EXPLORING SECURITY AND ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS: A COMPREHENSIVE REVIEW

##plugins.themes.bootstrap3.article.main##

Mrs. P. Vidhya Devi Dr. B. L. Shivakumar

Abstract

Mobile ad hoc networks (MANETs) are autonomously self-coordinated networks without infrastructure support. MANET works under no proper infrastructure in which each hub works loves a switch that stores and advances parcel to conclusive destination. Because of its dynamic topology, MANET can be made anyplace, whenever. As there are restricted assets in MANET so it deals with numerous issues like security, restricted transfer speed, reach and power constraints. This paper surveyed various strategies to manage congestion control, security issues, various layers assaults, routing protocols and difficulties that are looked by MANET.

##plugins.themes.bootstrap3.article.details##

Section
Articles

References

[1]. Albers P, Camp O, Percher JM, Jouga B, Me L, Puttini RS. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In Wireless Information Systems 2002 Apr 3 (pp. 1-12).
[2]. Sun B, Pi S, Gui C, Zeng Y, Yan B, Wang W, Qin Q. Multiple constraints QoS multicast routing optimization algorithm in MANET based on GA. Progress in Natural Science. 2008 Mar 10; 18 (3):331-6.
[3]. Yang F, Ling S, Xu H, Sun B. Network coding-based AOMDV routing in MANET. In2012 ieee international conference on information science and technology 2012 Mar 23 (pp. 337-340). IEEE.
[4]. Duraipandian M. Performance evaluation of routing algorithm for Manet based on the machine learning techniques. Journal of trends in Computer Science and Smart technology (TCSST). 2019 Sep; 1(01):25-38.
[5]. A. Echchaachoui, A. Choukri, A. Habbani and M. Elkoutbi, "Asymmetric and dynamic encryption for routing security in MANETs," 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, 2014, pp. 825-830, doi: 10.1109/ICMCS.2014.6911237.
[6]. Sharma B, Chugh S, Jain V. Energy efficient load balancing approach to improve AOMDV routing in MANET. In2014 fourth international conference on communication systems and network technologies 2014 Apr 7 (pp. 187-192). IEEE.
[7]. Kaur S, Kaur H. Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature. International Journal for Advance Research in Engineering and Technology. 2015; 3:24-8.
[8]. Arepalli G, Erukula SB, Gopi AP, Nagaraju C. Secure Multicast Routing Protocol in MANETs Using Efficient ECGDH Algorithm. International Journal of Electrical & Computer Engineering (2088-8708). 2016 Aug 1; 6(4).
[9]. Sangeetha MS, Sathappan S. Self Organized Gradient Boosting Key Authentication for Secured Data Communication in Mobile Ad-hoc Network. International Journal of Applied Engineering Research. 2017; 12(18):7823-32.
[10]. Patel P, Bansode R, Nemade B. Performance evaluation of MANET network parameters using AODV protocol for HEAACK enhancement. Procedia Computer Science. 2016 Jan 1; 79:932-9.
[11]. Ahmad A, Ismail S. User selective encryption method for securing MANETs. International Journal of Electrical and Computer Engineering (IJECE). 2018 Oct; 8(5):3103-11.
[12]. Khan A, Sun QT, Mahmood Z, Ghafoor AU. Energy efficient partial permutation encryption on network coded MANETs. Journal of Electrical and Computer Engineering. 2017 Apr 6;2017.
[13]. Minghu Wu, Siguang Chen and Jiaping Liao, "Data security in MANETs by integrating multipath routing and secret sharing," 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010), Wuhan, China, 2010, pp. 72-75, doi: 10.1109/CAR.2010.5456776.
[14]. V. S. Bhargavi and S. V. Raju, "Enhancing security in MANETS through trust-aware routing," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1940-1943, doi: 10.1109/WiSPNET.2016.7566481.
[15]. G. Thandavarayan, K. Sangeetha and S. Seerangan, "ORZEF: An optimized routing using zone to establish security in MANET using multipath and friend-based ad hoc routing," International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012), Salem, India, 2012, pp. 221-224, doi: 10.1109/ICPRIME.2012.6208347.