Open Access Open Access  Restricted Access Subscription or Fee Access

Survey of Routing Protocols and Attacks for Mobile Ad hoc Networks

Dr.L.S. Jayashree, I. Kala


Mobile ad hoc network are collection of mobile nodes communicating in a multi hop way without any fixed infrastructure with restricted broadcast range. One main challenge in the design of these networks is their vulnerability to malicious attacks. In this paper we have discussed some basic routing protocols in MANET like Proactive and Reactive Routing protocols and the security challenges in ad hoc networks are analyzed.



Full Text:



V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. IEEE INFOCOM ‟97, 1997, pp. 1405–13.

D. B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts,” Proc. IEEE Wksp. Mobile Computing Systems and Applications, Dec. 1994.

T. H. Clausen et al., “The Optimized Link-State Routing Protocol, Evaluation through Experiments and Simulation,” Proc. IEEE Symp. Wireless Personal Mobile Communications 2001, Sept. 2001.

P. Papadimitratos and Z. J. Haas, “Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks,” Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41– 50.

S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation of Nodes- Fairness IN Dynamic Ad-hocNetworks,” Proc.IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC), 2002.

D. Coppersmith and M. Jakobsson, “Almost Hash Sequence Traversal,” Proc. 4th Conf. Financial Cryptography (FC „02), Lecture Notes in computer Science, 2002.

G. Malkin, RIP Version 2 carrying additional information, RFC, 1723, 1994.

Z. J. Haas and M. R. Pearlman, “The zone routing protocol (ZRP) for ad-hoc networks”, Internet draft, Aug. 1998.

E. M. Royer and C.-K. Toh, “A Review of current routing protocols for ad hoc mobile wireless networks”, IEEE Personal Communications, Apr., 46–55, 1999.

S. Murthy and J. J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks”, ACM Mobile Networks and Application, Oct. 183–197, 1996.

C. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector (DSDV) routing for mobile computers”, in ACM SIGCOMM Symposium on Communications, Architectures and Protocols, September 1994, pp. 234–244.

C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.

C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On demand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003.

Pradip M. Jawandhiya et. al. “A Survey of Mobile Ad Hoc Network Attacks” ,International Journal of Engineering Science and Technology,Vol. 2(9), 2010, 4063-4071.

Lidong Zhou, Zygmunt J. Haas, “Securing Ad hoc Networks”,IEEE Network Magzine, 13, 6, Pages 24-30, 1999.

Nishu Garg and R.P.Mahapatra, “MANET Security Issues ,” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009.

C.K.Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems,” Prentice Hall Publications, 2002.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.