A survey on threats in routing security in manet for trust management using SMC protocols

The Mobile ad hoc networks served as explanatory facts on various issues and challenges to learn threats in security of wireless data. This data is actually moves around various components of ad hoc network to perform various operations. The confliction comes when a data is associated with multiple components and reflects the different outputs inside the network. Then it vanish many legitimate operations and creates nuisance or misconduct with participating nodes. Trust overlay can describe respective policies to opt a node to communicate data inside a network. The applications of SMC protocols showed a great impact and useful derivations to compute the secure result at various levels. Further, the various frontiers of infrastructure less networks are in keen interest to serve better with minimal delay in transmission of packets. That means the probability of occurrences of packet drops can also be address with respect to various attacks and countermeasures. This work emphasizes on inside view in an ad hoc network to find and eliminate various security threats to rectify nuisance created by multi association of freely moving data.

[1]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[2]  Yih-Chun Hu Efficient Security Mechanisms for Routing Protocols , 2003 .

[3]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[4]  Veljko M. Milutinovic,et al.  Routing and security in mobile ad hoc networks , 2004, Computer.

[5]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[6]  Helmut Kurth,et al.  Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.

[7]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[8]  Yih-Chun Hu,et al.  Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Shubham Joshi,et al.  Schematize Trust Overlays and Management for Privacy Preservation in MANET , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[11]  Durgesh Kumar Mishra,et al.  Secure Multiparty Computation: From Millionaires Problem to Anonymizer , 2011, Inf. Secur. J. A Glob. Perspect..

[12]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .