An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution

Author(s):  
G. Vidhya Lakshmi ◽  
P. Vaishnavi
Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2015 ◽  
Vol 12 (3) ◽  
pp. 209-225 ◽  
Author(s):  
Burcu Togral Koca

Turkey has followed an “open door” policy towards refugees from Syria since the March 2011 outbreak of the devastating civil war in Syria. This “liberal” policy has been accompanied by a “humanitarian discourse” regarding the admission and accommodation of the refugees. In such a context, it is widely claimed that Turkey has not adopted a securitization strategy in its dealings with the refugees. However, this article argues that the stated “open door” approach and its limitations have gone largely unexamined. The assertion is, here, refugees fleeing Syria have been integrated into a security framework embedding exclusionary, militarized and technologized border practices. Drawing on the critical border studies, the article deconstructs these practices and the way they are violating the principle of non-refoulement in particular and human rights of refugees in general. 


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


Sign in / Sign up

Export Citation Format

Share Document