Results 1 -
2 of
2
Wireless and Sensor Networks Security (WSNS) A Retrospection
, 2007
"... After three years of organizing the wireless and sensor network security (WSNS) workshop, it is time for some ret-rospection to the workshop objectives and the visible out-come. This review is focusing on the the quality and per-formance of the workshop. On the one hand, it represents a good source ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
After three years of organizing the wireless and sensor network security (WSNS) workshop, it is time for some ret-rospection to the workshop objectives and the visible out-come. This review is focusing on the the quality and per-formance of the workshop. On the one hand, it represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks. Addi-tionally, it extrapolates future research directions that seem to be interesting and challenging for forthcoming research activities. 1.
COMPARATIVE REVIEW STUDY OF SECURITY OF ARAN AND AODV ROUTING PROTOCOLS IN MANETS
"... Mobile Ad-hoc networks are proposed because there are some areas where it is not possible to set up a network having fixed infrastructure, like in areas of emergency services, military operations, personal area networks, etc. Ad hoc network allows communication between wireless nodes with the help o ..."
Abstract
- Add to MetaCart
Mobile Ad-hoc networks are proposed because there are some areas where it is not possible to set up a network having fixed infrastructure, like in areas of emergency services, military operations, personal area networks, etc. Ad hoc network allows communication between wireless nodes with the help of their transmission ranges and routing protocols facilitate this communication among the nodes. But on these routing protocols variety of attacks are possible like- Eavesdropping, IP-spoofing, Blackhole, Denial of service attack, etc. By attacking the routing protocol attackers can access network traffic, can drop it or can modify it. To prevent these attacks many secure routing protocols like- SEAD, ARAN, SAODV, SRP, etc have been developed. In this paper security aspects of ARAN (Authenticated Routing for Adhoc Network routing protocol) has been analyzed with respect to a commonly used routing protocol AODV (Adhoc On-Demand Distance Vector) i.e. how much these two protocols are resistant to Blackhole and IP-Spoofing attack under GloMoSim-2.03 simulator.