Security Challenges & Routing Protocols In Manets

Authors(3) :-Sheikh Abdul Wajid, Farah Fayaz Quraishi, Pummy Dhiman

MANETs are group of mobile nodes that communicate in wireless medium using various underlying protocols. The communications are either single hop or multi hop. Due to various inherent characteristics of MANETs these are much more vulnerable to various types of attacks. Since the increased use of these types of networks mandates to have secure transmission of information between nodes so various secure routing protocols were proposed. This paper presents outline of various secured routing protocols in MANETs.

Authors and Affiliations

Sheikh Abdul Wajid
Lecturer , PG Department of Computer Sciences, University of Kashmir, Srinagar, India
Farah Fayaz Quraishi
Research Scholar, PG Department of Computer Sciences, University of Kashmir, Srinagar, India
Pummy Dhiman
Assistant professor, Department of Computer Sciences, Vidya Jyoti Eduversity, Derabassi Punjab, India


  1. Panagiotis Papadimitratos, Zygmunt J. Haas “ Secure Link State Routing for Mobile Ad Hoc Networks”, Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on 27-31 Jan. 2003 Page(s):379 -383,ISBN: 0-7695-1873-3
  2. Yih-Chun Hu ,David B. Johnson , Adrian Perrig “SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks”, 1570-8705/$ 2003 Published by Elsevier B.V. doi:10.1016/S1570- 8705(03)00019-2
  3. Manel Guerrero Zapata:"Secure Ad hoc On- Demand Distance Vector (SAODV) Routing" INTERNET-DRAFT draft-guerrero-manetsaodv- 06.txt. September 2006.
  4. Abdalla Mahmoud Ahmed Sameh Sherif El- Kassas, “ Reputed Authenticated Routing for Ad Hoc Networks Protocol (Reputed- ARAN)” 0-7803-9466-6/05/$20.00 2005 IEEE
  5. R. Kalpana et al., Mobile Anonymous Trust Based Routing Using Ant Colony Optimization, IEEE Asia-Pacific Services Computing Conference (APSCC), 2010.
  6. Marshall, j et al., Identifying flaws in the secure routing protocol. IEEE Conference on Performance, Computing, and Communications, 2003.
  7. Oscar F. Gonzalez, Michael Howarth, and George Pavlou, Detection of Packet Forwarding Misbehavior in Mobile Ad- Hoc Networks, Springer-Verlag Berlin Heidelberg 2007.
  8. Eichler, S. et al., Secure Routing in a Vehicular Ad Hoc Network. IEEE Vehicular Technology Conference, Sep. 2004.
  9. M. Rajesh Babu et al., An Energy Efficient Secure Authenticated Routing Protocol for Mobile Ad hoc Networks. International Journal of Reviews in Computing, Vol. 7, Sep. 2011.
  10. Steffen Reidt et al., Efficient, Reliable and Secure Distributed Protocols for MANETs. 2nd International Conference on Mobile Technology, Applications and Systems, Nov. 2005.
  11. Muhammad Nawaz Khan et al., Intrusion Detection System for Ad hoc Mobile Networks. Int. Conf. on Information Technology: Research and Education, Jun.2005.
  12. Lu Jin et al., Implementing and Evaluating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network. Wireless Telecommunications Symposium, Apr. 2006.
  13. Panagiotis Papadimitratos et al., How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET, IEEE-CS Broad Nets, San Jose, CA, USA, Oct. 2006
  14. Shivasharanappa Allur et al., Efficient SNR/RP Attentive Routing Algorithm: Cross-Layer Design for Ad hoc Networks, IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), Oct.2006.
  15. Venkat Balakrishnan, Vijay Varadharajan, Uday Tupakula, and Phillip Lucs, TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks, IEEE International Conference on Networks, Nov. 2007, pp. 182-187.
  16. Remya S, Lakshmi K S "SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs" , International Conference on Computer Communication and Informatics, 2015. IEEE.
  17. S. Imran, R. V. Karthick, P. Visu, "DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments" , International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015. IEEE
  18. N. W. Lo, M. C. Chiang, C. Y. Hsu, "Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks" , 10th Asia Joint Conference on Information Security (AsiaJCIS), 2015. IEEE.
  19. M. Khatkar, N. Phogat, B. Kumar, "Reliable data transmission in Anonymous Location Aided Routing in MANET by preventing replay attack" , 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 IEEE.
  20. A. Vijayan, C. Yamini, "Anonymous routing technique in MANETs for secure transmission: ART" , International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014. IEEE.
  21. K. V. Arya, R. Saxena, "S-ALERT: Secure anonymous location-based efficient routing protocol" , 9th International Conference on Industrial and Information Systems (ICIIS), 2014. IEEE.
  22. Rangara, R.R., Jaipuria, R.S., Yenugwar, G.N., Jawandhiya, P.M.: Intelligent Secure Routing Model For MANET. In: 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2010)
  23. Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. IJCSI International Journal of Computer Science Issues 2 (2009)
  24. Seys, S., Preneel, B.: ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks. International Journal of Wireless and Mobile Computing (2009)
  25. Li, X., Li, H., Ma, J., Zhang, W.: An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. In: Fifth International Conference on Information Assurance and Security (2009)
  26. Buttya, A.G.L., Vajda, I.N.: Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(11) (2006)
  27. Hong, J.K.A.X.: ANODR: Anonymous On Demand Routing with Untraceable routes for Mobile Ad-hoc Networks. In: 4th ACM International Symposium on Mobile Ad hoc Networking and Computing, MOBIHOC 2003 (2003)
  28. Sanzgiri, K. Dahill, B. Levine, B.N. Shields and C. Belding-Royer. A secure routing protocol for ad hoc networks. (ARAN) Network Protocols, 2002. Proceedings. 10th IEEE International Conference on ICNP’02
  29. Richard Draves, Jitendra Padhye, and Brian Zill. Routing in multi-radio, multi-hop wireless mesh networks. International Conference on Mobile Computing and Networking. Proceedings of the 10th annual international conference on Mobile computing and networking.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 460-464
Manuscript Number : CSEIT1726148
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Sheikh Abdul Wajid, Farah Fayaz Quraishi, Pummy Dhiman, "Security Challenges & Routing Protocols In Manets", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.460-464, November-December-2017.
Journal URL :

Article Preview