A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks

Authors

  • Srihari Babu Kolla Dept. of Computer Science, Dhanekula Institute of Engg & Technology, India
  • B.B.K Prasad Dept. of Computer Science, Dhanekula Institute of Engg & Technology, India

Keywords:

Security, Vulnerabilities, WSN, Ad-Hoc Networks, Routing, Packet Forwarding

Abstract

A wireless Adhoc networks is the collection of wireless nodes that can co-operate by forwarding packets for each other to allow nodes to communicate directly. The deployment of Ad-hoc networks in security- and- safety in critical environments requires secure communication primitives. As WSN�s become more and more crucial to everyday functioning of the people. Securing in wireless ad-hoc networks is a challenging task. Low power wireless networks are an existing research direction in routing and security. This paper discusses a wide variety of vulnerabilities while routing and different existing securities to mitigate them.

References

C. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers,” in ACM SIGCOMM, pp. 234–244, Aug. 1994.

T. Clausen and P. Jacquet, “Optimized link state routing protocol (OLSR).” IETF Request for Comments 3626, 2003.

T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, “The optimized link state routing protocol, evaluation through experiments and simulation,” in IEEE Symposium on Wireless Personal Mobile Communications, Sept. 2001.

L. Viennot, “Complexity results on election of multipoint relays in wireless networks,” tech. rep., INRIA, France, 1998.

C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing.” IETF Request for Comments 3561, 2003.

D. Johnson, D. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, ch. 5, pp. 139–172. Addison-Wesley, 2001.

J. Hightower and G. Borriello, “Location systems for ubiquitous computing,” IEEE Computer, vol. 34, no. 8, pp. 57–66, Aug. 2001.

S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A.Woodward, “A distance routing effect algorithm for mobility (DREAM),” in ACM International Conference on Mobile Computing and Networking (MobiCom), (Dallas, USA), pp. 76–84, Oct. 1998.

S. Basagni, I. Chlamtac, and V. R. Syrotiuk, “Geographic messaging in wireless ad hoc networks,” in Annual IEEE International Vehicular Technology Conference, (Houston, USA), pp. 1957–1961, May 1999. 32 Rubinstein et al.

J. Li, J. Jannotti, D. De Couto, D. Karger, and R. Morris, “A scalable location service for geographic ad-hoc routing,” in ACM International Conference on Mobile Computing and Networking (MobiCom), (Boston, USA), pp. 120–130, Aug. 2000.

R. Morris, F. Kaashoek, D. Karger, D. Aguayo, J. Bicket, S. Biswas, D. De Couto, and J. Li, “The grid ad hoc networking project.” http://pdos.csail.mit.edu/grid/, 2003.

Byran Parno, Mark Luk, Evan Gaustad, and Aridane Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006

Y.-C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 3–13, June 2002.

P. Papadimitratos and Z. Hass, “Secure routing for mobile ad hoc networks,” in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Jan. 2002.

Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” in ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 12–23, Sept. 2002.

M. G. Zapata and N. Asokan, “Securing ad hoc routing protocols,” in ACM Workshop on Wireless Security (WiSe), pp. 1–10, Sept. 2002.

Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014

Downloads

Published

2014-04-30

How to Cite

[1]
S. B. Kolla and B. Prasad, “A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks”, Int. J. Comp. Sci. Eng., vol. 2, no. 4, pp. 20–25, Apr. 2014.

Issue

Section

Survey Article