Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I

Research Article

Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey

Download
229 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27299-8_14,
        author={Supriya and Manju Khari},
        title={Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey},
        proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I},
        proceedings_a={CCSIT PART I},
        year={2012},
        month={11},
        keywords={Security breaches Secured routing protocols blackhole attacks constraints},
        doi={10.1007/978-3-642-27299-8_14}
    }
    
  • Supriya
    Manju Khari
    Year: 2012
    Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey
    CCSIT PART I
    Springer
    DOI: 10.1007/978-3-642-27299-8_14
Supriya1,*, Manju Khari2,*
  • 1: Ambedkar Institute of Technology, GGSIPU
  • 2: Ambedkar Institute ofTechnology. GGSIPU
*Contact email: supriya.14489@gmail.com, manjukhari@yahoo.co.in

Abstract

Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Adhoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. However,the feature of decentralization and dynamic configuration of nodes makes MANETs vulnerable to various security attacks,that are otherwise not so common in a wired network. For mitigation of these attacks,several secured routing protocols are being proposed till now. This paper provides the view of overall security breaches present in the Ad-hoc Networks till now and will discuss in brief about the several proposed secure routing protocols.