Manisha.K et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.9, September- 2014, pg. 646-655
© 2014, IJCSMC All Rights Reserved 646
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 3, Issue. 9, September 2014, pg.646 – 655
RESEARCH ARTICLE
A SECURE AND ENERGY EFFICIENT
APPROACH IN ADHOC NETWORKING
Manisha.K
1
M.Tech Student
Dept. of IT
SNIST, Hyderabad
manisha.kalyani@yahoo.com
Sunil Bhutada
2
Associate Professor
Dept. of IT
SNIST, Hyderabad
sunilbhutada@gmail.com
Abstract — An Ad-Hoc network is collection of wireless mobile nodes forming a temporary network without
the use of any established infrastructure or fixed centralized administration. In Ad-Hoc networks the
communicating nodes do not depend on a fixed infrastructure, which sets a new challenge for the necessary
security architecture which they apply. In such an environment, it is necessary for one mobile node to enlist
the use of other nodes in forwarding a packet to the destination, due to the limited range of bandwidth and
signals of each mobile node wireless transmission. Movement of the nodes results in a change in routing
paths, which requires some secure mechanisms for determining new routing paths. The deployment of sensor
networks in security and safely critical environments requires secure communication primitives. Sensor
networks in hostile environment make it vulnerable to the battery power drainage attacks. It is impossible to
replace or recharge the battery power of the sensor nodes. Among different types of security attacks, low
power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level
of sensors, leading to death of the nodes. In this paper we present secure routing protocols in Ad-Hoc
networks to overcome this type of attacks.
Keywords— Ad-Hoc network, Routing, Power draining, Mobile nodes, Sensor nodes
I. INTRODUCTION
Number of factors associated with regulation, social behaviour, technology and business naturally and
logically speaks in the favour of wireless Ad-Hoc networking. Ad-Hoc network communication, which is
advancing in both terms of usage and technology and is a driving force, thanks to Internet and second-
generation cellular systems. As we look at horizon, we can have a glimpse of truly ubiquitous computing and
communication. In the future, the role and the capabilities of short-range data transactions are to be expected to
grow, which serves as a complement to the traditional large-scale communication. Most of the man made