Satheesh A.

Work place: Vellore Institute of Technology, School of Computer Science & Engineering, Vellore, 632014, India

E-mail: satheesh.abimannan@vit.ac.in

Website:

Research Interests: Applied computer science, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science

Biography

Professor Dr. Satheesh A. also an Indian Citizen is an Associate Professor in the School of Computer Science and Engineering at Vellore Institute of Technology, Vellore, Tamil Nadu, India. He holds a Ph.D. in Computer Science and has many years of experience in teaching and research.

Author Articles
Implementing Security Features in MANET Routing Protocols

By Abhishek Vyas Satheesh A.

DOI: https://doi.org/10.5815/ijcnis.2018.08.06, Pub. Date: 8 Aug. 2018

Mobile ad-hoc network or MANET is an auto-organizing network of mobile nodes. It lacks centralized control and is connected by wireless links. One of the many benefits of MANETs is that it can be utilized where there is no proper infrastructural support for wireless access and wired backbone is not possible. One major drawbacks of MANET is that as it is an infracture-less network, created on the fly, so here each node also functions as a router. So, each node participates in the routing of packets and information along the network. Due to this feature in MANETs, it is convenient to attack one of the nodes of MANET and then organize an attack on the whole network. To, secure the routing protocols in MANETs there are already a number of security features included in many of the unicast and multicast routing protocols. Like the use of unique signature and the use of secured algorithmic approach to secure against the various network layer routing attacks in MANETs. In this paper it is proposed that the use of hashing and secured algorithmic approaches like, Alpha Numeric Routing, when combined can introduce a unique security feature to On-Demand Routing protocols both in its multicast and unicast avatars. Some comparison, is done in the end of the new approach combines with the existing approaches by only using, Alpha Numeric Reflex Routing Algorithm. The outcome of the implementation was as expected, the results satisfied the input algorithms. Last but not the least analysis of the results is done and there is a discussion about the obtained results.

[...] Read more.
Other Articles