Adhoc Routing Protocols and Their Security Techniques for a Review
Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc NETworks (MANETs) in military, government and commercial applications. In this paper, the authors review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad hoc On-demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability.