2015
DOI: 10.1155/2015/365863
|View full text |Cite
|
Sign up to set email alerts
|

A Study on High Secure and Efficient MANET Routing Scheme

Abstract: In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the properties of anonymity, security, authentication, nonrepudiation, and unforgeability that the previous paper achieved for ad hoc networks, but also satisfies other necessary properties such as confidentiality, traceability, and flexibility for multipaths in order to make the ad hoc environment more secure and practicab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…It means that routes are populated and maintained for only those nodes, which require sending some data to a particular destination. Reactive protocols require nodes to gather only the necessary information [21], [22].…”
Section: Reactive Routing Protocolsmentioning
confidence: 99%
“…It means that routes are populated and maintained for only those nodes, which require sending some data to a particular destination. Reactive protocols require nodes to gather only the necessary information [21], [22].…”
Section: Reactive Routing Protocolsmentioning
confidence: 99%
“…In a MANET, nodes can communicate with each other freely and dynamically through radio frequencies [1][2][3]. MANETs allow mobile users to communicate with one another when permanent infrastructure is not available or possible [4]. The routes in a MANET are frequently unable to work correctly due to external noise, transmission interference, and mobility.…”
Section: Introductionmentioning
confidence: 99%
“…Various other security schemes has been also discussed by Malhotra et al, [24], Das et al, [25], Esfandi et al, [26] and Sumathy and Kumar [27]. There are also studies carried out reviewing the existing security approaches in adhoc network (Chandan and Mishra [28], Moudini et al, [29], Wu and Liaw [30]). Neeli and Cauvery [31,32] have reviewed existing security issue as well as focused about structure for gathering the intruders by using Zombie node.…”
Section: Introductionmentioning
confidence: 99%