Abstract
Background and Objective: Mobile ad hoc network (MANET) is an emerging and developing area of wireless networks. These networks are formed by nodes that are within the transmission coverage area of each other. MANETs are otherwise quoted as anytime, anywhere network.
Methods: The nodes that are involved in forming the network themselves act as routers to route information among them, thus forming self-configuring community of nodes. As other wired and wireless networks, the various layers of MANETs are also prone to various forms of attacks.
Conclusion: In this paper, we focus on network layer attacks in MANETs and the measure to overcome the severity caused by those attacks by implementing elliptic curve cryptography (ECC).
Keywords: Elliptic curve cryptography, network layer attacks, OLSR, MANET, wireless mobile notes, FANET.
International Journal of Sensors, Wireless Communications and Control
Title:Comparative Analysis of E-OLSR Algorithm in the Presence of Routing Attacks in MANET
Volume: 8 Issue: 1
Author(s): R. Bhuvaneswari*R. Ramachandran
Affiliation:
- Department of Science and Technology, Faculty of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai,India
Keywords: Elliptic curve cryptography, network layer attacks, OLSR, MANET, wireless mobile notes, FANET.
Abstract: Background and Objective: Mobile ad hoc network (MANET) is an emerging and developing area of wireless networks. These networks are formed by nodes that are within the transmission coverage area of each other. MANETs are otherwise quoted as anytime, anywhere network.
Methods: The nodes that are involved in forming the network themselves act as routers to route information among them, thus forming self-configuring community of nodes. As other wired and wireless networks, the various layers of MANETs are also prone to various forms of attacks.
Conclusion: In this paper, we focus on network layer attacks in MANETs and the measure to overcome the severity caused by those attacks by implementing elliptic curve cryptography (ECC).
Export Options
About this article
Cite this article as:
Bhuvaneswari R. *, Ramachandran R., Comparative Analysis of E-OLSR Algorithm in the Presence of Routing Attacks in MANET, International Journal of Sensors, Wireless Communications and Control 2018; 8 (1) . https://dx.doi.org/10.2174/2210327908666180328163219
DOI https://dx.doi.org/10.2174/2210327908666180328163219 |
Print ISSN 2210-3279 |
Publisher Name Bentham Science Publisher |
Online ISSN 2210-3287 |
Call for Papers in Thematic Issues
Federated learning for biomedical applications
Federated learning, also known as distributed AI/machine learning, is a method that enables cooperative learning from big datasets owned by several parties without compromising the privacy of each person's raw data. FL is especially helpful when the needed information is not open source or easily accessible due to tactical or ...read more
Information, Trust, and Risk: Exploring the Intersection of Sensing, Wireless Communications, and Control
Sensing technologies, wireless communications, and control systems are becoming ubiquitous in our daily lives, with the potential to enhance and streamline many aspects of modern society. However, this also creates new challenges in terms of ensuring trust and managing risks associated with the use of these technologies. The sheer volume ...read more
Machine Learning for Industry 4.0 manufacturing applications
This thematic issue will focus on the intersection of Machine Learning and the manufacturing industry within the context of Industry 4.0. Industry 4.0 involves the use of smart sensors, devices, and machines to enable the creation of smart factories that constantly collect data related to production. Machine Learning techniques can ...read more
Next-Generation Network Architecture, Algorithms, and Security
Design of new network architectures, algorithms and protocols is one of the fundamental challenges in next-generation networking. To this end, novel networking techniques and applications are required for advancing today?s complex communication networks. This thematic issue provides researchers, industry professionals and practitioners with a forum to present the latest research ...read more
Related Journals
- Author Guidelines
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers
- Announcements