Browsing SUNY Polytechnic Institute by Subject "routing protocols"
Now showing items 1-2 of 2
Routing Protocols for MANETsThis technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. The ever changing properties like asymmetric links, low transmission power and topology have always been a challenge for the routing protocols. Under such circumstances, the proactive and reactive routing protocols have proved to be inefficient. Each of these approaches has its own disadvantages. To overcome these disadvantages, hybrid routing protocol has been designed. This paper will provide an overview of all the three above mentioned protocols namely proactive routing protocol, reactive routing protocol and hybrid routing protocol with an example each. A comparison between the three routing protocols is also provided in this paper.
Secure Routing in Mobile Ad-hoc NetworksThe detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be performed on MANETs were researched in order to gain better understanding and insight on how they can be defended against. The focus of this project was to secure the routing protocols, since routing plays a vital role in the operation of network and is the target of most attacks. Various research papers were referenced for collecting the information needed. The existing routing protocols were systematically categorized and compared. Additionally, advanced routing protocols that integrate cryptographic methods into them were studied to come to a conclusion that they are the most robust protocols that effectively protect the Mobile Ad hoc Networks against some dangerous attacks. Securing the routing protocols is indeed the most important aspect for securing MANETs. However, there are other techniques that can be used as extensions for strengthening these networks, in addition to using a robust routing protocol. Recommendations have been made for the same.