International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Secure Communication Against Malicious Deeds In Multicast Routing In Manet (Survey)

Author :Devendra Singh Kushwaha, Vikash K Singh, Shaibya Singh, Sonal Sharma

Article Citation :Devendra Singh Kushwaha ,Vikash K Singh ,Shaibya Singh ,Sonal Sharma , (2015 ) " Secure Communication Against Malicious Deeds In Multicast Routing In Manet (Survey) " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 15-19, Volume-3, Issue-3

Abstract : Mobile ad hoc network (MANET) has emerged as a new edge of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more susceptible to malicious attack. Due to the absence of centralized administration, security is the main issue in mobile Ad hoc network and attackers are very easily modified the actual behavior and performance of network. Security issues of MANETs in group (multicast) communications are even more challenging because of the involvement of multiple senders and multiple receivers. Although several types of security attacks in MANETs have been studied in the literature, the focus of earlier research was only on unicast (point-to-point) applications. The impacts of security attacks on multicast in MANETs have not yet been explored.. The main aim is to observe the performance of network and applied method to secure network against malicious deeds. In real life, such an altruistic attitude is more than often extremely difficult to realize and so we often find malicious nodes also present in the same network. Some of these are unknown nodes, which enter the network during its establishment or operation phase, while others may originate indigenously by compromising an existing node. Keywords- Mobile Ad -Hoc Networks, Multicasting, Security, Wormhole Attack.

Type : Research paper

Published : Volume-3, Issue-3


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 76
| Published on 2015-03-03
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World