh, Sunil Karforma

Share this Article



Top