Reference Hub2
Security Aware Routing Protocols for Mobile Ad hoc Networks

Security Aware Routing Protocols for Mobile Ad hoc Networks

M.S. Ali, P.M. Jawandhiya
ISBN13: 9781466603219|ISBN10: 1466603216|EISBN13: 9781466603226
DOI: 10.4018/978-1-4666-0321-9.ch016
Cite Chapter Cite Chapter

MLA

Ali, M.S., and P.M. Jawandhiya. "Security Aware Routing Protocols for Mobile Ad hoc Networks." Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends, edited by Kamaljit I. Lakhtaria, IGI Global, 2012, pp. 264-289. https://doi.org/10.4018/978-1-4666-0321-9.ch016

APA

Ali, M. & Jawandhiya, P. (2012). Security Aware Routing Protocols for Mobile Ad hoc Networks. In K. Lakhtaria (Ed.), Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends (pp. 264-289). IGI Global. https://doi.org/10.4018/978-1-4666-0321-9.ch016

Chicago

Ali, M.S., and P.M. Jawandhiya. "Security Aware Routing Protocols for Mobile Ad hoc Networks." In Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends, edited by Kamaljit I. Lakhtaria, 264-289. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0321-9.ch016

Export Reference

Mendeley
Favorite

Abstract

An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt ad hoc networking for commercial user; however, their main applications lie in military, tactical, and other security-sensitive operations. In these and other applications of ad hoc networking, secure routing is an important issue. Designing a foolproof security protocol for ad hoc network is a challenging task due to its unique characteristics, such as lack of central authority, frequent topology changes, rapid node mobility, shared radio channel, and limited availability of resources. A number of protocols have been proposed for secure routing. However, most of these protocols are either proactive or reactive in approach. Both the approaches have their own limitations; for example, the proactive protocols use excess bandwidth in maintaining the routing information, while the reactive ones have long route request delay.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.