Study on Reliable and Secure Routing Protocols on Manet

Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless networking like MANET’s (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks like attacks on modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are analysed for prevention, detection and reaction on various attacks by malicious nodes. The study of this article has examined the methodologies meant for fathoming the implementation issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time, packet transmission ratio, systems or nodes security and administration. Conclusion: This article presents a comparison table specifying that every protocol provides security only to a limited access. Thus, there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols for security issues of MANET.

[1]  Arun Kumar Sangaiah,et al.  Efficient Bandwidth Utilization with Congestion Control for Wireless Mesh Networks , 2014 .

[2]  Nei Kato,et al.  Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[3]  A. Sumathi,et al.  An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS , 2015 .

[4]  M. K. Soni,et al.  A Comparative Study for Secure Routing in MANET , 2010 .

[5]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[6]  V. Vijay Anand,et al.  Methodologies for Addressing the Performance Issues of Routing in Mobile Ad hoc Networks: A Review , 2015 .

[7]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[8]  P. C. Kishore Raja,et al.  Performance Metrics of Wormhole Detection using Path Tracing Algorithm , 2015 .

[9]  Alex Hinds,et al.  A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET) , 2013 .

[10]  B. Thenral,et al.  AMRA: Angle based Multicast Routing Algorithm for Wireless Mesh Networks , 2015 .

[11]  K. Chitra,et al.  Multi Hop Secure Adhoc Network to Eradicate Cooperative Diversity , 2013 .

[12]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[13]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[14]  Madjid Merabti,et al.  Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.

[15]  Christeena Joseph,et al.  Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios , 2015 .

[16]  K. Thangadurai,et al.  Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis , 2015 .

[17]  Mohammad S. Obaidat,et al.  FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.

[18]  Shikha Jain Security Threats in MANETS : A Review , 2014, ArXiv.