International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013


Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)

J Rajeshwar | G Narsimha


Abstract: A mobile ad hoc network (MANET) is an infrastructure less and autonomous network where a set of nodes are connected by wireless links where each node works as both a router and an end system. Due to vulnerable features of MANET it is prone to several attacks from insider as well as outsider, so security is a major requirement for this it is using several cipher suites in order to have a strong security features. In my research cryptographic computations are playing vital role for that reason in this paper we want to discuss the various available cipher suites and the various cryptographic functions. And mainly discuss the various secure routing protocols that how they are using cipher suites. Routing is one of the basic networking functions in mobile ad hoc networks for that reason especially we are concentrating on routing security of a MANET and role of cipher suites in providing security to the routing of a MANET.


Keywords: MANET, Cipher Suite, Cryptographic Computations, Hash functions


Edition: Volume 2 Issue 3, March 2013,


Pages: 316 - 318


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

J Rajeshwar, G Narsimha, "Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 316-318, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013619

Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top