Components for Designing of Secure Routing Protocol

Authors

  • SS Zalte Shivaji University, Kolhapur, India
  • VR Ghorpade Bharti Vidyapeeth’s College of Engineering, Kolhapur, India

DOI:

https://doi.org/10.26438/ijcse/v5i12.313316

Keywords:

MANET, security, attacks, secure routing protocols, components

Abstract

In Mobile Ad-hoc Network(MANET) there are so many routing protocols are commenced. But no one will fulfill all security requirements. The crucial issue in MANET is Security due to the openness, infrastructure less and variable topology of MANET. In the broad dispersion of MANET, so many routing protocols are incorporated initially with the assumption that security must be retrofitted. Thus the routing protocols are more prone to various attacks with the risk of destruction of data. In this paper, we have discussed various components which will be required or helpful for designing of secure routing protocol in MANET.

References

Hu Y., A.Perrig., “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security & Privacy, 2004.

Navneet Kumar, "A Survey on Security in Mobile Ad-Hoc Network and Solutions", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.32-36, 2015.

V.Bhargavi, M.Seetha, S.Viswanadharaju, “ A Trust Based Secure Routing Scheme for MANETS”, IEEE, pp-565-570, 2016.

J.L. Tornos, J.J.Piles and J. L. Salazar,“ ADSR: Authenticated DSR”, 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE,pp-1-8, 2011

M.Pandya,A.K.Shrivastava.,“Improvising Performance with Security of AODV Routing Protocol for MANETs”, IJCA, 78 , p1-1-7,2003.

K. V. Arya, S. S. Rajput ,“ Securing AODV Routing Protocol in MANET using NMAC with HBKS Technique”, 2014 International Conference on Signal Processing and Integrated Networks (SPIN), IEEE,pp-281-285, 2014

A. Patwardhan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, “Secure Routing and Intrusion Detection in Ad Hoc Networks,” in Proc. of the 3rd IEEE – International conference on Pervasive Computing and Communications, March, pp. 191-199,2005.

S. Soni, A. Parihar, “ Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks”, IJCA (0975 – 8887), Volume 135 – No.5, February 2016

J. Kim, G. Tsudik,“SRDP: Secure route discovery for dynamic source routing in MANETs”, elsevier,Ad Hoc Networks 7, pp- 1097–1109,2009

A.Rajaram ,S.Palaniswami, “ A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks”, IJCSI, Vol. 7, Issue 4, No 5,pp-37-45, July 2010

Anitha, J. Akilandeswari, “ Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures”, InterJRI Computer Science and Networking, Vol. 2, Issue 1,pp-14-18, August 2010

N. Raza1, M. U. Aftab1, M. Q. Akbar2, O. Ashraf3, M. Irfan4, “ Mobile Ad-Hoc Networks Applications and Its Challenges”, Communications and Network, 8,pp- 131- 136,August 2016 .

A Ambhaikar, D Mitra,R.Deshmukh, “ Performance of MANET Routing Protocol for Improving Scalability ”, Published in IJAEA, Jan 2011.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i12.313316
Published: 2025-11-12

How to Cite

[1]
S. Zalte and V. Ghorpade, “Components for Designing of Secure Routing Protocol”, Int. J. Comp. Sci. Eng., vol. 5, no. 12, pp. 313–316, Nov. 2025.