0% found this document useful (0 votes)
12 views1 page

Active Source Routing Protocol ABSTRACT

The document discusses the Active Source Routing Protocol, specifically focusing on the Location Aided Routing (LAR) protocol, which utilizes GPS for efficient route establishment in ad-hoc mobile networks. It highlights the unique characteristics of ad-hoc networks, their applications, and the security challenges they face. The paper also explores strategies to enhance security, including leveraging redundancy and implementing new cryptographic methods to protect against denial of service attacks.

Uploaded by

sakthiravi010605
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views1 page

Active Source Routing Protocol ABSTRACT

The document discusses the Active Source Routing Protocol, specifically focusing on the Location Aided Routing (LAR) protocol, which utilizes GPS for efficient route establishment in ad-hoc mobile networks. It highlights the unique characteristics of ad-hoc networks, their applications, and the security challenges they face. The paper also explores strategies to enhance security, including leveraging redundancy and implementing new cryptographic methods to protect against denial of service attacks.

Uploaded by

sakthiravi010605
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Active Source Routing Protocol

Abstract

An ad-hoc mobile network is a collection of mobile nodes that are dynamically and
arbitrarily located in such a manner that the interconnections between nodes are capable of
changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is
correct and efficient route establishment between a pair of nodes so that messages may be
delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR(Dynamic
Source Routing). The Location Aided Routing protocol uses location information to reduce routing
overhead of the ad-hoc network! Normally the LAR protocol uses the GPS(Global Positioning System)
to get these location information’s. With the availability of GPS, the mobile hosts knows there
physical location.

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike
traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure.
Instead, hosts rely on each other to keep the network connected. The military tactical and other
security-sensitive operations are still the main applications of ad hoc networks, although there is a
trend to adopt ad hoc networks for commercial uses due to their unique properties. One main
challenge in design of these networks is their vulnerability to security attacks. In this paper, we study
the threats an ad hoc network faces and the security goals to be achieved. We identify the new
challenges and opportunities posed by this new networking environment and explore new
approaches to secure its communication. In particular, we take advantage of the inherent
redundancy in ad hoc networks — multiple routes between nodes — to defend routing against
denial of service attacks. We also use replication and new cryptographic schemes, such as

Submitted by
1.R.Bhavani (CB20S202091)

2.G.Boominathan (CB20S202092)

3.K.Dhatchina murthy (CB20S202093)

4.P.Dhivya (CB20S202094)

You might also like