SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645
www.ijmer.com 2335 | Page
P. Saraswathi Devi1
, A. Veerabhadra Rao2
1
M. Tech, Sri Sai Madhavi Institute of Science & Technology, A.P., India
2
Asst. Professor, Dept. of CSE, Sri Sai Madhavi Institute of Science & Technology, A.P., India
ABSTRACT: A mobile ad hoc wireless network (MANET) consists of a number of wireless mobile nodes that are capable of
communicating with each other without the use of a network infrastructure or any centralized administration. In such a
network, each mobile node operates not only as a host but also as a router, forwarding packets for other nodes that may not
be within the direct wireless transmission range. Thus, nodes must discover and maintain routes to all other nodes. Due to
the mobility of the nodes, routers for MANETs need to be dynamically renovated to reflect the changes in topology.
Therefore, the design of the routing protocols for such networks is more challenging than that for wired networks. The
MANETs are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, we need to
pay more attention to the security issues regarding routing protocols in the MANETs. This paper presents the study of three
secure efficient ad hoc routing protocols for MANETs- SEAD, I- SEAD and SEAD- FHC.
KEYWORDS: HASH value, MANET, SEAD, TESLA.
I. INTRODUCTION
In recent years, the explosive growth of mobile computing devices, which mainly include personal digital assistants
(PDAs), laptops and handheld digital devices, has impelled a revolutionary change in the computing world- computing will
not merely rely on the capability provided by the personal computers, and the concept of ubiquitous computing emerges and
becomes one of the research hotspots in the computer science society [1]. In the ubiquitous computing environment, the
individual users utilize, at the same time, several electronic platforms through which they can access all the required
information whenever and wherever they may be [2]. The nature of the ubiquitous computing has made it necessary to adopt
the wireless network as the interconnection method- it is not possible for the ubiquitous devices to get wired network link
whenever and wherever they need to connect with other ubiquitous devices. The Mobile Ad Hoc Network(MANET) is one
of the wireless networks that have attracted most concentrations from many researchers.
A MANET is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network
topologies. People and vehicles can thus be internetworked in the areas without a preexisting communication infrastructure
or when the use of such infrastructure requires wireless extension [3]. In the MANET, nodes can directly communicate with
all the other nodes within their radio ranges; whereas nodes that not in the direct communication range use intermediate
nodes to communicate with each other. In these two situations, all the nodes that have participated in the communication
automatically form a wireless network; therefore this kind of formed wireless network can be viewed as mobile ad hoc
network. The MANET has the following typical features [4]:
 Unreliability of wireless links between the nodes. Because of the limited energy supply for the wireless nodes and the
mobility of the nodes, the wireless links between the mobile nodes in the ad hoc network are not consistent for the
communication participants.
 Constantly changing topology: Due to the continuous motion of the nodes, the topology of the mobile ad hoc network
changes constantly- the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc
network, and the routing information will be changing all the time because of the movement of the nodes.
 Lack of incorporation of security features in statically configured wireless routing protocols not meant for the ad hoc
environments. Because the topology of the ad hoc networks is changing constantly, then it is necessary for each pair of
adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of
vulnerabilities in the statically configured routing protocol.
Because of the features listed above, the MANET are more prone to suffer from the malicious behaviors than the
traditional wired networks. Therefore, we need to paymore attention to the security issues regarding routing protocols in the
mobile ad hoc networks.
II. ATTACKS AND SECURITY MECHANISMS IN MANETS
A. Attacks in MANETs: MANETs are more easily attacked than a wired network. The attacks prevalent on
MANET routing protocols can be broadly classified into passive and active attacks[5]. There are two classifications of
attacks in the MANETs.
 Active attack: In order to perform some harmful operations, the misbehaving node has to bear some energy costs are
known as active attacks.
 Passive Attacks: Passive attack is mainly about lack of the cooperation with the purpose of energy saving. Nodes that
perform the active attacks with the aim of damaging other nodes by causing network outage are considered to be
malicious while nodes that perform passive attacks with the aim of saving battery life for their own communications are
considered to be selfish.
A Study of Secure Efficient Ad hoc Distance Vector Routing
Protocols for MANETs
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645
www.ijmer.com 2336 | Page
B. Security mechanisms for MANETs: Message encryption and digital signatures are two important mechanisms
for data integrity and the user authentication. There are two types of data encryption mechanisms, called symmetric and
asymmetric (or public key) mechanisms. Symmetric cryptosystems use the same secret key for encryption and decryption of
a message, and asymmetric cryptosystems use one key, called the public key, to encrypt a message and another key, called
the private key to decrypt it. Public and private keys are related in such a way that only the public key can be used to encrypt
messages and only the corresponding private key can be used for decryption process. Even if the attacker comprises a public
key, it is virtually impossible to deduce the private key. Any code attached to the electronically transmitted message that
uniquely identifies the sender is known as digital code. Digital signatures are the key component of most authentication
schemes. To be effective, the digital signatures must be non-forgeable.
Hash functions are used in creation and verification of the digital signature. It is an algorithm which creates a digital
representation or a fingerprint in the form of a hash value (or hash result) of a standard length which is usually much smaller
than the message and unique to it. Any change to the original message will produce a different hash result even when the
same hash function is used. In the case of a secure hash function, also known as the one-way hash function, it is
computationally infeasible to derive the original message from knowledge of its hash value. In MANETs, the secrecy of the
key does not ensure the integrity of the message. For this purpose, message Authentication Codes (MAC) [6] are used. It is a
hashed representation of the message and even if MAC is known, it is impractical to compute the message that generated it.
A MAC, which is a cryptographic checksum, is computed by the message initiator as the function of the secret key and the
message being transmitted and it is appended to the message. The recipient recomputes the MAC in the similar fashion upon
receiving the message. If the MAC computed by the receiver matches with the MAC received then the recipient is assured
that the message was not modified.
III. SECURE EFFICIENT ROUTING PROTOCOLS
A. SEAD Protocol: The Secure and Efficient Ad hoc Distance vector routing protocol (SEAD) [7] is based upon the
DSDV [8] routing protocol. It uses efficient one-way hash functions to authenticate the lower bound of the distance metric
and the sequence number in the routing table. More specifically, for authenticating a particular sequence number and the
metric, the node generates a random initial value x Є

