• #0 (no title)
  • #0 (no title)
  • About
  • Facebook
  • Twitter
  • RSS
(As ISO 9001:2015 Certified Publications)
    • Quick Search
    • Advanced Search
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription

Back to Journal

Home»Articles»Routing Methods in MANET with Secured Key Management and Packet Drop Reductions: A Survey

Routing Methods in MANET with Secured Key Management and Packet Drop Reductions: A Survey

Author : Yaswanth Kumar Alapati and Suban Ravichandran
Volume 7 No.1 Special Issue:November 2018 pp 20-23

Abstract

MANET routing is complex task and selecting secured route ought to be made sooner before the node leaves the network. Quick choices dependably redress network execution. Most MANET routing conventions are intended to work in a cordial and agreeable condition which makes them powerless against different assaults. Further, nodes need to forward data packets to different nodes to empower information correspondence between the nodes that are not in the radio scope of each other. Be that as it may, a node may decline to forward data packets or halfway do the sending or even endeavor to intrude on the system tasks. This is for the most part thought to be a sort of bad conduct which demonstrates the presence of malicious node in a system. Trust and Reputation would fill in as a noteworthy answer for these issues. Secured data transmission is a complex task in MANET as there is a maximum chance for attackers to crash the network. Taking in the system qualities and picking right routing choices at right occasions would be a noteworthy arrangement. In this work, we have completed a broad overview of fault tolerant methods connected to routing in MANETs. Because of the proximity of attacker nodes, the procedure of administration disclosure is extraordinarily influenced, which may prompt poorer execution of the network. This may prompt less packet delivery proportion, throughput, expanded control overhead;add up to overhead and packet drops. Further, anchoring administration revelation task is exceptionally troublesome since, it includes the notoriety of the extensive number of middle of the road nodes present in the system[3]. This paper presents a survey on different techniques for routing,key management and reductions method on packer droppings.

Keywords

MANETS, Routing, Key Management, Key Distribution, Routing Techniques, Packet Drops

Full Text:

References

[1] Khalili, Katz, Jonathan and Arbaugh, A. William, “Towards secure key distribution in truly ad hoc networks”, IEEE Workshop on Security and Assurance in ad hoc Networks –2003.
[2] AnilKapil and SanjeevRana, “Identity-Based Key Management in MANETs using Public Key Cryptography”, International Journal of Security, Vol. 3, No.1. 2009.
[3] Wan AnXoing and Yao Huan Gong, “Secure and Highly Efficient Three Level Key Management Scheme for Manet”, Wseas Transactions on Computers, Vol. 10, No. 10, 2011.
[4] Bing, Jie Wu and Yuhong Dong, “An efficient group key management scheme for mobile ad hoc network”, International Journal and Networks, Vol. 2, No.3, 2008.
[5] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures, Advances in Cryptology–Crypto’04”, Lecture Notes in Computer Science, Vol. 3152, pp. 41–55, 2004,
[6] B.Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Bölöni, and D.Turgut, “Routing protocols in ad hoc networks: A survey,” “Elsevier Computer Networks”, pp. 3032–3080, 2011.
[7] VeenaAnand and Suresh Chandra Gupta, “Performance of AODV, DSR and DSDV Protocols under varying node movement”, 2012.
[8] PankajRohal, RuchikaDahiya and PrashantDahiya, “Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV)”, International Journal for Advance Research in Engineering and Technology, Vol. 1, No.2, 2013.
[9] Xin Ming Zhang, En Bo Wang, Jing Xia, and Dan Keun Sung. “A Neighbor Coverage based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad hoc Networks” International Journal of Engineering and Technology, Vol.4, No. 5, 2012.
[10] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses”, Proceeding of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
[11] K.Sanzgir, and B.Dahill, “A secure routing protocol for ad hoc networks”, Proceeding of the 10th IEEE International Conference on Network Protocols, pp.1-10, 2000.
[12] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure routing protocol Resilient to Byzantine failures”, Proceedings of ACM workshop on Wireless Security, pp. 21-30, 2003.
[13] ImrichChlamtac, Marco Conti and Jenifer J.-N. Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges”, Elsevier Network Magazine, Vol. 13, pp. 13-64, 2003.
[14] Y. Hu, A. Perrig and D. B Johnson, “Rushing attacks and defense in Wireless Ad Hoc Network Routing Protocol”, Proceedings of ACM workshop on wireless security, pp. 30-40, 2003.
[15] JaydipSen, M. Girish Chandra, S.G Harihara, Harish Reddy and P. BalaMuralidhar, “A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”, Proceedings of 6th International Conference on Information, Communications and Signal Processing, 2007.
[16] Kummakasikit, M. Thipchaksurat, S. Varakulsiripunth, “Performance Improvement of Associativity-Based Routing Protocol for Mobile Ad Hoc Networks”, Fifth International Conference on Information, Communications and Signal Processing, pp. 16 – 20, 2005.
[17] Detti, Blefari-Melazzi, N. Loreti, “Overlay, BoruvkaBased, “Ad-Hoc Multicast Protocol: Description and Performance Analysis”, International Conference on Communications, pp. 5545 – 5552, 2007.
[18] SreeRangaRaju, Mankanala, Mungara, Jitendranath, “ZRP versus DSR and TORA: a comprehensive survey on ZRP performance”, 10th IEEE Conference on Emerging Technologies and Factory Automation, pp. 1024, 2005.
[19] Latiff, L.A. Ali, A. Ooi Chia-Ching and Fisal, “Development of an indoor GPS-free self-positioning system for mobile ad hoc network (MANET)”, 13th IEEE International Conference on Networks,2005.
[20] K.G.S. Venkatesan, R. Resmi, and R.Remya, “Anonymizing Geographic Routing for Preserving Location Privacy Using Unlink ability and Unobservability” in IJACSSE, Vol. 4, No.3, 2014.
[21] Jen, Shang-Ming, Chi-Sung Laih, and Wen-Chung Kuo. “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET”, Sensors and Networks, 5022-5039, 2009.
[22] Salmin Sultana, Gabriel Ghinita, ElisaBertino, and Mohamed Shehab, “A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks” Journal Of Latex Class Files, Vol. 6, No. 1, 2015.
[23] Pushpendra Niranjan, Rashant Srivastava, Raj kumarSoni, and Ram Pratap, “Detection of Wormhole Attack using Hopcount and Time delay Analysis” International Journal of Scientific and Research Publications, Vol. 2, No. 4, 2012.
[24] W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, “Secure Network Provenance,” Proc. ACMSOSP, pp. 295-310, 2011.

