International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016


Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh [9] | Mahima Sharma [2]


Abstract: Networks popularity and demand has motivated the development of mobile adhoc networks (MANETs). MANETs are a kind of wireless adhoc network which is infrastructure less. Each device or nodes are free to move independently in any random direction due to this links between the devices is not constant. This dynamic nature of network topology makes security issues more complex. In this paper, we discuss the solutions for security threats in AODV protocol. Security threats like wormhole attack, black hole attack, eaves dropping etc can defended by using cryptographic techniques like RSA, DES, AES. Main issues with security mechanisms that are available is their effect on performance of algorithm like more processing power, packet drop, throughput etc. Finally, concluding over the solutions for security through these algorithms so that performance and security can be enhanced in future.


Keywords: MANET, adhoc, AODV, AES, DES, RSA


Edition: Volume 5 Issue 4, April 2016,


Pages: 1002 - 1007


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ankita Singh, Mahima Sharma, "Cryptography Techniques based on Security of AODV in MANETs - A Survey", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 1002-1007, https://www.ijsr.net/get_abstract.php?paper_id=NOV162694

Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top