)1,0( where  is the length in bits of the output of the hash
function, and computes the list of values h0,h1,h2,h3,…,hn, where h0=x , and hi = H(hi-1) for 0< i ≤ n , for some value n. As
an example, given an authenticated hi value, the node can authenticate hi-3 by computing H (H (H(hi-3))) and verifying that
the resulting value equals hi. Each node uses one authentic element of the hash chain in each of the routing update it sends
about itself with metric 0. This enables the authentication process for the lower bound of the metric in other routing updates
for that node. The use of the hash value corresponding to sequence number and metric in a routing update entry prevents any
node from advertising a route greater than the destination’s own current sequence number.
The receiving node authenticates the route update by applying the hash function according to the prior authentic
hash value obtained and then compares it with the hash value in the routing update message. The update message is authentic
if both the values match. The source must be authenticated using some kind of the broadcast authentication mechanism such
as TESLA [9]. Apart from the hash functions used, SEAD protocol doesn’t use average settling time for sending triggered
updates as in DSDV in order to prevent eavesdropping from neighboring nodes.
The advantage of using SEAD protocol is that it is robust against multiple uncoordinated attackers, active attackers
or compromised nodes. It uses efficient, inexpensive cryptographic primitives and this plays an important role in the
computation and bandwidth-constrained nodes. The disadvantages of SEAD is that it doesn’t provide a way to prevent an
attacker from tampering with “next hop” or “destination” columns. Instead, it relies on doing neighbor authentication, which
is a bad thing. Hash chains are consumed very fast, either new h
n
needs to be released very often and the hash chain has to be
rather long.
B. I- SEAD Protocol: In SEAD protocol, the nodes exchange their routing tables periodically and broadcast their hash
value to their neighbors, so that the neighbors can verify the correctness of the value by using one way hash function.
Because of the periodic and triggered updating, SEAD protocol increases the routing overhead significantly. In I-SEAD
protocol [10], it can let the neighbors check the correctness of the hash value and reduce the routing overhead. We describe
the procedure as follows: When the start node sends the route request(RREQ), it randomly chooses a number as a seed. The
start node computes a list of values with the seed. Before sending the route request message, the start node computes its
MAC value by its TESLA key to protect its hash value. Each node can verify the received value after a certain period of
time. For example, given an authenticated ih value, a node can authenticate 3ih by computing H(H (H ( 3ih ))) and
verifying that the resulting value equals ih as in the SEAD protocol.
C. SEAD Fixed Hash Chain Protocol: The SEAD protocol uses one-way hash chains to prevent an attacker from
forging better metrics or sequence numbers. But SEAD protocol does not prevent an attacker from tampering other fields or
from using the learned metric and sequence number to send new routing updates. The Secure Efficient Ad hoc Distance
Vector with fixed hash chain length(SEAD-FHC) protocol[11] is used to minimize and stabilize the computational
complexity that leads minimization in delay time and maximization in throughput.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645
www.ijmer.com 2337 | Page
The SEAD- FHC protocol is explained as follows: SEAD- FHC authenticates packets that are transmitted serially in
the given network. A current password is selected for the current packet to be transmitted. Cp Includes current data Cd . A