Asian Journal of Computer Science and Technology is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and research papers covering all aspects of future computer and Information Technology areas. Topics include, but are not limited to:

Foundations of High-performance ComputingTheory of algorithms and computability

Parallel & distributed computing

Computer networks

Neural networks

LAN/WAN/MAN

Database theory & practice

Mobile Computing for e-Commerce

Future Internet architecture

Protocols and services

Mobile and ubiquitous networks

Green networking

Internet content search

Opportunistic networking

Network applications

Network scaling and limits

Artifial Intelligences

Pattern/Image Recognitions

Communication Network

Information Security

Knowledge Management

Management Information systems

Multimedia communicatiions

Operations research

Optical networks

Software Engineering

Virtual reality

Web Technologies

Wireless technology

MANET routing is complex task and selecting secured route ought to be made sooner before the node leaves the network. Quick choices dependably redress network execution. Most MANET routing conventions are intended to work in a cordial and agreeable condition which makes them powerless against different assaults. Further, nodes need to forward data packets to different nodes to empower information correspondence between the nodes that are not in the radio scope of each other. Be that as it may, a node may decline to forward data packets or halfway do the sending or even endeavor to intrude on the system tasks. This is for the most part thought to be a sort of bad conduct which demonstrates the presence of malicious node in a system. Trust and Reputation would fill in as a noteworthy answer for these issues. Secured data transmission is a complex task in MANET as there is a maximum chance for attackers to crash the network. Taking in the system qualities and picking right routing choices at right occasions would be a noteworthy arrangement. In this work, we have completed a broad overview of fault tolerant methods connected to routing in MANETs. Because of the proximity of attacker nodes, the procedure of administration disclosure is extraordinarily influenced, which may prompt poorer execution of the network. This may prompt less packet delivery proportion, throughput, expanded control overhead;add up to overhead and packet drops. Further, anchoring administration revelation task is exceptionally troublesome since, it includes the notoriety of the extensive number of middle of the road nodes present in the system[3]. This paper presents a survey on different techniques for routing,key management and reductions method on packer droppings.

