A platform for research: civil engineering, architecture and urbanism
Securing MANETs Using SHA3 Keccak Algorithm
Abstract As the world is going wireless, security is the primary concern. MANETs due to their dynamic nature are prone to major security risks. In few scenarios the nodes in a MANET either intentionally or unintentionally behave as selfish or malicious nodes. So identification and isolation of such nodes is necessary. The paper focuses on simulation of various attacks in MANETs with AODV routing protocol with the help of simulating tool as NS2. Analysis of the protocol under the impact of various attacks is also observed and also a cryptographic approach for defending few attacks using Secure Hash Algorithm SHA3 Keccak algorithm is proposed.
Securing MANETs Using SHA3 Keccak Algorithm
Abstract As the world is going wireless, security is the primary concern. MANETs due to their dynamic nature are prone to major security risks. In few scenarios the nodes in a MANET either intentionally or unintentionally behave as selfish or malicious nodes. So identification and isolation of such nodes is necessary. The paper focuses on simulation of various attacks in MANETs with AODV routing protocol with the help of simulating tool as NS2. Analysis of the protocol under the impact of various attacks is also observed and also a cryptographic approach for defending few attacks using Secure Hash Algorithm SHA3 Keccak algorithm is proposed.
Securing MANETs Using SHA3 Keccak Algorithm
Ramya, P. (author) / SairamVamsi, T. (author)
2019-06-28
8 pages
Article/Chapter (Book)
Electronic Resource
English
Securing MANETs Using SHA3 Keccak Algorithm
TIBKAT | 2020
|IEEE | 2008
|Enhanced Security in MANETs Using AODV Protocol
Springer Verlag | 2025
|Enhanced Security in MANETs Using AODV Protocol
Springer Verlag | 2025
|RSVconf: Node Autoconfiguration for MANETs
IEEE | 2006
|