secure hash function )(hf is applied to the Cpw current password to form a current tag Ct . A password npw is selected
for a packet np that is in sequence and allows Cp , which includes data nd , and )(hf is applied to npw to form a tag
nt . )(hf is then applied to the nd , nt and Cpw to obtain a hashed value CH . Cp is then transmitted that includes the
CH , Cd , Ct and password ppw of packet pp that sent before Cp in sequence to authenticate Cd .
IV. COMPARATIVE STUDY
We summarize the various secure routing protocols that have been explained in section III. We consider various
attributes and comment on these attributes with respect the each of the protocol discussed above. The following Table 1
presents the comparative study on various security parameters and security attacks.
Table 1: Comparative study of protocols
Performance
parameters
SEAD I- SEAD SEAD- FHC
Base Protocol DSDV DSDV DSR
Encryption
Algorithm
Symmetric Symmetric Symmetric
Synchronization Yes Yes Yes
Integrity No Yes Yes
Nonrepudiation No No No
Authentication Yes Yes Yes
Confidentiality No No Yes
DoS Attacks
prevention
Yes Yes Yes
V. CONCLUSION
SEAD is a proactive routing protocol based on DSDV protocol. It does not rely on the asymmetric encryption
primitive but instead it relies on one-way hash chain for security. The basic idea of SEAD protocol is, to authenticate the
sequence number and metric of a routing table update message using hash chains elements. In SEAD protocol, the nodes
exchange their routing tables periodically and broadcast their hash value to their neighbors, so that the neighbors can verify
the correctness of the value by using one way hash function. Because of the periodic and triggered updating, SEAD protocol
increases the routing overhead significantly. In I-SEAD protocol [10], it can let the neighbors check the correctness of the
hash value and reduce the routing overhead. The Secure Efficient Ad hoc Distance Vector with fixed hash chain
length(SEAD-FHC) protocol is used to minimize and stabilize the computational complexity that leads minimization in
delay time and maximization in throughput.
REFERENCES
[1]. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks
(Chapter 1), CRC Press LLC, 2003.
[2]. M. Weiser, The Computer for the Twenty-First Century, Scientific American, September 1991.
[3]. M.S. Corson, J.P. Maker, and J.H. Cernicione, Internet-based Mobile Ad Hoc Networking, IEEE Internet Computing, pages 63–70,
July-August 1999.
[4]. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless
Networks (Chapter 30), CRC Press LLC, 2003.
[5]. C.Siva Ram Murthy and B. S. Manoj. “Ad hoc wireless networks: Architecture and Protocols”. Prentice Hall Publishers, May 2004,
ISBN 013147023X.
[6]. Zapata, M., “Secure Ad hoc On-Demand Distance Vector Routing.,” ACM Mobile Computing and Communications Review
(MCZR), Vol. 6. No. 3, July 2002, pp. 106-107. pp. 1516-1521
[7]. Y. C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc
Networks,” Ad Hoc Networks Journal, 1, 2003
[8]. C Perkins and P. Bhagwat, “Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers”, ACM
SIGCOMM, (October 1994).
[9]. William Stallings. “Network Security essentials: Application and Standards”, Pearson Education , Inc 2003, ISBN 0130351288.
[10]. Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu, Yen-Lin Huang, Mei-Chun Chou, “I-SEAD: A Secure Routing Protocol for Mobile
Ad Hoc Networks”, pages 45- 54, International Journal of Multimedia Ubiquitous Engineering Vol. 3, No. 4, October, 2008.
[11]. Prasuna V G, Dr. S. Madhusudhana Verma, “SEAD-FHC: Secure Efficient Distance Vector Routing with Fixed Hash Chain
length”, Global Journal of Computer Science and Technology Volume 11 Issue 20 Version 1.0 December 2011.

