Research Article Open Access

Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: A Review

Mohamed Othman1, Salwa Aqeel Mahdi1, Hamidah Ibrahim1, Jalil Md. Desa2 and Jumat Sulaiman3
  • 1 University Putra Malaysia, Malaysia
  • 2 , Malaysia
  • 3 University Malaysia Sabah, Malaysia

Abstract

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Journal of Computer Science
Volume 9 No. 5, 2013, 607-619

DOI: https://doi.org/10.3844/jcssp.2013.607.619

Submitted On: 22 November 2012 Published On: 25 May 2013

How to Cite: Othman, M., Mahdi, S. A., Ibrahim, H., Desa, J. M. & Sulaiman, J. (2013). Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: A Review. Journal of Computer Science, 9(5), 607-619. https://doi.org/10.3844/jcssp.2013.607.619

  • 3,999 Views
  • 3,226 Downloads
  • 6 Citations

Download

Keywords

  • Securing Routing
  • MANET Security
  • Passive Attack
  • Reactive Attack
  • Security Forwarding