Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review

AUTHORS

N.Thirupathi Rao,Department of Computer Science & Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam, AP, India
Debnath Bhattacharyya,Department of Computer Science & Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam, AP, India

ABSTRACT

In this article, an overview of secure specially appointed steering conventions for remote systems was presented. Impromptu system is a gathering of hubs that is associated through a remote medium framing quickly evolving topologies. Assaults on specially appointed system steering conventions disturb organize execution and unwavering quality with their arrangement. We quickly exhibit the most well-known conventions that take after the table-driven and the source-started on-request approaches. The association flanked by the proposed arrangements and parameters of specially appointed system demonstrates the execution as indicated by secure conventions. We talk about in this paper directing convention and challenges and furthermore examine verification in specially appointed system.

 

KEYWORDS

Routing protocols, Network security, security issues, Ad hoc network, safety repair, Wireless network, Routing authentication

REFERENCES

[1]     Karan Singh et.al., “A review paper on network security,” International journal of computer science and security, vol.1, no.1, pp.52-69, (2017)
[2]     Adrian Perrig Ran Canetti J. D. Tygar Dawn Song “The TESLA Broadcast AuthenticationProtocol,” UC Berkeley and IBM Research 2012, pp.15-21, (2012)
[3]     Shradha Yadav, “Review paper on different routing protocol in wireless sensor network,” International Journal of Computer Science and Mobile Computing, vol.8, no.3, pp.63-66, (2019)
[4]     P. Arivubrakan and S. Sundari, “A protocol based routing technique for enhancing the quality of service in multi hop wireless networks,” International Journal of Innovative Technology and Exploring Engineering, vol.8, no.8, pp.1182-1186, (2019)
[5]     N. Muthyala, Raghava rao. K, and vijayalakshmi kakulapati, “A study and comparison of wireless routing protocols performance parameters,” International journal of computer applications in Technology, vol.3, no.2, pp.12-18, (2017)
[6]     Bing Wua, JieWua, Eduardo B. Fernandeza, Mohammad Ilyasa, and Spyros Magliveras, “Secure and efficient key management in mobile Ad hoc networks,” Journal of Network and Computer Applications 30 pp.937-954, (2007)
[7]     Bissias G.D., Liberatore M., Jensen D., and Levine B.N., “Privacy vulnerabilities in encrypted HTTP streams,” In Proc, Privacy Enhancing Technologies Workshop, (2005)
[8]     C. E. Perkins, E. M. Royer, and S. R. Das, “Ad Hoc On-Demand Distance Vector (AODV)Routing,” IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, vol.17, (2003)
[9]     F. Hu and N. K. Sharma, “Security considerations in Ad Hoc Networks,” to be appeared in Ad Hon Network, (2004)
[10]  F. Anjum, Anup K. Ghosh, nada golmie, paulkolodzy, radha poovendran, Rajeev shorey, d. Lee, and j-sac, “Security in wireless Ad hoc networks,” IEEE journal on selected areas in communications, vol.24, no.2, (2006)

CITATION

  • APA:
    Rao,N.T.& Bhattacharyya,D.(2020). Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review. International Journal of Reliable Information and Assurance, 8(1), 27-36. 10.21742/IJRIA.2020.8.1.04
  • Harvard:
    Rao,N.T., Bhattacharyya,D.(2020). "Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review". International Journal of Reliable Information and Assurance, 8(1), pp.27-36. doi:10.21742/IJRIA.2020.8.1.04
  • IEEE:
    [1] N.T.Rao, D.Bhattacharyya, "Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review". International Journal of Reliable Information and Assurance, vol.8, no.1, pp.27-36, Jun. 2020
  • MLA:
    Rao N.Thirupathi and Bhattacharyya Debnath. "Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review". International Journal of Reliable Information and Assurance, vol.8, no.1, Jun. 2020, pp.27-36, doi:10.21742/IJRIA.2020.8.1.04

ISSUE INFO

  • Volume 8, No. 1, 2020
  • ISSN(p):2288-8950
  • ISSN(e):2207-5143
  • Published:Jun. 2020

DOWNLOAD