Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India

Research Article

Secure Routing Protocol against Internal and External Attack in MANET

Download321 downloads
  • @INPROCEEDINGS{10.4108/eai.16-4-2022.2318163,
        author={Nitesh  Ghodichor and Raj  Thaneeghaivl. V and Varsha  Namdeoe and Gautam  Borkar},
        title={Secure Routing Protocol against Internal and External Attack in MANET},
        proceedings={Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India},
        publisher={EAI},
        proceedings_a={THEETAS},
        year={2022},
        month={6},
        keywords={manet wireless network security attacks and malicious nodes secure routing security mechanism},
        doi={10.4108/eai.16-4-2022.2318163}
    }
    
  • Nitesh Ghodichor
    Raj Thaneeghaivl. V
    Varsha Namdeoe
    Gautam Borkar
    Year: 2022
    Secure Routing Protocol against Internal and External Attack in MANET
    THEETAS
    EAI
    DOI: 10.4108/eai.16-4-2022.2318163
Nitesh Ghodichor1,*, Raj Thaneeghaivl. V1, Varsha Namdeoe1, Gautam Borkar2
  • 1: CSE, SRK University, Bhopal, India
  • 2: RAIT, Mumbai University, Mumbai, India
*Contact email: niteshgho@gmail.com

Abstract

A mobile ad-hoc network is a group of mobile nodes that connect with one another via wireless networks to build a temporary network without the use of infrastructure or centralized administration. Secure routing is an important concern in MANET. This paper discusses the existing routing protocol in MANET, security issues while routing, and the existing secure routing protocol. The second part of the paper focused on a proposed secure routing algorithm (SRA) that provides security by employing an anonymous key establishment method that avoids the involvement of malicious nodes in routing. In MANET, the secure routing protocol protects the network from both internal and external attacks.