Protocols for secure routing and transmission in mobile ad hoc network: a review

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types...

Full description

Saved in:
Bibliographic Details
Main Authors: Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil Md. Desa, Jumat Sulaiman
Format: Article
Language:English
Published: Science Publications 2013
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/21453/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf
https://eprints.ums.edu.my/id/eprint/21453/
https://www.doi.org/10.3844/jcssp.2013.607.619
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ums.eprints.21453
record_format eprints
spelling my.ums.eprints.214532019-03-05T04:23:02Z https://eprints.ums.edu.my/id/eprint/21453/ Protocols for secure routing and transmission in mobile ad hoc network: a review Salwa Aqeel Mahdi Mohamed Othman Hamidah Ibrahim Jalil Md. Desa Jumat Sulaiman QA Mathematics Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes. Science Publications 2013 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/21453/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf Salwa Aqeel Mahdi and Mohamed Othman and Hamidah Ibrahim and Jalil Md. Desa and Jumat Sulaiman (2013) Protocols for secure routing and transmission in mobile ad hoc network: a review. Journal of Computer Science, 9 (5). pp. 607-619. ISSN 1549-3636 https://www.doi.org/10.3844/jcssp.2013.607.619
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
topic QA Mathematics
spellingShingle QA Mathematics
Salwa Aqeel Mahdi
Mohamed Othman
Hamidah Ibrahim
Jalil Md. Desa
Jumat Sulaiman
Protocols for secure routing and transmission in mobile ad hoc network: a review
description Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
format Article
author Salwa Aqeel Mahdi
Mohamed Othman
Hamidah Ibrahim
Jalil Md. Desa
Jumat Sulaiman
author_facet Salwa Aqeel Mahdi
Mohamed Othman
Hamidah Ibrahim
Jalil Md. Desa
Jumat Sulaiman
author_sort Salwa Aqeel Mahdi
title Protocols for secure routing and transmission in mobile ad hoc network: a review
title_short Protocols for secure routing and transmission in mobile ad hoc network: a review
title_full Protocols for secure routing and transmission in mobile ad hoc network: a review
title_fullStr Protocols for secure routing and transmission in mobile ad hoc network: a review
title_full_unstemmed Protocols for secure routing and transmission in mobile ad hoc network: a review
title_sort protocols for secure routing and transmission in mobile ad hoc network: a review
publisher Science Publications
publishDate 2013
url https://eprints.ums.edu.my/id/eprint/21453/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf
https://eprints.ums.edu.my/id/eprint/21453/
https://www.doi.org/10.3844/jcssp.2013.607.619
_version_ 1760229844945207296
score 13.160551