Abstracto

A SECURITY SURVEY OF AUTHENTICATED ROUTING PROTOCOL (ARAN)

Ravi Raval, Ketan Sarvakar

Communication happens in ad hoc networks through multiple hops if the destination node is not in the direct wireless transmission range of sender. Many proposed routing protocol for ad hoc networks. On demand routing protocolsare quite less expensive in terms of network overhead and fortunatelyquicker reaction time than other type of routing schemes which are based on periodic protocol. However varieties of attacks have been identified which targets routing protocols. The attacker attacks the routing protocol to soak up network traffic packets. Later on an attacker maypush intothe path in between source and destination, and hence control network traffic. There are so many routing protocols developed which can deal with this type of attack. This paper analyzes specially the security features of a commonly used routing protocol, i.e. ARAN

Descargo de responsabilidad: este resumen se tradujo utilizando herramientas de inteligencia artificial y aún no ha sido revisado ni verificado.

Indexado en

Academic Keys
ResearchBible
CiteFactor
Cosmos SI
Búsqueda de referencia
Universidad Hamdard
Catálogo mundial de revistas científicas
director académico
Factor de impacto de revistas innovadoras internacionales (IIJIF)
Instituto Internacional de Investigación Organizada (I2OR)
Cosmos

Ver más