SUMMARY AND COMPARISON OF VARIOUS SECURE AD HOC

ROUTING PROTOCOLS

In this section, a comparative summary of the previously presented secure ad hoc routing protocols is given below in Table 1. We concluded that there is no single routing protocol that provides protection against all forms of routing attacks. In addition, the achievable security level is highly dependent on both the assumptions and operational requirements.

Don't use plagiarized sources. Get Your Custom Essay on
SUMMARY AND COMPARISON OF VARIOUS SECURE AD HOC
Just from $13/Page
Order Essay

CONCLUSION AND FUTURE WORK

In this paper, we have presented the most known protocols for securing the routing function in mobile ad hoc networks. The analysis of the various proposed routing protocols has demonstrated that the inherent characteristics of ad hoc networks, such as rapidly changing topologies and lack of infrastructure, introduce further difficulties to the already complicated problem of secure routing. Our study shows that, none of the proposals of secure routing protocols are able to accomplish all security goals. In addition, security overhead comes mainly from the computational complexity of the cryptographic algorithms used in constantly repeated routing procedures. In future work, we will propose improvements in AODV routing protocol for secure network layer communication in MANETs.

ORDER NOW »»

and taste our undisputed quality.