A. Anitha, Dr. S. Mythili


Secure Routing is a fundamental networking function in every communication system, and multi-hop wireless networks are no
exceptions. Attacking the routing service, achallenger can easily paralyses the operation of an entire network. The problem of traditional routing
schemes relies on the possibility that the network is connected, that is, there is an end-to-end path between any source and any destination. Over
the past, Secure Routing in Multi-hop Wireless Ad-hoc Networks techniques have been illustrated in this research. Itaims to present a surveyon
secure routing protocol techniques in physical layer security, Secure routing with the default decode and forward strategy and cost of physical
layer security in decentralized wireless networks.The researchwork also discuss about the relaying strategies in wireless ad hoc networks, secure
connection path between the source and destination through the intermediate relay nodes and also about how the intermediate relay selection is
been made and what algorithm and protocols are been implemented in order to achieve secure connection path. The secure connection path is said
to be secured or unsecured only after analyzing about both the colluding eavesdroppers and non-colluding eavesdroppers. Hence, the research
work also discuss about both type of eavesdroppers.The research presents a survey of the most significant opportunistic routing protocols for
multi-hop wireless networks.


Keywords: Secure routing, multi-hop, wireless ad hoc networks, relay, eavesdroppers

Full Text:


DOI: https://doi.org/10.26483/ijarcs.v7i5.2718


  • There are currently no refbacks.

Copyright (c) 2016 International Journal of Advanced Research in Computer Science