Reference Hub1
Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

Sherin Zafar, Samia Khan, Nida Iftekhar, Siddhartha Sankar Biswas
ISBN13: 9781522595540|ISBN10: 1522595546|ISBN13 Softcover: 9781522595557|EISBN13: 9781522595564
DOI: 10.4018/978-1-5225-9554-0.ch007
Cite Chapter Cite Chapter

MLA

Zafar, Sherin, et al. "Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET." Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., IGI Global, 2020, pp. 168-194. https://doi.org/10.4018/978-1-5225-9554-0.ch007

APA

Zafar, S., Khan, S., Iftekhar, N., & Biswas, S. S. (2020). Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET. In K. Sharma, M. Makino, G. Shrivastava, & B. Agarwal (Eds.), Forensic Investigations and Risk Management in Mobile and Wireless Communications (pp. 168-194). IGI Global. https://doi.org/10.4018/978-1-5225-9554-0.ch007

Chicago

Zafar, Sherin, et al. "Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET." In Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., 168-194. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9554-0.ch007

Export Reference

Mendeley
Favorite

Abstract

This chapter overviews and characterizes the protected steering convention in MANET, and furthermore, it discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles to different hubs, some middle hubs remove helpful data parcels and can't advance the parcel to the following hub. Some hubs may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET, which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.