抽象的

A SECURITY SURVEY OF AUTHENTICATED ROUTING PROTOCOL (ARAN)

Ravi Raval, Ketan Sarvakar

Communication happens in ad hoc networks through multiple hops if the destination node is not in the direct wireless transmission range of sender. Many proposed routing protocol for ad hoc networks. On demand routing protocolsare quite less expensive in terms of network overhead and fortunatelyquicker reaction time than other type of routing schemes which are based on periodic protocol. However varieties of attacks have been identified which targets routing protocols. The attacker attacks the routing protocol to soak up network traffic packets. Later on an attacker maypush intothe path in between source and destination, and hence control network traffic. There are so many routing protocols developed which can deal with this type of attack. This paper analyzes specially the security features of a commonly used routing protocol, i.e. ARAN

索引于

学术钥匙
研究圣经
引用因子
宇宙IF
参考搜索
哈姆达大学
世界科学期刊目录
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多