Ann Mary Jacob et al, International Journal of Computer Science and Mobile Computing, ICMIC13, December- 2013, pg. 108-113 © 2013, IJCSMC All Rights Reserved 108 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X International Conference on Mobility in Computing- ICMiC13, Organized by Mar Baselios College of Engineering and Technology during December 17-18, 2013 at Trivandrum, Kerala, India, pg.108 – 113 SURVEY ARTICLE Security Enabled Junction-Based Multipath Source Routing Algorithm for VANETs Ann Mary Jacob 1 , Saritha S 2 Dept. of Information Technology Rajagiri School of Engineering & Technology, Kochi, India 1 annmaryjac@yahoo.co.in; 2 saritha_s@rajagiritech.ac.in Abstract— Junction Based Multipath Source Routing Algorithm(JMSR) is a geographic routing protocol, in the sense that it exploits the location of the nodes and also of the street junctions, known via digital street maps. JMSR is characterized as junction-based because it is a geographic or position-based routing protocol, where the junctions’ positions are of much higher importance than the positions of the nodes themselves. The disadvantage of JMSR is that it does not specify how routing happens in presence of a malicious node. An improvement of JMSR is proposed through this paper. In this paper a method is discussed to deal with malicious nodes in VANETs. KeywordsVANETs; Junction-based Routing; Malicious nodes; Security attack; Packet duplication; Ranking. I. INTRODUCTION Vehicular Ad hoc Networks (VANETs) are a subclass of Mobile Ad hoc Network (MANET).VANET assists vehicle drivers to communicate and to coordinate among themselves in order to avoid any critical situation. It aims to provide: (1)Connectivity while on the road to mobile users. (2)Efficient vehicle-to-vehicle communications that enable the Intelligent Transportation Systems (ITS). Some of the unique features of VANET include the following. The major feature is the geographically constrained topology. This means that unlike in MANETs the nodes in VANETs are not free to move around an area or surface. Rather they could only move within the roads formed by obstacles around them. An interesting feature of VANET is the large scale of the network, i.e, a network may consist of a large number of nodes that may either be too close or too far away. Finally power consumption is not a critical factor for VANETs [1]. Most widely used routing protocols in VANETs are Greedy Perimeter Coordinator Routing [3], Geographic Source Routing [4] or Connectivity-Aware Routing [5], use only one single route from the source to destination [6] handles each packet separately. The major conclusion