Research Article
Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey
259 downloads
@INPROCEEDINGS{10.1007/978-3-642-27299-8_14, author={Supriya and Manju Khari}, title={Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey}, proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I}, proceedings_a={CCSIT PART I}, year={2012}, month={11}, keywords={Security breaches Secured routing protocols blackhole attacks constraints}, doi={10.1007/978-3-642-27299-8_14} }
- Supriya
Manju Khari
Year: 2012
Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey
CCSIT PART I
Springer
DOI: 10.1007/978-3-642-27299-8_14
Abstract
Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Adhoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. However,the feature of decentralization and dynamic configuration of nodes makes MANETs vulnerable to various security attacks,that are otherwise not so common in a wired network. For mitigation of these attacks,several secured routing protocols are being proposed till now. This paper provides the view of overall security breaches present in the Ad-hoc Networks till now and will discuss in brief about the several proposed secure routing protocols.
Copyright © 2012–2024 ICST