A survery on platform of secured routing algorithm

  • Authors

    • Miss Divya
    • Dr R. Gobinath
    2018-05-07
    https://doi.org/10.14419/ijet.v7i2.26.12530
  • Ad Hoc Network, Network Security, Routing, AODV Routing Protocol
  • This paper describes the characteristics and techniques of Ad Hoc network. Ad Hoc networks are temporary network, set anywhere with-out any need of external infrastructure like wires. The essential premise of this paper is to exchange confidential message over wireless medium without route break and unauthorized eavesdroppers. In recent years, the research of routing protocol for AdHoc network has caused public concern widely. The multi hopping routing protocol has failed to meet the needs of network topology and route restructure. It must also consider the bandwidth and high error rate. The new routing protocol suitable for solving these problems in Ad Hoc network is AODV.

     

  • References

    1. [1] A. D.Wyner, “Thewire-tapchannel,â€Bell Syst.Tech. J., vol.54, no.8, pp. 1355–1387, 1975.

      [2] I. Csiszár and J. Körner, “Broadcast channels with conï¬dential messages,†IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339–348, May 1978.

      [3] R. Liu, I.Maric, P. Spasojevic, andR. D. Yates, “Discrete memory less interference and broadcast channels with conï¬dential messages: Secrecy rate regions,†IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493–2507, Jun. 2008.

      [4] G.Bagherikaram, A.S.Motahari, A.K.Khandani, “Secure-broadcasting: The secrecy rate region,†in Proc. 46th Annu. Allerton Conf. Commun., Control Comput. Sep. 2008, pp. 834–841.

      [5] A. Khisti, A. Tchamkerten, and G. Wornell, “Secure broadcasting over fading channels,†IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453–2469, Jun. 2008.

      [6] Royer, Elizabeth M., and Charles E. Perkins. "An implementation study of the AODV routing protocol." Wireless Communications and Networking Confernce, 2000.WCNC.2000 IEEE.Vol. 3. IEEE, 2000.

      [7] Bhargava, Sonali, and Dharma P. Agrawal. "Security enhancements in AODV protocol for wireless ad hoc networks." Vehicular Technology Conference, 2001. VTC 2001 fall. IEEE VTS 54th.Vol. 4. IEEE, 2001.

      [8] Gwalani, Sumit, Elizabeth M. Belding-Royer, and Charles E. Perkins. "AODV-PA: AODV with path accumulation." Communications, 2003.ICC'03.IEEE International Conference on.Vol. 1. IEEE, 2003.

      [9] Pirzada, Asad Amir, Ryan Wishart, and Marius Portmann. "Multi-linked AODV routing protocol for wireless mesh networks." Global Telecommunications Conference, 2007.GLOBECOM'07.IEEE.IEEE, 2007.

      [10] Pirzada, Asad Amir, and Marius Portmann. "High performance AODV routing protocol for hybrid wireless mesh networks." Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007.Fourth Annual International Conference on.IEEE, 2007.

      [11] Medadian, Mehdi, Mohammad HosseinYektaie, and Amir MasoudRahmani. "Combat with Black Hole Attack in AODV routing protocol in MANET." Internet, 2009.AH-ICI 2009.First Asian Himalayas International Conference on.IEEE, 2009.

      [12] Alshanyour, Ahed M., and UthmanBaroudi. "Bypass AODV: improving performance of ad hoc on-demand distance vector (AODV) routing protocol in wireless ad hoc networks." Proceedings of the first international conference on ambient media and systems. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008.

      [13] Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE transactions on vehicular technology, 58(5), 2471-2481.

      [14] Barati, Mehdi, KayvanAtefi, FarshadKhosravi, and YasharAzabDaftari. "Performance evaluation of energy consumption for AODV and DSR routing protocols in MANET." In Computer & Information Science (ICCIS), 2012 International Conference on, vol. 2, pp. 636-642.IEEE, 2012.

      [15] Liu, Sheng, Yang Yang, and Weixing Wang. "Research of AODV routing protocol for ad hoc networks1." AASRI Procedia 5 (2013): 21-31.

      [16] ZhouLidong and Zygmunt J. Haas. "Securing ad hoc networks." IEEE network 13.6 (1999) 2430.

      [17] Gupta, Piyush, and Panganmala R. Kumar. "The capacity of wireless networks." IEEE Transactions on information theory 46.2 (2000): 388-404.

      [18] Anand, Santhanakrishnan, and RajarathnamChandramouli. "On the location of an eavesdropper in multiterminal networks." IEEE Transactions on Information Forensics and Security 5, no. 1 (2010): 148-157.

      [19] Zhou, Xiangyun, and Matthew R. McKay. "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation." IEEE Transactions on Vehicular Technology 59.8 (2010): 3831-3842.

      [20] Pinto, Pedro C., João Barros, and Moe Z. Win. "Wireless secrecy in large-scale networks." Information Theory and Applications Workshop (ITA), 2011.IEEE, 2011.

      [21] Huang, Jing, and A. Lee Swindlehurst. "Robust secure transmission in MISO channels based on worst-case optimization." IEEE Transactions on Signal Processing 60.4 (2012): 1696-1707.

      [22] Chia, Yeow-Khiang, and Abbas El Gamal. "Three-receiver broadcast channels with common and confidential messages." IEEE Transactions on Information Theory 58.5 (2012): 2748-2765.

      [23] Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., &Collings, I. B. (2013). Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Transactions on Communications, 61(1), 144-154.

      [24] Ferdinand, Nuwan S., Daniel Benevides da Costa, and MattiLatva-aho. "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection." IEEE Communications Letters17.5 (2013): 864-867.

      [25] Mukherjee, A., Fakoorian, S. A. A., Huang, J., &Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550-1573.

      [26] Deepa.A, Ramkumar.S,†Active Resource and Job Allocation for Power Minimization in Mobile Cloud Systemsâ€, International Journal of Advanced Research Trends in Engineering and Technology, Vol.3 (12), pp.57-63, Mar-2016.

      [27] Sibi.V, Ramkumar.S,†Privacy Reserving in Multimedia Big Data Using Secure Data Repository Systemâ€, International Journal of Advanced Research Trends in Engineering and Technology, Vol.3 (17), pp.01-10, Mar-2016.

  • Downloads

  • How to Cite

    Divya, M., & R. Gobinath, D. (2018). A survery on platform of secured routing algorithm. International Journal of Engineering & Technology, 7(2.26), 35-39. https://doi.org/10.14419/ijet.v7i2.26.12530