A Survey of Routing Protocols and Security Issues in MANET

Authors

  • Sumathi K Dept. of Computer Science, Nehru Arts and Science College, Coimbatore, India
  • Vimal Kumar D Dept. of Computer Science, Nehru Arts and Science College, Coimbatore, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.518523

Keywords:

Mobile Ad-hoc Network, Security Issues, Routing Protocols, Attacks

Abstract

Mobile Ad-hoc network (MANET) is a type of ad hoc network that can change locations and configure itself on the fly and wireless communications. The mobile nodes communicate with each node without any centralized manner. The MANETs does not have any pre-defined network topology. The MANET node wants to send the data between two nodes to establish wireless connection to exchange the data. After data sending is finished the connection is ended. The mobile network topology is regularly changing the location due to nodes moving, resource limitation and bandwidth limitation of mobile node. There are many types of routing protocol available in MANET. In this paper, we discuss about different type of existing MANET routing protocols and its security problems. The MANET routing protocols offered for secure packets sending and face some common attack in ad hoc networks. The routing protocol are subjected to situation against the most frequently identified attack sink hole, grey hole, spoofing, black hole attack and wormhole attack etc. A survey of various issues in MANET regarding security is done considering all major aspects.

References

[1] Ali Dorri “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”, Springer Science Business Media New York 2016.

[2] Gayathri Dhananjayan and Janakiraman Subbiah, “T2AR: trust‑aware ad‑hoc routing protocol for MANET”, Springer Plus (2016) 5:995.

[3] Nadav Schweitzer, Ariel Stulman, Member, Asaf Shabtai and Roy David Margalit “Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks”, in: IEEE Transactions on Mobile Computing, Volume: 16 Issue: 8, 2017.

[4] Neelam Janak Kumar Patel, Dr. Khushboo Tripathi, “Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method”, IJSRSET, Volume 4, Issue 4, 2018.

[5] R C Poonia, D. Bhargava, and B.Suresh Kumar. “CDRA: Cluster-based dynamic routing approach as a development of the AODV in vehicular ad-hoc networks”, In Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon, pp.397-401. IEEE, 2015.

[6] S. Hazra, and S.K. Setua. “Black Hole Attack Defending Trusted On-Demand Routing in Ad-Hoc Network”, In Advanced Computing, Networking and Informatics-Volume 2, pp.59-66. Springer International Publishing, 2014.

[7] S. Jain, M. Jain, H. Kandwal, “Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray hole Attacks in Mobile Ad-hoc Networks”, Intl. Journal of Computer Application 1(7): 37-42, Feb. 2010.

[8] A.Siddiqua, S.Kotari, and AAKhan Mohammed. “Preventing black hole attacks in MANETs using secure knowledge algorithm”, Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon. IEEE, 2015.

[9] N.Choudhary and L.Tharani. “Preventing black Hole attack in AODV using timer-based detection mechanism”, Signal processing and communication engineering systems (SPACES), 015 international conferenceon. IEEE,2015.

[10] AK Jain and V Tokekar. “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile adhoc Networks”, Pervasive computing (ICPC), 2015 international conference on. IEEE, 2015.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.518523
Published: 2025-11-17

How to Cite

[1]
K. Sumathi and D. Vimal Kumar, “A Survey of Routing Protocols and Security Issues in MANET”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 518–523, Nov. 2025.