Contenu connexe

Tendances

Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043Selva Raj
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSIRJET Journal
 
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
 

Tendances (19)

E0392031034
E0392031034E0392031034
E0392031034
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
ant2
ant2ant2
ant2
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
IJMNDI.2015.069218
IJMNDI.2015.069218IJMNDI.2015.069218
IJMNDI.2015.069218
 
Ant
AntAnt
Ant
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 

En vedette

Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...
Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...
Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...IJMER
 
Regression analysis of shot peening process for performance characteristics o...
Regression analysis of shot peening process for performance characteristics o...Regression analysis of shot peening process for performance characteristics o...
Regression analysis of shot peening process for performance characteristics o...IJMER
 
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...IJMER
 
A Threshold fuzzy entropy based feature selection method applied in various b...
A Threshold fuzzy entropy based feature selection method applied in various b...A Threshold fuzzy entropy based feature selection method applied in various b...
A Threshold fuzzy entropy based feature selection method applied in various b...IJMER
 
Development of Web-Based Courseware for Van Hiele’s Visualization Level
Development of Web-Based Courseware for Van Hiele’s Visualization LevelDevelopment of Web-Based Courseware for Van Hiele’s Visualization Level
Development of Web-Based Courseware for Van Hiele’s Visualization LevelIJMER
 
Ag32637641
Ag32637641Ag32637641
Ag32637641IJMER
 
Bi31199203
Bi31199203Bi31199203
Bi31199203IJMER
 
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...IJMER
 
B02414541458
B02414541458B02414541458
B02414541458IJMER
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Area Efficient and high-speed fir filter implementation using divided LUT method
Area Efficient and high-speed fir filter implementation using divided LUT methodArea Efficient and high-speed fir filter implementation using divided LUT method
Area Efficient and high-speed fir filter implementation using divided LUT methodIJMER
 
Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentationE-gama
 
Optimized CAM Design
Optimized CAM DesignOptimized CAM Design
Optimized CAM DesignIJMER
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...IJMER
 
Punching Shear Strength of High Strength Fibre Reinforced Concrete Slabs
Punching Shear Strength of High Strength Fibre Reinforced  Concrete SlabsPunching Shear Strength of High Strength Fibre Reinforced  Concrete Slabs
Punching Shear Strength of High Strength Fibre Reinforced Concrete SlabsIJMER
 
Cg31350353
Cg31350353Cg31350353
Cg31350353IJMER
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
 

En vedette (20)

Introduction seemas
Introduction seemasIntroduction seemas
Introduction seemas
 
Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...
Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...
Analysis of a Batch Arrival and Batch Service Queuing System with Multiple Va...
 
Regression analysis of shot peening process for performance characteristics o...
Regression analysis of shot peening process for performance characteristics o...Regression analysis of shot peening process for performance characteristics o...
Regression analysis of shot peening process for performance characteristics o...
 
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
 
A Threshold fuzzy entropy based feature selection method applied in various b...
A Threshold fuzzy entropy based feature selection method applied in various b...A Threshold fuzzy entropy based feature selection method applied in various b...
A Threshold fuzzy entropy based feature selection method applied in various b...
 
Development of Web-Based Courseware for Van Hiele’s Visualization Level
Development of Web-Based Courseware for Van Hiele’s Visualization LevelDevelopment of Web-Based Courseware for Van Hiele’s Visualization Level
Development of Web-Based Courseware for Van Hiele’s Visualization Level
 
Ag32637641
Ag32637641Ag32637641
Ag32637641
 
Bi31199203
Bi31199203Bi31199203
Bi31199203
 
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...
A High Performance PWM Voltage Source Inverter Used for VAR Compensation and ...
 
