Hash based efficient secure routing for network communication
Title | Hash based efficient secure routing for network communication |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Singh, M.P., Manjul, M., Yadav, M. |
Conference Name | Computing for Sustainable Global Development (INDIACom), 2014 International Conference on |
Date Published | March |
Keywords | Ad hoc networks, Attack, authentication, autonomous network, cryptographic protocols, energy problem, hash based efficient secure routing, infrastructure wireless networks, mobile ad hoc networks, Mobile Ad-hoc, mobile ad-hoc networks, Mobile communication, mobile computing, Mobility, network communication, networking, packet transfer, power backup, Routing, Routing Protocol, Routing protocols, security, telecommunication security, WLAN |
Abstract | Mobile ad-hoc networks are a new field in networking because it works as an autonomous network. Application of mobile ad-hoc networks are increasing day by day in recent year now a days. So it important is increasing to provide suitable routing protocol and security from attacker. Mobile ad-hoc network now a days faces many problems such as small bandwidth, energy, security, limited computational and high mobility. The main problem in mobile ad-hoc networks is that wireless networks, Infrastructure wireless networks have larger bandwidth, larger memory, power backup and different routing protocol easily applies. But in case of mobile ad-hoc networks some of these application failed due to mobility and small power backup so it is required such type of routing protocol which is take small energy during the transfer of packet. So we see that still there are many challenging works in mobile ad-hoc networks remained and to research in this area related to routing protocol, security issues, solving energy problem and many more which is feasible to it. Our research most probably will be dedicated to Authentication in mobile ad-hoc network. |
DOI | 10.1109/IndiaCom.2014.6828090 |
Citation Key | 6828090 |
- mobile computing
- WLAN
- telecommunication security
- security
- Routing protocols
- Routing Protocol
- Routing
- power backup
- packet transfer
- networking
- network communication
- Mobility
- Ad hoc networks
- Mobile communication
- mobile ad-hoc networks
- Mobile Ad-hoc
- mobile ad hoc networks
- infrastructure wireless networks
- hash based efficient secure routing
- energy problem
- Cryptographic Protocols
- autonomous network
- authentication
- attack