移动自组织网络中路由协议的安全挑战:系统回顾和开放研究问题

IF 0.4 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
Mitha Rachel Jose, J. Singh
{"title":"移动自组织网络中路由协议的安全挑战:系统回顾和开放研究问题","authors":"Mitha Rachel Jose, J. Singh","doi":"10.1504/IJESDF.2021.114963","DOIUrl":null,"url":null,"abstract":"Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"268-297"},"PeriodicalIF":0.4000,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues\",\"authors\":\"Mitha Rachel Jose, J. Singh\",\"doi\":\"10.1504/IJESDF.2021.114963\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.\",\"PeriodicalId\":54070,\"journal\":{\"name\":\"International Journal of Electronic Security and Digital Forensics\",\"volume\":\"41 1\",\"pages\":\"268-297\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electronic Security and Digital Forensics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJESDF.2021.114963\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electronic Security and Digital Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJESDF.2021.114963","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

各种有针对性的攻击集中在利用这些漏洞并破坏其操作的MANET上。因此,可以通过最大限度地利用可用资源和部署适当的安全措施来实现网络优化。在本研究中,基于性能参数(路由开销、缓存开销和数据包传送率)以及它们所面临的安全挑战,研究了各种MANET协议,即地理、基于拓扑、混合、分层、功率感知和多播路由协议。此外,还对各种路由协议进行了比较分析,并对其性能进行了评价。同时考虑了高功耗、低带宽和高错误率等拓扑问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues
Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.80
自引率
50.00%
发文量
55
期刊介绍: IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, and relevant case studies and “best practice" on tackling cyber crime.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信