The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc Network has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Network are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.
CITATION STYLE
Lee, C. seung. (2015). A study on effectiveness using security routing based on mobile ad-hoc networks. International Journal of Security and Its Applications, 9(7), 141–152. https://doi.org/10.14257/ijsia.2015.9.7.13
Mendeley helps you to discover research relevant for your work.