Search for secure data transmission in MANET: A review
Title | Search for secure data transmission in MANET: A review |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Naik, T., Khatiwala, F., Sakadasariya, A. |
Conference Name | 2017 International Conference on Trends in Electronics and Informatics (ICEI) |
Keywords | compositionality, cryptographic technique, cryptographic techniques, cryptography, highly dynamic network, independent ambulant nodes, intermediate node, MANET, Metrics, mobile ad hoc networks, mobile ad-hoc network, mobile nodes, multihop network, Peer-to-peer computing, portable nodes, privacy, Protocols, pubcrawl, resilience, Resiliency, routimg protocols, Routing protocols, secure data transmission, security mechanisms, transmission range, versatile node |
Abstract | Mobile Ad-hoc Network (MANET) comprise of independent ambulant nodes with no any stable infrastructure. All mobile nodes are co-operatively transfer their data packets to different mobile nodes in the network. Mobile nodes are depends on intermediate nodes when transmission range beyond limit i.e. multi hop network. As MANET is a highly dynamic network, mobile nodes can leave and join a network at anytime. Security is the biggest issue in MANET as MANET is infrastructure-less and autonomous. In MANET, correspondence between two mobile nodes is performed by routing protocols wherein every versatile node can make directly communication with other versatile node. In the event that both portable nodes are inside a transmission range of each other, then they can straightforwardly make communication with each other. Otherwise, transmission is done through the intermediate node. The nature of its wireless nature is also additionally turns into the purpose of its greatest vulnerability. In this manner, diminishing the confidence level of the system as it appropriate to availability, integrity, reliability and privacy concerns. There are different routing protocols for providing security that are designed based on various cryptographic techniques. To obtain a rapid knowledge of security design, we are giving a review on different cryptographic techniques to secure MANET. In this review, we presents security techniques and protocols related to cryptographic techniques. |
URL | https://ieeexplore.ieee.org/document/8300766/ |
DOI | 10.1109/ICOEI.2017.8300766 |
Citation Key | naik_search_2017 |
- Peer-to-peer computing
- versatile node
- transmission range
- security mechanisms
- secure data transmission
- Routing protocols
- routimg protocols
- Resiliency
- resilience
- pubcrawl
- Protocols
- privacy
- portable nodes
- Compositionality
- multihop network
- mobile nodes
- mobile ad-hoc network
- mobile ad hoc networks
- Metrics
- MANET
- intermediate node
- independent ambulant nodes
- highly dynamic network
- Cryptography
- cryptographic techniques
- cryptographic technique