•  
  •  
 

International Journal of Computer and Communication Technology

Abstract

Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This paper gives an overview of seven such secure routing protocols by presenting their characteristics and functionality along with their respective merits and drawbacks. A Comparison of these protocols is also presented based upon certain security parameters.

DOI

10.47893/IJCCT.2012.1123

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.