International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 176

Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 3 Issue 4, April 2014


Security in Routing Protocol for Ad Hoc Networks

Abu Taha Zamani | Syed Zubair [2]


Abstract: In this paper, we discuss security issues and their current solutions in the ad hoc Networks. Ad hoc networks are a key factor in the evolution of wireless communications. An ad hoc wireless network is a collection of wireless nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Security in ad hoc network is a grand challenge problem now a day. To enhance the security levels in the routing protocol to prevent the network against active and passive attacks without the presence of central authority. A peer review process has been introduced to check the integrity and non-repudiation of the routing packets and key exchange packets. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and nonrepudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. Various approaches and protocols have been proposed to address ad hoc networking problems, and multiple standardization efforts are under way within the Internet Engineering Task Force, as well as academic and industrial research projects. In this paper we attempt to analyze threats faced by the ad hoc network environment and provide a classification of the various security mechanisms.


Keywords: wireless networks, routing, routing protocol, ad hoc network, security


Edition: Volume 3 Issue 4, April 2014,


Pages: 375 - 380


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top