Security Challenges in Ad Hoc Networks Yadav Ashutosh*, Mr. Chandel Gajendra Singh** Information Technology Department, SSSIST, Sehore, India *ashutosh_0507@yahoo.co.in
**Gajendrasingh86@rediffmail.com
Online published on 4 November, 2017. Abstract Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes. In this article we present a study of secure ad hoc routing protocols for wireless Networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the secure routing protocols and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network. Top Keywords Wireless Network, Ad hoc Network, Security Service, Routing Protocols, Routing Authentication, Hash function and Secure Routing Protocols. Top |