B02414541458
B02414541458B02414541458
B02414541458
 
Sistema contra fuego usg tablaroca
Sistema contra fuego usg tablarocaSistema contra fuego usg tablaroca
Sistema contra fuego usg tablaroca
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Sat words week 1
Sat words week 1 Sat words week 1
Sat words week 1
 
Area Efficient and high-speed fir filter implementation using divided LUT method
Area Efficient and high-speed fir filter implementation using divided LUT methodArea Efficient and high-speed fir filter implementation using divided LUT method
Area Efficient and high-speed fir filter implementation using divided LUT method
 
Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentation
 
Optimized CAM Design
Optimized CAM DesignOptimized CAM Design
Optimized CAM Design
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
 
Punching Shear Strength of High Strength Fibre Reinforced Concrete Slabs
Punching Shear Strength of High Strength Fibre Reinforced  Concrete SlabsPunching Shear Strength of High Strength Fibre Reinforced  Concrete Slabs
Punching Shear Strength of High Strength Fibre Reinforced Concrete Slabs
 
Cg31350353
Cg31350353Cg31350353
Cg31350353
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
 

Similaire à A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs

Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Editor IJARCET
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 

Similaire à A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs (20)

Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 

Plus de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Plus de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Dernier

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645 www.ijmer.com 2335 | Page P. Saraswathi Devi1 , A. Veerabhadra Rao2 1 M. Tech, Sri Sai Madhavi Institute of Science & Technology, A.P., India 2 Asst. Professor, Dept. of CSE, Sri Sai Madhavi Institute of Science & Technology, A.P., India ABSTRACT: A mobile ad hoc wireless network (MANET) consists of a number of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. In such a network, each mobile node operates not only as a host but also as a router, forwarding packets for other nodes that may not be within the direct wireless transmission range. Thus, nodes must discover and maintain routes to all other nodes. Due to the mobility of the nodes, routers for MANETs need to be dynamically renovated to reflect the changes in topology. Therefore, the design of the routing protocols for such networks is more challenging than that for wired networks. The MANETs are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, we need to pay more attention to the security issues regarding routing protocols in the MANETs. This paper presents the study of three secure efficient ad hoc routing protocols for MANETs- SEAD, I- SEAD and SEAD- FHC. KEYWORDS: HASH value, MANET, SEAD, TESLA. I. INTRODUCTION In recent years, the explosive growth of mobile computing devices, which mainly include personal digital assistants (PDAs), laptops and handheld digital devices, has impelled a revolutionary change in the computing world- computing will not merely rely on the capability provided by the personal computers, and the concept of ubiquitous computing emerges and becomes one of the research hotspots in the computer science society [1]. In the ubiquitous computing environment, the individual users utilize, at the same time, several electronic platforms through which they can access all the required information whenever and wherever they may be [2]. The nature of the ubiquitous computing has made it necessary to adopt the wireless network as the interconnection method- it is not possible for the ubiquitous devices to get wired network link whenever and wherever they need to connect with other ubiquitous devices. The Mobile Ad Hoc Network(MANET) is one of the wireless networks that have attracted most concentrations from many researchers. A MANET is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in the areas without a preexisting communication infrastructure or when the use of such infrastructure requires wireless extension [3]. In the MANET, nodes can directly communicate with all the other nodes within their radio ranges; whereas nodes that not in the direct communication range use intermediate nodes to communicate with each other. In these two situations, all the nodes that have participated in the communication automatically form a wireless network; therefore this kind of formed wireless network can be viewed as mobile ad hoc network. The MANET has the following typical features [4]:  Unreliability of wireless links between the nodes. Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between the mobile nodes in the ad hoc network are not consistent for the communication participants.  Constantly changing topology: Due to the continuous motion of the nodes, the topology of the mobile ad hoc network changes constantly- the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes.  Lack of incorporation of security features in statically configured wireless routing protocols not meant for the ad hoc environments. Because the topology of the ad hoc networks is changing constantly, then it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol. Because of the features listed above, the MANET are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, we need to paymore attention to the security issues regarding routing protocols in the mobile ad hoc networks. II. ATTACKS AND SECURITY MECHANISMS IN MANETS A. Attacks in MANETs: MANETs are more easily attacked than a wired network. The attacks prevalent on MANET routing protocols can be broadly classified into passive and active attacks[5]. There are two classifications of attacks in the MANETs.  