An Empirical Survey on Data Security in Ad-hoc Networking Using Multipath Routing

نویسندگان

  • Mane Vijaykumar
  • Sohan Garg
چکیده

These days ad-hoc network research has focused on supplying routing services without considering security. In this report, we are providing the information on security threats against ad hoc routing protocols. In light of these threats, we identify three different environments with distinct security requirements. We advise a solution to one; the managed-open scenario where no network substructure is pre-deployed, but prior security coordination is required. Development of hand-held features and mobile telephony makes Ad hoc networks widely adopted, but security remains a complicated issue. Recently, there are several proposed solutions treating authentication, availability, secure routing and intrusion detection etc, in Ad hoc networks. In this report we will analyze some securing data protocol in Ad hoc network. These solutions increase the robustness of transmitted data confidentiality by exploiting the existence of multiple paths between nodes in an Ad hoc network. This report also includes an overview of http://www.ijccr.com International Manuscript ID : ISSN2249054X-V3I3M9-052013 VOLUME 3 ISSUE 3 May 2013 current solutions and vulnerabilities and attacks in Ad hoc networks. Ad hoc wireless networks accept no pre-deployed infrastructure is available for routing packets end-to-end in a network, and instead rely on intermediary peers. Securing ad hoc routing presents challenges because each user brings to the network their own mobile unit, without the centralized policy or control of a traditional network. Many ad hoc routing protocols have been proposed

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...

متن کامل

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

SecMR - a secure multipath routing protocol for ad hoc networks

Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath...

متن کامل

Securing Data in Ad Hoc Networks Using Multipath Routing

Development of handheld features and mobile telephony makes Ad hoc networks widely adopted, but security remains a complicated issue. Recently, there are several proposed solutions treating authentication, availability, secure routing and intrusion detection etc, in Ad hoc networks. In this paper we introduce a securing data protocol in Ad hoc networks, SDMP protocol. This solution increases th...

متن کامل

Survey and Taxonomy of Unicast Routing Protocols for Mobile Ad Hoc Networks

The purpose of this paper is to survey the unicast routing protocols for mobile ad hoc networks (MANETs) and study their primary route selection principle. In this context, we did an exhaustive survey of unicast MANET routing protocols proposed in the literature. Qualitatively, based on their primary route selection principle, we show that all these protocols could be placed under one of two br...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013