Survey and New Security methodology of Routing Protocol in AD-Hoc Network
DOI:
https://doi.org/10.25212/lfu.qzj.2.2.43Keywords:
wireless sensor network (WSN); Multipath routing protocol; WLAN; Minimum Spanning Tree; Mobile Ad hoc network.Abstract
Because of many reasons routing is the complex task in ad hoc sensor network. The self-organizing network which is Mobile ad hoc network (MANET) its established automatically via wireless connections by a combination of portable nodes without the support of a centralized management or static infrastructure. The portable nodes redirect packets among these nodes, enabling connection between nodes outside the range of wireless transmission hop by hop capabilities are necessary. So it important is increasing to provide suitable routing protocol plus security. This paper endeavors to present a full survey about secure routing. At the beginning investigates the reason which makes ad hoc network is susceptible to attacks. After that, it shows the wellknown traditional secure protocols then compares them. Finally, the proposed algorithm depended on the Dynamic Source Routing (DSR) to remove malicious nodes, minimum spanning tree for routing path plus coding-encryption technique of a chaos-based adaptive arithmetic for encrypting, compression plus decompression, decrypt a message.
Downloads
References
Dongbin Wang, Mingzeng Hu and Hui Zhi, “A survey of secure routing in ad hoc networks”, The Ninth International Conference on Web-Age Information Management, © 2008 IEEE.
S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks", Mobile Computing and Networking. (2000), pp., 255- 265.
Yipin Sun, Rongxing Lu, Xiaodong Lin, Jinshu Su and Xuemin (Sherman) Shen, “NEHCM: A Novel and Efficient Hash-chain based Certificate Management Scheme for Vehicular Communications”.
F. Bevitelli, E. Di Cola, L. Fortuna and F. Itnlia, “Multilayer Chaotic Encryption for Secure Communications in Packet Switching Networks” , Communication Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on 21- 25 Aug. 2000
CHARLES E. PERKINS, ELIZABETH M. ROYER, “AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING”, MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 1999. PROCEEDINGS. WMCSA '99. SECOND IEEE WORKSHOP.
Parul suneja , Anil Kumar and Annu Soni , “System scenario based investigation of AODV and AOMDV Routing Protocol in MANET” , 2015 International Conference on Soft Computing Techniques and Implementations- (ICSCTI).
Sunita Gupta and Ghanshyam Prasad “Enhanced load balancing and delay constraint AOMDV routing in MANET”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
Sukiswo and Muhamad Rifqi Rifquddin ,“Performance of AOMDV Routing Protocol Under Rushing and Flooding Attacks in MANET”, 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)
Vipin Bondreand Sanjay Dorle ‘ “Design and Performance Evaluation of AOMDV Routing Protocol for VANET” , IEEE International Conference on Computer, Communication and Control (IC4-2015).
] Sunil Bhutada, ranthi Kumar.K,Manisha.K, “A Novel Approach for Secure Routing Protocol: To Improve Life of Network”, International Conference on Contemporary Computing and Informatics (IC3I), 978-1-4799-6629-5/14 ©2014 IEEE.
Wenjig Lou,Wei Liu,Yuguang Fang, “A Simulation Study of Security Performance Using Multipath Routing in Ad Hoc Networks”, 0-7803-7954-3/03 ©2003 IEEE.
Loay Abusalah,Ashfaq Khokhar,Mohsen Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008.
Rabab Mohsin, John Woods, “ Performance Evaluation of MANET Routing Protocols in a Maritime Environment” 6th Computer Science and Electronic Engineering Conference (CEEC) university of Essex ,2014.
Sisily Sibichen1, Sreela Sreedhar2 ,"An Efficient AODV Protocol and Encryption Mechanism for Security Issues in Adhoc Networks", (ICMiCR-2013).
Mohsin Ur Rahman and Sohail Abbas “Simulation-based analysis of MANET routing protocols using group mobility model” ,International Conference on Inventive Computation Technologies (ICICT),2016.
Faria Farjana Khan , Anindya Jana , Tahesin Samira and Kazy Noore Alam Siddiquee, “Performance of Agro-Sensors: Assessment of Optimality in Routing Protocols of MANET in Wireless Sensor Networks”, International Conference on Intelligent Control Power and Instrumentation (ICICPI) , 2016.
Yue Yang , Siyuan Hao and Haibin Cai , “Comparison and Evaluation of Routing Protocols Based On A Collaborative Simulation Using SUMO and NS3 with TraCI”, International Conference on Information System and Artificial Intelligence , 2016.
Guruprasanna and R Sujatha M “A novel Approach to avoid malicious attack to enhance network in WSN”, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, 2016.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Shahab Wahhab Kareem, Yahya Tareq Hussein
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission