Investigating and comparing safe routers in adhoc networks

Paper Details

Research Paper 01/06/2015
Views (596)
current_issue_feature_image
publication_file

Investigating and comparing safe routers in adhoc networks

Somayyeh Haghtalabi, Mehdi Golshan, Mostafa Jahangir, Reza Saboor
J. Biodiv. & Environ. Sci. 6(6), 589-595, June 2015.
Copyright Statement: Copyright 2015; The Author(s).
License: CC BY-NC 4.0

Abstract

Adhoc networks are networks are nodes non-structurally related nodes with no consistent resource for organizing them. One of the most difficult problems in Ad-Hoc networks is rout finding. Since the nodes are displaced in Ad-Hoc networks, they get distant from adjacent boards and hence, the network topology changes all the time. Safety in Ad-hoc networks especially for military ones is very vital. As nodes don’t have constant position, any invading node can penetrate the network easily and gets the safety of information or rout finding of all or a part of the network disordered; especially giving the fact that most of the rout finding methods in the network tend to believe in all nodes. This survey investigates the pros and cons of three protocols of safe rout finding and we survey some of the main algorithms in this significant like SEAD and ARANA algorithms.

Chan H, Perrig A, Song D. 2003. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the IEEE Symposium on Security and Privacy.

Charles E, Perkins Elizabeth M, Belding-Royer, Samir R. 2003. Ad Hoc On Demand Distance Vector (AODV) Routing. Internet-Draft, draft-ietf-manetaodv-10 txt.

David B, Johnson David A, Maltz Yih-Chun Hu, Jorjeta G, Jetcheva. 2002. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). Internet-Draft, draft-ietf-manet-dsr- 07.

Du W, Deng J, Han S, Varshney PK. 2003. Establishing Pairwise Keys in Distributed Sensor Networks. In Proceedings of the ACM Conference on Computer and Communications Security.

Hsiao HC, Studer A, Chen C, Perrig A, Bai F, Bellur B, Iyer A. 2011. Flooding-Resilient Broadcast Authentication for VANETs. In Proc of Mobi Com.

Jia L, Basescu C, Kim THJ, Perrig A, Hu YC, Zhang F. 2014. Mechanized network origin and path authenticity proofs. Technical Report CMU-CyLab-14-007. Carnegie Mellon University.

Kang MS, Lee SB, Gligor VD. 2013. The CrossfireAttack. In Proc of IEEE Security and Privacy.

LiJ, Sung M, Xu J, Li L. 2004. Large-Scale IP TracebackinHigh-Speed Internet: Practical Techniques and Theoretical Foundation. In Proc. of IEEE Security and Privacy.

Liu B, Chiang JT, Haas JJ, Hu YC. 2010. CowardAttacks in Vehicular Networks. Mobile Computing and Communications Review.

Liu X, Li A, Yang X, Wetherall D. 2008. Passport: Secureand Adoptable Source Authentication. In Proc.

Madhyastha HV, Katz-Bassett E, Anderson T, Krishnamurthy A, Venkataramani A. 2009. iPlane Nano: Path Prediction for Peer-to-peer Applications. In Proc.

Mitchell J. 2002. Security for Mobility. IEE Press January.

Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G. 2009. JAID: analgorithm for data fusion and jamming avoidance on distributed sensornetworks, Pervasive Mobile Comput 5 (2), 135–147.

Oppermann I, Stoica L, Rabbachin A, Shelby Z, Haapola J. 2004. UWB wirelesssensor networks: UWEN-a practical example, IEEE Commun. Mag 42 (12).

Stallings W. 2002. Cryptography & Network Secu-rity, Prentice Hall.

Stutzman WL, Thiele GA. 1997. Antenna Theory and Design, second ed., J. Wiley, weN York.

Wood AD, Stankovic JA, Son SH. 2003. a jammed-area mapping service for sensor networks, in: Proceedings of the 24th IEEE International Real-Time Systems Symposium, RTSS 03, IEEE Computer Society. Washington. DC, USA p. 286.

Wood AD, Stankovic JA, Zhou G. 2007. DEEJAM: defeating energy-efficientjamming in IEEE 802.15.4-based wireless networks, in: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad-Hoc Communications and Networks 60–69.

Xu W, Trappe W, Zhang Y, Wood T. 2005. The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of the 6th ACM International Symposium on Mobile Ad-Hoc Networ-king and Computing – Mobi Hoc 05.

Yih-Chun Hu, Adrian Perrig R, David B, Johnson A. 2002. A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (Mobi Com 2002), pages 12–23.

Yih-Chun Hu, David B, Adrian Perrig J. 2002. Secure Effcient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ’02) 3.13.

Yih-Chun Hu. 2003. Enabling Secure High-Performance Wireless Ad Hoc Networking. PHD thesis, School of Computer Science Computer Science Department Carnegie Mellon University (CMU-CS-03-144).

Related Articles

Agroforestry in woody-encroached Sub-Saharan savannas: Transforming ecological challenges into sustainable opportunities

Yao Anicet Gervais Kouamé, Pabo Quévin Oula, Kouamé Fulgence Koffi, Ollo Sib, Adama Bakayoko, Karidia Traoré, J. Biodiv. & Environ. Sci. 27(3), 10-22, September 2025.

Extreme rainfall variability and trends in the district of Ouedeme, municipality of Glazoue (Benin)

Koumassi Dègla Hervé, J. Biodiv. & Environ. Sci. 27(3), 1-9, September 2025.

Heterosis breeding, general and specific combining ability and stability studies in pearl millet: Current trends

Ram Avtar, Krishan Pal, Kavita Rani, Rohit Kumar Tiwari, Mahendra Kumar Yadav, J. Biodiv. & Environ. Sci. 27(2), 117-124, August 2025.

Combining ability, heterosis and stability for yield and fibre quality traits in cotton: Breeding approaches and future prospects

Rohit Kumar Tiwari, Krishan Pal, R. P. Saharan, Ram Avtar, Mahendra Kumar Yadav, J. Biodiv. & Environ. Sci. 27(2), 109-116, August 2025.

Bridging the COPD awareness gap in marginalized populations: Findings from a multicentre study in Khalilabad, Sant Kabir Nagar, Uttar Pradesh, India

Anupam Pati Tripathi, Jigyasa Pandey, Sakshi Singh, Smita Pathak, Dinesh Chaudhary, Alfiya Mashii, Farheen Fatima, J. Biodiv. & Environ. Sci. 27(2), 97-108, August 2025.

Antioxidant and anti-inflammatory activity of Pleurotus citrinopileatus Singer and Pleurotus sajor-caju (Fr.) Singer

P. Maheswari, P. Madhanraj, V. Ambikapathy, P. Prakash, A. Panneerselvam, J. Biodiv. & Environ. Sci. 27(2), 90-96, August 2025.

Mangrove abundance, diversity, and productivity in effluent-rich estuarine portion of Butuanon River, Mandaue City, Cebu

John Michael B. Genterolizo, Miguelito A. Ruelan, Laarlyn N. Abalos, Kathleen Kay M. Buendia, J. Biodiv. & Environ. Sci. 27(2), 77-89, August 2025.

Cytogenetic and pathological investigations in maize × teosinte hybrids: Chromosome behaviour, spore identification, and inheritance of maydis leaf blight resistance

Krishan Pal, Ravi Kishan Soni, Devraj, Rohit Kumar Tiwari, Ram Avtar, J. Biodiv. & Environ. Sci. 27(2), 70-76, August 2025.