Active attack: In order to perform some harmful operations, the misbehaving node has to bear some energy costs are known as active attacks.  Passive Attacks: Passive attack is mainly about lack of the cooperation with the purpose of energy saving. Nodes that perform the active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious while nodes that perform passive attacks with the aim of saving battery life for their own communications are considered to be selfish. A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645 www.ijmer.com 2336 | Page B. Security mechanisms for MANETs: Message encryption and digital signatures are two important mechanisms for data integrity and the user authentication. There are two types of data encryption mechanisms, called symmetric and asymmetric (or public key) mechanisms. Symmetric cryptosystems use the same secret key for encryption and decryption of a message, and asymmetric cryptosystems use one key, called the public key, to encrypt a message and another key, called the private key to decrypt it. Public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used for decryption process. Even if the attacker comprises a public key, it is virtually impossible to deduce the private key. Any code attached to the electronically transmitted message that uniquely identifies the sender is known as digital code. Digital signatures are the key component of most authentication schemes. To be effective, the digital signatures must be non-forgeable. Hash functions are used in creation and verification of the digital signature. It is an algorithm which creates a digital representation or a fingerprint in the form of a hash value (or hash result) of a standard length which is usually much smaller than the message and unique to it. Any change to the original message will produce a different hash result even when the same hash function is used. In the case of a secure hash function, also known as the one-way hash function, it is computationally infeasible to derive the original message from knowledge of its hash value. In MANETs, the secrecy of the key does not ensure the integrity of the message. For this purpose, message Authentication Codes (MAC) [6] are used. It is a hashed representation of the message and even if MAC is known, it is impractical to compute the message that generated it. A MAC, which is a cryptographic checksum, is computed by the message initiator as the function of the secret key and the message being transmitted and it is appended to the message. The recipient recomputes the MAC in the similar fashion upon receiving the message. If the MAC computed by the receiver matches with the MAC received then the recipient is assured that the message was not modified. III. SECURE EFFICIENT ROUTING PROTOCOLS A. SEAD Protocol: The Secure and Efficient Ad hoc Distance vector routing protocol (SEAD) [7] is based upon the DSDV [8] routing protocol. It uses efficient one-way hash functions to authenticate the lower bound of the distance metric and the sequence number in the routing table. More specifically, for authenticating a particular sequence number and the metric, the node generates a random initial value x Є  )1,0( where  is the length in bits of the output of the hash function, and computes the list of values h0,h1,h2,h3,…,hn, where h0=x , and hi = H(hi-1) for 0< i ≤ n , for some value n. As an example, given an authenticated hi value, the node can authenticate hi-3 by computing H (H (H(hi-3))) and verifying that the resulting value equals hi. Each node uses one authentic element of the hash chain in each of the routing update it sends about itself with metric 0. This enables the authentication process for the lower bound of the metric in other routing updates for that node. The use of the hash value corresponding to sequence number and metric in a routing update entry prevents any node from advertising a route greater than the destination’s own current sequence number. The receiving node authenticates the route update by applying the hash function according to the prior authentic hash value obtained and then compares it with the hash value in the routing update message. The update message is authentic if both the values match. The source must be authenticated using some kind of the broadcast authentication mechanism such as TESLA [9]. Apart from the hash functions used, SEAD protocol doesn’t use average settling time for sending triggered updates as in DSDV in order to prevent eavesdropping from neighboring nodes. The advantage of using SEAD protocol is that it is robust against multiple uncoordinated attackers, active attackers or compromised nodes. It uses efficient, inexpensive cryptographic primitives and this plays an important role in the computation and bandwidth-constrained nodes. The disadvantages of SEAD is that it doesn’t provide a way to prevent an attacker from tampering with “next hop” or “destination” columns. Instead, it relies on doing neighbor authentication, which is a bad thing. Hash chains are consumed very fast, either new h n needs to be released very often and the hash chain has to be rather long. B. I- SEAD Protocol: In SEAD protocol, the