Editor-in-Chief
Dr. K. Ganesh
Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
Expert at McKinsey and Company, India
[email protected]
Editorial Advisory Board
Dr. Eng. Hamid Ali Abed AL-Asadi
Department of Computer Science, Basra University, Iraq
[email protected]
Dr. Norjihan Binti Abdul Ghani
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Christos Bouras
Department of Computer Engineering & Informatics, University of Patras, Greece
[email protected]
Dr. Maizatul Akmar Binti Ismail
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Harold Castro
Department of Systems Engineering and Computing, University of the Andes, Colombia
[email protected]
Dr. Busyairah Binti Syd Ali
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. Sri Devi Ravana
Department of Information system, University of Malaya, Malaysia
[email protected]
Dr. Karpaga Selvi Subramanian
Department of Computer Engineering, Mekelle University, Ethiopia
[email protected]
Dr. Mazliza Binti Othman
Department of Computer System & Technology, University of Malaya, Malaysia
[email protected]
Dr. Chiam Yin Kia
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. OUH Eng Lieh
Department of Information Systems, Singapore Management University, Singapore
[email protected]

2016

2015

2014

  • Results
  • Asian Review of Mechanical Engineering (ARME)
  • career

2013

  • Home
  • Shop
  • My Account
  • Logout
  • Contact us
  • The Asian Review of Civil Engineering (TARCE)

2012

  • Asian Journal of Electrical Sciences(AJES)
  • Asian Journal of Computer Science and Technology (AJCST)
  • Asian Journal of Information Science and Technology (AJIST)
  • Asian Journal of Engineering and Applied Technology (AJEAT)
  • Asian Journal of Science and Applied Technology (AJSAT)
  • Asian Journal of Managerial Science (AJMS)
  • Asian Review of Social Sciences (ARSS)

2011

2010

    Table of Contents

    Editorial Note

    Editorial Dr. K. Ganesh

    Editor-in-Chief
    Dr. K. Ganesh
    Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
    Expert at McKinsey and Company, India
    [email protected]
    Editorial Advisory Board
    Dr. Eng. Hamid Ali Abed AL-Asadi
    Department of Computer Science, Basra University, Iraq
    [email protected]
    Dr. Norjihan Binti Abdul Ghani
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Christos Bouras
    Department of Computer Engineering & Informatics, University of Patras, Greece
    [email protected]
    Dr. Maizatul Akmar Binti Ismail
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Harold Castro
    Department of Systems Engineering and Computing, University of the Andes, Colombia
    [email protected]
    Dr. Busyairah Binti Syd Ali
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Sri Devi Ravana
    Department of Information system, University of Malaya, Malaysia
    [email protected]
    Dr. Karpaga Selvi Subramanian
    Department of Computer Engineering, Mekelle University, Ethiopia
    [email protected]
    Dr. Mazliza Binti Othman
    Department of Computer System & Technology, University of Malaya, Malaysia
    [email protected]
    Dr. Chiam Yin Kia
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. OUH Eng Lieh
    Department of Information Systems, Singapore Management University, Singapore
    [email protected]

    Articles

Advanced Search

You can submit your research paper to the journal in just a few clicks. Please follow the steps outlined below: 1. Register your details and select to be an Author 2. Log in with your user name and password 3. ‘Start a new submission’ and follow these 5 steps:

[gravityform id="1" name="Registration" title="false" description="false"]

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue. Sed non rutrum mauris. Maecenas in dolor est. Donec eget sagittis mi. Sed non leo eu odio mollis pulvinar vitae et leo. Integer eu feugiat tortor. Duis massa purus, eleifend id erat eget, hendrerit semper risus. Suspendisse cursus varius dapibus

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue.

Subscription

Subscription (for 12 issues):
Rs. 5000; Overseas - USD 500;
Cheque drawn in favour of "Informatics Publishing Limited"
Click here to download online subscription form

Download

DD Mailing Address

Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet.

BACK TO TOP

Outstanding Scholars

The Journals honor Outstanding Scholars in various fields. Scholar of the Month should have contributed to their field and to the larger community. Recipients will be nominated by the Advisory Board and approved by the Editor-in-Chief of the allied journals published by The Research Publication. Scholar of the Month will be displayed in the web portal of the concerned journal.

Please send your brief write up to [email protected]

Editors and Reviewers

The Research Publication is seeking qualified researchers to join its editorial team as Associate Editor, Editorial Advisory Board Member, and Reviewers.
Kindly send your details to [email protected]

Call For Papers

Authors are requested to submit their papers electronically to [email protected] with mentioning the journal title.

Mailing Address

The Research Publication 1/611, Maruthi Nagar, Rakkipalayam Post, Coimbatore – 641 031, Tamil Nadu, India Phone No.: 0422 2461001

  • About
  • Editorial Policy
  • Author Guidelines
  • Contact us
  • Copyright
  • Facebook
  • Twitter
  • RSS

© 2015 The Research Publication. All rights reserved.

The Research Publication
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription