抽象的

A SECURITY SURVEY OF AUTHENTICATED ROUTING PROTOCOL (ARAN)

Ravi Raval, Ketan Sarvakar

Communication happens in ad hoc networks through multiple hops if the destination node is not in the direct wireless transmission range of sender. Many proposed routing protocol for ad hoc networks. On demand routing protocolsare quite less expensive in terms of network overhead and fortunatelyquicker reaction time than other type of routing schemes which are based on periodic protocol. However varieties of attacks have been identified which targets routing protocols. The attacker attacks the routing protocol to soak up network traffic packets. Later on an attacker maypush intothe path in between source and destination, and hence control network traffic. There are so many routing protocols developed which can deal with this type of attack. This paper analyzes specially the security features of a commonly used routing protocol, i.e. ARAN

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

学术钥匙
研究圣经
引用因子
宇宙IF
参考搜索
哈姆达大学
世界科学期刊目录
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多