nodes exchange their routing tables periodically and broadcast their hash value to their neighbors, so that the neighbors can verify the correctness of the value by using one way hash function. Because of the periodic and triggered updating, SEAD protocol increases the routing overhead significantly. In I-SEAD protocol [10], it can let the neighbors check the correctness of the hash value and reduce the routing overhead. We describe the procedure as follows: When the start node sends the route request(RREQ), it randomly chooses a number as a seed. The start node computes a list of values with the seed. Before sending the route request message, the start node computes its MAC value by its TESLA key to protect its hash value. Each node can verify the received value after a certain period of time. For example, given an authenticated ih value, a node can authenticate 3ih by computing H(H (H ( 3ih ))) and verifying that the resulting value equals ih as in the SEAD protocol. C. SEAD Fixed Hash Chain Protocol: The SEAD protocol uses one-way hash chains to prevent an attacker from forging better metrics or sequence numbers. But SEAD protocol does not prevent an attacker from tampering other fields or from using the learned metric and sequence number to send new routing updates. The Secure Efficient Ad hoc Distance Vector with fixed hash chain length(SEAD-FHC) protocol[11] is used to minimize and stabilize the computational complexity that leads minimization in delay time and maximization in throughput.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2335-2337 ISSN: 2249-6645 www.ijmer.com 2337 | Page The SEAD- FHC protocol is explained as follows: SEAD- FHC authenticates packets that are transmitted serially in the given network. A current password is selected for the current packet to be transmitted. Cp Includes current data Cd . A secure hash function )(hf is applied to the Cpw current password to form a current tag Ct . A password npw is selected for a packet np that is in sequence and allows Cp , which includes data nd , and )(hf is applied to npw to form a tag nt . )(hf is then applied to the nd , nt and Cpw to obtain a hashed value CH . Cp is then transmitted that includes the CH , Cd , Ct and password ppw of packet pp that sent before Cp in sequence to authenticate Cd . IV. COMPARATIVE STUDY We summarize the various secure routing protocols that have been explained in section III. We consider various attributes and comment on these attributes with respect the each of the protocol discussed above. The following Table 1 presents the comparative study on various security parameters and security attacks. Table 1: Comparative study of protocols Performance parameters SEAD I- SEAD SEAD- FHC Base Protocol DSDV DSDV DSR Encryption Algorithm Symmetric Symmetric Symmetric Synchronization Yes Yes Yes Integrity No Yes Yes Nonrepudiation No No No Authentication Yes Yes Yes Confidentiality No No Yes DoS Attacks prevention Yes Yes Yes V. CONCLUSION SEAD is a proactive routing protocol based on DSDV protocol. It does not rely on the asymmetric encryption primitive but instead it relies on one-way hash chain for security. The basic idea of SEAD protocol is, to authenticate the sequence number and metric of a routing table update message using hash chains elements. In SEAD protocol, the nodes exchange their routing tables periodically and broadcast their hash value to their neighbors, so that the neighbors can verify the correctness of the value by using one way hash function. Because of the periodic and triggered updating, SEAD protocol increases the routing overhead significantly. In I-SEAD protocol [10], it can let the neighbors check the correctness of the hash value and reduce the routing overhead. The Secure Efficient Ad hoc Distance Vector with fixed hash chain length(SEAD-FHC) protocol is used to minimize and stabilize the computational complexity that leads minimization in delay time and maximization in throughput. REFERENCES [1]. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003. [2]. M. Weiser, The Computer for the Twenty-First Century, Scientific American, September 1991. [3]. M.S. Corson, J.P. Maker, and J.H. Cernicione, Internet-based Mobile Ad Hoc Networking, IEEE Internet Computing, pages 63–70, July-August 1999. [4]. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003. [5]. C.Siva Ram Murthy and B. S. Manoj. “Ad hoc wireless networks: Architecture and Protocols”. Prentice Hall Publishers, May 2004, ISBN 013147023X. [6]. Zapata, M., “Secure Ad hoc On-Demand Distance Vector Routing.,” ACM Mobile Computing and Communications Review (MCZR), Vol. 6. No. 3, July 2002, pp. 106-107. pp. 1516-1521 [7]. Y. C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Ad Hoc Networks Journal, 1, 2003 [8]. C Perkins and P. Bhagwat, “Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers”, ACM SIGCOMM, (October 1994). [9]. William Stallings. “Network Security essentials: Application and Standards”, Pearson Education , Inc 2003, ISBN 0130351288. [10]. Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu, Yen-Lin Huang, Mei-Chun Chou, “I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks”, pages 45- 54, International Journal of Multimedia Ubiquitous Engineering Vol. 3, No. 4, October, 2008. [11]. Prasuna V G, Dr. S. Madhusudhana Verma, “SEAD-FHC: Secure Efficient Distance Vector Routing with Fixed Hash Chain length”, Global Journal of Computer Science and Technology Volume 11 Issue 20 Version 1.0 December 2011.