Security Aware Routing Protocols for Mobile Ad hoc Networks

Security Aware Routing Protocols for Mobile Ad hoc Networks

M.S. Ali (Prof Ram Meghe College of Engineering & Management, India) and P.M. Jawandhiya (Jawaharlal Darda Institute of Engineering & Technology,India)
DOI: 10.4018/978-1-4666-0321-9.ch016


An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt ad hoc networking for commercial user; however, their main applications lie in military, tactical, and other security-sensitive operations. In these and other applications of ad hoc networking, secure routing is an important issue. Designing a foolproof security protocol for ad hoc network is a challenging task due to its unique characteristics, such as lack of central authority, frequent topology changes, rapid node mobility, shared radio channel, and limited availability of resources. A number of protocols have been proposed for secure routing. However, most of these protocols are either proactive or reactive in approach. Both the approaches have their own limitations; for example, the proactive protocols use excess bandwidth in maintaining the routing information, while the reactive ones have long route request delay.
Chapter Preview

1.2 Routing In Manets

Routing in mobile ad hoc networks faces additional problems and challenges when compared to routing in traditional wired networks with fixed infrastructure. There are several well known protocols (A. K. Verma, Mayank Dave and R C Joshi,IJSCI) in the literature that have been specifically developed to cope with the limitations imposed by ad hoc networking environments. The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth and high error rates (E. M Royer, C. K Toh, 2007). Most of the existing routing protocols follow two different design approaches to confront the inherent characteristics of ad hoc networks, namely the table-driven and the source-initiated on-demand approaches.

The following sections analyze in more detail these two design approaches, and briefly present example protocols that are based on them.

Complete Chapter List

Search this Book: