ttp://iaeme.com/Home/journal/IJCET 152 editor@iaeme.com h
International Journal of Computer Engineering & Technology (IJCET)
Volume 9, Issue 5, September-October 2018, pp. 152 160, Article ID: IJCET_09_05_018 –
Available online at
ttp://iaeme.com/Home/issue/IJCET?Volume=9&Issue=5 h
Journal Impact Factor (2016 9.3590(Calculated by GISI) www.jifactor.com ):
ISSN Print: 0976-6367 and ISSN Online: 0976 6375 –
© IAEME Publication
DESIGN OF SECURE ROUTING PROTOCOLS
FOR MOBILE AD HOC NETWORKS
Suresh Kanchi
Ph.D Student, Department of Computer Science and Engineering,
School of Engineering , SSSUTMS, Sehore.
Lalbahadur Kethavath
Assistant Professor, Department of Computer Science and Engineering
Teegala Krishna Reddy Engineering College, Hyderabad
Dr. R. P. Singh
School of Engineering, SSSUTMS, Sehore
ABSTRACT
The characteristics of Mobile Ad hoc Network (MANET) allows to call it as self-
governing system of nodes in mobility and such mobile nodes are connected by
wireless links. The MANET comes under class of wireless networks, particularly
under infrastructure-less category. In MANET, the node acts as a termination system,
also as an intermediate node and packet being forwarded by such node popularly
called as router. The MANET nodes are in mobility therefore they change their
locations. The node are enough capable to organize within them in turn changes
happen dynamically for the current topology in which the node are. The major
concern with respect to MANET nodes is, forming an optimum level and ideally an
efficient route between any two parties wish to participate in exchange packets. It is
the principal worry of the protocols related to the routing mechanism in MANET.
Key words: authentication, security, encryption, proactive, reactive, on-demand,
MANET, attacks, AODV, DSR.
Cite this Article: Suresh Kanchi, Lalbahadur Kethavath and Dr. R.P. Singh, Design
of Secure Routing Protocols for Mobile Ad hoc Networks. International Journal of
Computer Engineering and Technology, 9(5), 2018, pp. 152 160. -
ttp://iaeme.com/Home/issue/IJCET?Volume=9&Issue=5 h
1. INTRODUCTION
We are in the era of the information storage and retrieval in the context of exchanging
messages among the node in the network. The information may intended for a single node or
multiple node or broadcasting. In this context, the information is distributed across the nodes
in distributed environment. The information needs to be provided a security from attacks. It is
to ensure authentication, confidentiality, integrity and availability. The attacks may be in
different layers and are identified and studied in research. An intruder or attacker observe