Survey and New Security methodology of Routing Protocol in AD-Hoc Network

Authors

  • Shahab Wahhab Kareem Department of Information System Engineering, Technical Engineering College, Erbil Polytechnic University - Erbil, Kurdistan Region, Iraq
  • Yahya Tareq Hussein Department of Information Technology, Lebanese French University - Kurdistan Region, Iraq

DOI:

https://doi.org/10.25212/lfu.qzj.2.2.43

Keywords:

wireless sensor network (WSN); Multipath routing protocol; WLAN; Minimum Spanning Tree; Mobile Ad hoc network.

Abstract

Because of many reasons routing is the complex task in ad hoc sensor network. The self-organizing network which is Mobile ad hoc network (MANET) its established automatically via wireless connections by a combination of portable nodes without the support of a centralized management or static infrastructure. The portable nodes redirect packets among these nodes, enabling connection between nodes outside the range of wireless transmission hop by hop capabilities are necessary. So it important is increasing to provide suitable routing protocol plus security. This paper endeavors to present a full survey about secure routing. At the beginning investigates the reason which makes ad hoc network is susceptible to attacks. After that, it shows the wellknown traditional secure protocols then compares them. Finally, the proposed algorithm depended on the Dynamic Source Routing (DSR) to remove malicious nodes, minimum spanning tree for routing path plus coding-encryption technique of a chaos-based adaptive arithmetic for encrypting, compression plus decompression, decrypt a message.

Downloads

Download data is not yet available.

References

Dongbin Wang, Mingzeng Hu and Hui Zhi, “A survey of secure routing in ad hoc networks”, The Ninth International Conference on Web-Age Information Management, © 2008 IEEE.

S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks", Mobile Computing and Networking. (2000), pp., 255- 265.

Yipin Sun, Rongxing Lu, Xiaodong Lin, Jinshu Su and Xuemin (Sherman) Shen, “NEHCM: A Novel and Efficient Hash-chain based Certificate Management Scheme for Vehicular Communications”.

F. Bevitelli, E. Di Cola, L. Fortuna and F. Itnlia, “Multilayer Chaotic Encryption for Secure Communications in Packet Switching Networks” , Communication Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on 21- 25 Aug. 2000

CHARLES E. PERKINS, ELIZABETH M. ROYER, “AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING”, MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 1999. PROCEEDINGS. WMCSA '99. SECOND IEEE WORKSHOP.

Parul suneja , Anil Kumar and Annu Soni , “System scenario based investigation of AODV and AOMDV Routing Protocol in MANET” , 2015 International Conference on Soft Computing Techniques and Implementations- (ICSCTI).

Sunita Gupta and Ghanshyam Prasad “Enhanced load balancing and delay constraint AOMDV routing in MANET”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

Sukiswo and Muhamad Rifqi Rifquddin ,“Performance of AOMDV Routing Protocol Under Rushing and Flooding Attacks in MANET”, 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)

Vipin Bondreand Sanjay Dorle ‘ “Design and Performance Evaluation of AOMDV Routing Protocol for VANET” , IEEE International Conference on Computer, Communication and Control (IC4-2015).

] Sunil Bhutada, ranthi Kumar.K,Manisha.K, “A Novel Approach for Secure Routing Protocol: To Improve Life of Network”, International Conference on Contemporary Computing and Informatics (IC3I), 978-1-4799-6629-5/14 ©2014 IEEE.

Wenjig Lou,Wei Liu,Yuguang Fang, “A Simulation Study of Security Performance Using Multipath Routing in Ad Hoc Networks”, 0-7803-7954-3/03 ©2003 IEEE.

Loay Abusalah,Ashfaq Khokhar,Mohsen Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008.

Rabab Mohsin, John Woods, “ Performance Evaluation of MANET Routing Protocols in a Maritime Environment” 6th Computer Science and Electronic Engineering Conference (CEEC) university of Essex ,2014.

Sisily Sibichen1, Sreela Sreedhar2 ,"An Efficient AODV Protocol and Encryption Mechanism for Security Issues in Adhoc Networks", (ICMiCR-2013).

Mohsin Ur Rahman and Sohail Abbas “Simulation-based analysis of MANET routing protocols using group mobility model” ,International Conference on Inventive Computation Technologies (ICICT),2016.

Faria Farjana Khan , Anindya Jana , Tahesin Samira and Kazy Noore Alam Siddiquee, “Performance of Agro-Sensors: Assessment of Optimality in Routing Protocols of MANET in Wireless Sensor Networks”, International Conference on Intelligent Control Power and Instrumentation (ICICPI) , 2016.

Yue Yang , Siyuan Hao and Haibin Cai , “Comparison and Evaluation of Routing Protocols Based On A Collaborative Simulation Using SUMO and NS3 with TraCI”, International Conference on Information System and Artificial Intelligence , 2016.

Guruprasanna and R Sujatha M “A novel Approach to avoid malicious attack to enhance network in WSN”, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, 2016.

Downloads

Published

2021-01-24

How to Cite

Shahab Wahhab Kareem, & Yahya Tareq Hussein. (2021). Survey and New Security methodology of Routing Protocol in AD-Hoc Network. QALAAI ZANIST JOURNAL, 2(2), 431–443. https://doi.org/10.25212/lfu.qzj.2.2.43

Issue

Section

Articles

Most read articles by the same author(s)