Protocols for secure routing and transmission in mobile ad hoc network: a review

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamicallymovement of the nodes (mobility), limited capacity of the wireless medium and the various types...

Full description

Bibliographic Details
Main Authors: Mahdi Ahmed, Salwa Aqeel, Othman, Mohamed, Ibrahim, Hamidah, Md. Desa, Jalil, Sulaiman, Jumat
Format: Article
Language:English
Published: Science Publications 2013
Online Access:http://psasir.upm.edu.my/id/eprint/30662/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf
_version_ 1825947751831044096
author Mahdi Ahmed, Salwa Aqeel
Othman, Mohamed
Ibrahim, Hamidah
Md. Desa, Jalil
Sulaiman, Jumat
author_facet Mahdi Ahmed, Salwa Aqeel
Othman, Mohamed
Ibrahim, Hamidah
Md. Desa, Jalil
Sulaiman, Jumat
author_sort Mahdi Ahmed, Salwa Aqeel
collection UPM
description Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamicallymovement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocolis necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
first_indexed 2024-03-06T08:18:14Z
format Article
id upm.eprints-30662
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T08:18:14Z
publishDate 2013
publisher Science Publications
record_format dspace
spelling upm.eprints-306622015-10-07T07:55:40Z http://psasir.upm.edu.my/id/eprint/30662/ Protocols for secure routing and transmission in mobile ad hoc network: a review Mahdi Ahmed, Salwa Aqeel Othman, Mohamed Ibrahim, Hamidah Md. Desa, Jalil Sulaiman, Jumat Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamicallymovement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocolis necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes. Science Publications 2013-05-25 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/30662/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf Mahdi Ahmed, Salwa Aqeel and Othman, Mohamed and Ibrahim, Hamidah and Md. Desa, Jalil and Sulaiman, Jumat (2013) Protocols for secure routing and transmission in mobile ad hoc network: a review. Journal of Computer Science, 9 (5). pp. 607-619. ISSN 1549-3636; ESSN: 1552-6607 http://thescipub.com/abstract/10.3844/jcssp.2013.607.619 10.3844/jcssp.2013.607.619
spellingShingle Mahdi Ahmed, Salwa Aqeel
Othman, Mohamed
Ibrahim, Hamidah
Md. Desa, Jalil
Sulaiman, Jumat
Protocols for secure routing and transmission in mobile ad hoc network: a review
title Protocols for secure routing and transmission in mobile ad hoc network: a review
title_full Protocols for secure routing and transmission in mobile ad hoc network: a review
title_fullStr Protocols for secure routing and transmission in mobile ad hoc network: a review
title_full_unstemmed Protocols for secure routing and transmission in mobile ad hoc network: a review
title_short Protocols for secure routing and transmission in mobile ad hoc network: a review
title_sort protocols for secure routing and transmission in mobile ad hoc network a review
url http://psasir.upm.edu.my/id/eprint/30662/1/Protocols%20for%20secure%20routing%20and%20transmission%20in%20mobile%20ad%20hoc%20network.pdf
work_keys_str_mv AT mahdiahmedsalwaaqeel protocolsforsecureroutingandtransmissioninmobileadhocnetworkareview
AT othmanmohamed protocolsforsecureroutingandtransmissioninmobileadhocnetworkareview
AT ibrahimhamidah protocolsforsecureroutingandtransmissioninmobileadhocnetworkareview
AT mddesajalil protocolsforsecureroutingandtransmissioninmobileadhocnetworkareview
AT sulaimanjumat protocolsforsecureroutingandtransmissioninmobileadhocnetworkareview