Open Access Open Access  Restricted Access Subscription or Fee Access

Protected Routing in MANETS

K. Yasaswini, K.L. Kalyani, N. Rajeswari


Security is an important issue in MANETS. As MANETS are self-organized, the communication and the recognizing the other nodes for the communication need to be recognized by the nodes. In this, MANETS lack centralized authority; any devices can enter or leave the network. Security attacks are more in MANETS because of its dynamic nature. In this paper an attempt has been made to list out all types of attacks in the MANETS and provide solution for the routing in the network. By implementing Shamir’s algorithm, security can be achieved. By the proposed method, each node which wants to enter into the network, should register in the centralized authority. By this some security attacks can be reduced.


MANETS, dynamic nature, self-organizing, and security attacks

Full Text:



Rai Abhay Kumar, Tewari Rajiv Ranjan, Upadhyay Saurabh Kant. Different types of attacks on integrated MANET-Internet communication. International Journal of Computer Science and Security (IJCSS). 4(3).265–274p.

A survey on attacks and countermeasures in mobile ad hoc networks. Wireless/Mobile Network Security. Springer; 2006.

MANET: Vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management. January 2011; 11.

Tang Cong, Chen Ruichuan, Cai Zhuhua, et al. A secure key issuing scheme for peer-to-peer networks. Fifth International Conference on Networking and Services. 2009.

IIyas M. The Hand Book of Ad-Hoc Wireless Networks. CRC Press LLC; 2003.

Mishra A, Nadkarni KM. Security in wireless ad-hoc network. In: The Hand Book of AdHoc Wireless Networks. CRC press LLC; 2003; 30.

Salomaa A. Public-Key Cryptography. Springer-Verlag; 1996.

Tanenbaum A. Computer networks. PH PTR. 2003.

Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine. 1999; 13(6): 24–30p.

Garg Nishu, Mahapatra RP. MANET security issues. IJCSNS International Journal of Computer Science and Network Security. 2009; 9(8).


  • There are currently no refbacks.