The Open UniversitySkip to content
 

Routing Security in Mobile Ad-hoc Networks

Karlsson, Jonny; Dooley, Laurence S. and Pulkkis, Goran (2012). Routing Security in Mobile Ad-hoc Networks. In: Informing Science and Information Technology Education 2012 Conference (InSITE’12), 22-27 June 2012, Montreal, Canada (Forthcoming).

Full text available as:
[img]
Preview
PDF (Version of Record) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (111Kb)
URL: http://www.informingscience.us/icarus/conferences/...
Google Scholar: Look up in Google Scholar

Abstract

The role of infrastructure-less mobile ad hoc networks (MANETs) in ubiquitous networks is outlined. In a MANET there are no dedicated routers and all network nodes must contribute to routing. Classification of routing protocols for MANET is based on how routing information is acquired and maintained by mobile nodes and/or on roles of network nodes in a routing. According to the first classification base, MANET routing protocols are proactive, reactive, or hybrid combinations of proactive and reactive protocols. According to the role-based classification, MANET routing protocols are either uniform when all network nodes have the same role or non-uniform when the roles are different and dedicated. A contemporary review of MANET routing protocols is briefly presented. Security attacks against MANET routing can be passive and or active. The purpose of the former is information retrieval, for example network traffic monitoring, while the latter is performed by malicious nodes with the express intention of disturbing, modifying or interrupting MANET routing. An overview of active attacks based on modification, impersonation/ spoofing, fabrication, wormhole, and selfish behavior is presented. The importance of cryptography and trust in secure MANET routing is also outlined, with relevant security extensions of existing routing protocols for MANETs described and assessed. A comparison of existing secure routing protocols form the main contribution in this paper, while some future research challenges in secure MANET routing are discussed.

Item Type: Conference Item
Copyright Holders: 2012 Informing Science Institute
Extra Information: Issues in Informing Science and Information Technology (2012) Vol. 9, pp. 369-383
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Mathematics, Computing and Technology
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Related URLs:
Item ID: 33139
Depositing User: Laurence Dooley
Date Deposited: 08 May 2012 09:43
Last Modified: 14 May 2016 13:20
URI: http://oro.open.ac.uk/id/eprint/33139
Share this page:

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

▼ Automated document suggestions from open access sources

Actions (login may be required)

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340   general-enquiries@open.ac.uk