Review of Security Approaches in Routing Protocol in Mobile Adhoc Network
In this paper the objective is to present a review of routing protocols in mobile ad hoc network (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology as well as limited range of transmission, very often some nodes cannot communicate directly with each other. Because of this phenomenon, all the QoS and security issues surface. Till now there is abundant literature work being formulated towards designing routing protocols. But security features designed till now are not able to provide optimal security towards secure routing. Routing protocols, data, bandwidth and battery power are the common target of the attackers. Therefore, in this paper the attempts are to throw light on the work that were focused exclusively for maintaining security in routing protocols in MANET
Keywords: Routing, MANET, Security , Wireless Communication
Download Full-Text
ABOUT THE AUTHORS
Sumati Ramakrishna Gowda
Sumati Ramakrishna Gowda has obtained B.E Dégrée in Computer Science from Mysore, Master of Science in Information Technology from KSOU Mysore, and she also obtained Master of Philosophy in Computer Science from Madhurai Kamraj University, Madurai. She is currently working as a Lecturer, DOS in Computer Science, at the Karnataka State Open University, Mysore, India. KSOU was inspired by the concept of open learning and distance education, also providing IT education to a host of students at different levels. Currently pursuing her research work in the area of Security Approaches in Routing Protocol.
P.S Hiremath
Dr. P. S. Hiremath is Ph.D. in Applied Mathematics , from Karnataka University, Dharwad, Karnataka, India. He is Masters of Science in Applied Mathematics, Karnataka University, Dharwad, Karnataka, India. He had been in the Faculty of Mathematics and Computer Science of various institutions in India, namely, National Institute of Technology, Surathkal (1977-79), Coimbatore Institute of Technology, Coimbatore (1979-80), National Institute of Technology, Tiruchinapalli (1980-86), Karnatak University, Dharwad (1986-1993) and has been presently working as Professor and Chairman of Computer Science in Gulbarga University, Gulbarga(1993 onwards). His research areas of interest are Computational Fluid Dynamics, Optimization Techniques, Image Processing and Pattern Recognition, and Computer Networks. He has published 156 research papers in peer reviewed International Journals and proceedings of International Conferences.
Sumati Ramakrishna Gowda
Sumati Ramakrishna Gowda has obtained B.E Dégrée in Computer Science from Mysore, Master of Science in Information Technology from KSOU Mysore, and she also obtained Master of Philosophy in Computer Science from Madhurai Kamraj University, Madurai. She is currently working as a Lecturer, DOS in Computer Science, at the Karnataka State Open University, Mysore, India. KSOU was inspired by the concept of open learning and distance education, also providing IT education to a host of students at different levels. Currently pursuing her research work in the area of Security Approaches in Routing Protocol.
P.S Hiremath
Dr. P. S. Hiremath is Ph.D. in Applied Mathematics , from Karnataka University, Dharwad, Karnataka, India. He is Masters of Science in Applied Mathematics, Karnataka University, Dharwad, Karnataka, India. He had been in the Faculty of Mathematics and Computer Science of various institutions in India, namely, National Institute of Technology, Surathkal (1977-79), Coimbatore Institute of Technology, Coimbatore (1979-80), National Institute of Technology, Tiruchinapalli (1980-86), Karnatak University, Dharwad (1986-1993) and has been presently working as Professor and Chairman of Computer Science in Gulbarga University, Gulbarga(1993 onwards). His research areas of interest are Computational Fluid Dynamics, Optimization Techniques, Image Processing and Pattern Recognition, and Computer Networks. He has published 156 research papers in peer reviewed International Journals and proceedings of International Conferences.