Routing Methods in MANET with Secured Key Management and Packet Drop Reductions: A Survey
DOI:
https://doi.org/10.51983/ajcst-2018.7.S1.1812Keywords:
MANETS, Routing, Key Management, Key Distribution, Routing Techniques, Packet DropsAbstract
MANET routing is complex task and selecting secured route ought to be made sooner before the node leaves the network. Quick choices dependably redress network execution. Most MANET routing conventions are intended to work in a cordial and agreeable condition which makes them powerless against different assaults. Further, nodes need to forward data packets to different nodes to empower information correspondence between the nodes that are not in the radio scope of each other. Be that as it may, a node may decline to forward data packets or halfway do the sending or even endeavor to intrude on the system tasks. This is for the most part thought to be a sort of bad conduct which demonstrates the presence of malicious node in a system. Trust and Reputation would fill in as a noteworthy answer for these issues. Secured data transmission is a complex task in MANET as there is a maximum chance for attackers to crash the network. Taking in the system qualities and picking right routing choices at right occasions would be a noteworthy arrangement. In this work, we have completed a broad overview of fault tolerant methods connected to routing in MANETs. Because of the proximity of attacker nodes, the procedure of administration disclosure is extraordinarily influenced, which may prompt poorer execution of the network. This may prompt less packet delivery proportion, throughput, expanded control overhead;add up to overhead and packet drops. Further, anchoring administration revelation task is exceptionally troublesome since, it includes the notoriety of the extensive number of middle of the road nodes present in the system[3]. This paper presents a survey on different techniques for routing,key management and reductions method on packer droppings.
References
A. Khalili, J. Katz, and A. William Arbaugh, "Towards secure key distribution in truly ad hoc networks," IEEE Workshop on Security and Assurance in Ad Hoc Networks –2003.
A. Kapil and S. Rana, "Identity-Based Key Management in MANETs using Public Key Cryptography," International Journal of Security, vol. 3, no. 1, 2009.
W. AnXoing and Y. Huan Gong, "Secure and Highly Efficient Three Level Key Management Scheme for MANET," WSEAS Transactions on Computers, vol. 10, no. 10, 2011.
B. Bing, J. Wu, and Y. Dong, "An efficient group key management scheme for mobile ad hoc network," International Journal and Networks, vol. 2, no. 3, 2008.
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," Advances in Cryptology–Crypto’04, Lecture Notes in Computer Science, vol. 3152, pp. 41–55, 2004.
B. Boukerche et al., "Routing protocols in ad hoc networks: A survey," Elsevier Computer Networks, pp. 3032–3080, 2011.
V. Anand and S. C. Gupta, "Performance of AODV, DSR and DSDV Protocols under varying node movement," 2012.
P. Rohal, R. Dahiya, and P. Dahiya, "Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV)," International Journal for Advance Research in Engineering and Technology, vol. 1, no. 2, 2013.
X. M. Zhang, E. B. Wang, J. Xia, and D. K. Sung, "A Neighbor Coverage based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad hoc Networks," International Journal of Engineering and Technology, vol. 4, no. 5, 2012.
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
K. Sanzgiri and B. Dahill, "A secure routing protocol for ad hoc networks," Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 1-10, 2000.
B. Awerbuch et al., "An On-Demand Secure routing protocol Resilient to Byzantine failures," Proceedings of ACM workshop on Wireless Security, pp. 21-30, 2003.
I. Chlamtac, M. Conti, and J. J.-N. Liu, "Mobile Ad Hoc Networking: Imperatives and Challenges," Elsevier Network Magazine, vol. 13, pp. 13-64, 2003.
Y. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in Wireless Ad Hoc Network Routing Protocol," Proceedings of ACM workshop on wireless security, pp. 30-40, 2003.
J. Sen et al., "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks," Proceedings of 6th International Conference on Information, Communications and Signal Processing, 2007.
K. Kummakasikit et al., "Performance Improvement of Associativity-Based Routing Protocol for Mobile Ad Hoc Networks," Fifth International Conference on Information, Communications and Signal Processing, pp. 16 – 20, 2005.
Detti, Blefari-Melazzi, N. Loreti, "Overlay, BoruvkaBased, "Ad-Hoc Multicast Protocol: Description and Performance Analysis," International Conference on Communications, pp. 5545 – 5552, 2007.
S. R. Raju et al., "ZRP versus DSR and TORA: a comprehensive survey on ZRP performance," 10th IEEE Conference on Emerging Technologies and Factory Automation, pp. 1024, 2005.
Latiff et al., "Development of an indoor GPS-free self-positioning system for mobile ad hoc network (MANET)," 13th IEEE International Conference on Networks, 2005.
K. G. S. Venkatesan et al., "Anonymizing Geographic Routing for Preserving Location Privacy Using Unlinkability and Unobservability," IJACSSE, vol. 4, no. 3, 2014.
Jen, Shang-Ming, Chi-Sung Laih, and Wen-Chung Kuo. "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET," Sensors and Networks, 5022-5039, 2009.
S. Sultana et al., "A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks," Journal Of Latex Class Files, vol. 6, no. 1, 2015.
P. Niranjan et al., "Detection of Wormhole Attack using Hopcount and Time delay Analysis," International Journal of Scientific and Research Publications, vol. 2, no. 4, 2012.
W. Zhou et al., "Secure Network Provenance," Proc. ACMSOSP, pp. 295-310, 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.