Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

PERFORMANCE ANALYSIS OF

PROTOCOL ARCHITECTURE FOR


SECURE MOBILE AD HOC
NETWORKS FOR SWAMMING
APPLICATIONS
ABSTRACT
• Mobile autonomous networked systems have seen increased
usage by the military and commercial sectors for tasks deemed too
monotonous or hazardous for humans.

• The flexibility and mobility of Mobile Ad hoc Networks (MANETs)


have made them increasing popular in a wide range of use cases.
This paper proposes a novel security protocol, Security Using Pre-
Existing Routing for Mobile Ad hoc Networks (SUPERMAN).

• The protocol is designed to address node authentication, network


access control, and secure communication for MANETs using
existing routing protocols. SUPERMAN combines routing and
communication security at the network layer.

• This contrasts with existing approaches, which provide only


routing or communication security, requiring multiple protocols to
protect the network.
OBJECTIVE
• The main objective of this project is to provide a
Framework to Protect Secure Routing and
Communication in the Mobile Ad hoc Network.

• The framework is designed to allow existing


network and routing protocols to perform their
functions.
LITERATURE SURVEY 1
• A key management and secure routing integrated
framework for mobile adhoc networks -2013

• Key Management (KM) and Secure Routing (SR)


which are two most important issues for Mobile
Ad-hoc Networks (MANETs).

Disadvantages
• Identity based cryptography (IBC) Need Signature
for all nodes.
LITERATURE SURVEY 2
• MANET Security Issues-2009
• A routing protocol for manet Networks (mobile
and ad hoc networks) does a route discovery,
it does not discover the shortest route but the
route through which the route request traveled
faster.
Disadvantages
• Network size is large
LITERATURE SURVEY 3
• Security in Mobile Ad-hoc Networks: Challenges
and Solutions-2004
• The state-of-the-art security proposals that
protect the MANET link- and network-layer
operations of delivering packets over the multihop
wireless channel.

• Disadvantages
• It works only on reactive networks.

You might also like