SUMMARY AND COMPARISON OF VARIOUS SECURE AD HOC
ROUTING PROTOCOLS
In this section, a comparative summary of the previously presented secure ad hoc routing protocols is given below in Table 1. We concluded that there is no single routing protocol that provides protection against all forms of routing attacks. In addition, the achievable security level is highly dependent on both the assumptions and operational requirements.
CONCLUSION AND FUTURE WORK
In this paper, we have presented the most known protocols for securing the routing function in mobile ad hoc networks. The analysis of the various proposed routing protocols has demonstrated that the inherent characteristics of ad hoc networks, such as rapidly changing topologies and lack of infrastructure, introduce further difficulties to the already complicated problem of secure routing. Our study shows that, none of the proposals of secure routing protocols are able to accomplish all security goals. In addition, security overhead comes mainly from the computational complexity of the cryptographic algorithms used in constantly repeated routing procedures. In future work, we will propose improvements in AODV routing protocol for secure network layer communication in MANETs.