Work place: R.V. College of Engineering, Bangalore, Karnataka, India
E-mail: sukrutharajm@gmail.com
Website:
Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Operating Systems, Computer Networks
Biography
Sukrutha Raj was a student of R.V. College of Engineering, Bangalore and obtained her B.E. in Telecommunication Engineering. Her domains of research include Computer Networks, Wireless Sensor Networks and Operating Systems.
By G.Sunayana Sukrutharaj.M Lalitha rani.N M.B.Kamakshi
DOI: https://doi.org/10.5815/ijcnis.2012.12.07, Pub. Date: 8 Nov. 2012
Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic protocols. Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to the vulnerable nature of ad-hoc networks there are many security threats. One of the solutions to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity. But an authenticated selfish node can interfere this protocol and disturb the network by dropping packets. However varieties of attacks targeting routing protocols have been identified. By attacking, the routing protocol attacker can absorb network traffic, inject them in the path between source and destination and thus control 0network traffic. Therefore many secure routing protocols have been developed that deal with these attacks. This paper analyzes the security aspects of one commonly used secure routing protocol ARAN.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals