Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

Sherin Zafar, Samia Khan, Nida Iftekhar, Siddhartha Sankar Biswas
DOI: 10.4018/978-1-5225-9554-0.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter overviews and characterizes the protected steering convention in MANET, and furthermore, it discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles to different hubs, some middle hubs remove helpful data parcels and can't advance the parcel to the following hub. Some hubs may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET, which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending.
Chapter Preview
Top

Introduction

Versatile ad-hoc arrangement or Mobile Ad-hoc Network (MANET) is a self-designing, multi jump remote system. Security in these types of systems leads to a major test as there is no specified methodology and protocol to regulate the working of individual hubs across the system. Various specific assaults emerge in and out of the system which damages the whole scenario performance. This chapter overviews and characterizes the protected steering convention in MANET, and furthermore discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles, to different hubs, some middle hub remove helpful data parcels and can't advance the parcel to the following hub. Some hub may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending. So this chapter will focus in detail the various assaults that are faced by traditional routing protocols of MANET which will help the researchers towards understanding various concepts of security, anonymity, dependability, thefts and forensics.

Protocols in MANET should have extremely high potentiality owing to the integration of two radically different schemes, proactive and reactive in such a way that a balance between control overhead and latency is achieved. Performance of various protocols is impacted by various network conditions such as zone radius, network size, mobility etc. The research chapter focuses on various secure routing protocols of MANET and the various vulnerabilities present like; amount of reactive traffic which is primarily responsible for degraded network performance in case of large networks. Various protocols are designed in a way such that the zone radius of the network remains unaffected whilst achieving better QOS performance along with efficient memory utilization Secure algorithms are designed not only to balance the amount of proactive and reactive traffic without increasing the zone radius but also to perform conglomeration of routes in an central administrator and then applying various approaches to maintain a balance between routing methodologies and security apprehensions. This chapter focuses on various routing protocols for reducing the routing overhead and help achieve performance optimization under varying node size and mobility. The secured approaches are focussed towards QOS improvement in MANET through various neoteric approaches that deals with routing issues and henceforth provides optimized QOS parameters. Today in the technological advancement stage it is important that MANET should be specified with both routing optimizations and security attacks avoidance in order to boost their real time performance. MANET is now combined with big data analysis, Internet of things (IOT), Machine Learning and Deep learning parameters to expand its performance in various extreme and emergency situations. The book chapter analysis on various routing, security and other apprehensions occurring in secured MANET protocols. The book chapter provides an in-depth analysis on various routing and security apprehensions occurring in secured MANET protocols. The upcoming sections of this chapter provides discussions on major security goals and attacks in MANET in section 2, followed by detailed analysis of various routing protocols; Authenticated Routing for Ad-hoc Network (ARAN) protocol in section 3, Security Aware Routing (SAR) protocol in section 4, Secure Routing Protocol (SRP) in section 5, Secure Efficient Ad-hoc Distance Vector (SEAD) routing in section 6, A Secure On-Demand Routing Protocol for Ad-hoc Networks (ARIADNE) in section 7, Secure Link State Routing Protocol (SLSP) in section 8, Secure Ad-hoc On-Demand Distance Vector (SAODV) routing protocol in section 9 and Byzantine algorithm in section 10. Section 11 provides a comparison analysis of secure routing protocols of MANET followed by Conclusions in section 12 amd references in the end.

Complete Chapter List

Search this Book:
Reset