Key words: An ad-hoc network comprises of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. Each node in the network pledges to help its neighbours by passing packets to and fro in return of a similar assurance from them. All is well if the participating nodes uphold such an altruistic behaviour. However, this is not always the case and often nodes are subjected to a variety of attacks by other nodes. These attacks range from naive eavesdropping to vicious battery draining attacks. Routing protocols, data, bandwidth and battery power are the common targets of these attacks. In order to overcome such attacks a number of routing protocols have been devised that use cryptographic algorithms to secure the routing mechanism, which in turn protects the other likely targets. This chapter gives an overview of seven such secure routing protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.
CITATION STYLE
Pirzada, A. A., & McDonald, C. (2005). Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks. In Advanced Wired and Wireless Networks (pp. 57–80). Springer US. https://doi.org/10.1007/0-387-22792-x_4
Mendeley helps you to discover research relevant for your work.