Abhishek Vyas

Work place: Vellore Institute of Technology, School of Computer Science & Engineering, Vellore, 603214, India

E-mail: abhishek.vyas2016@vitstudent.ac.in


Research Interests: Applied computer science, Computational Science and Engineering, Computer systems and computational processes, Theoretical Computer Science, Data Structures and Algorithms


Abhishek Vyas is an Indian Citizen. He completed his Master of Technology degree in Computer Science and Engineering with specialization in Information Security in June 2018 from Vellore Institute of Technology, Vellore, Tamil Nadu, India. Previously, he completed his Bachelor of Technology in Computer Science and Engineering from Suresh Gyan Vihar University, Jaipur, Rajasthan, India in July 2016. He plans to pursue a Ph.D. in Computer Science and Engineering in the future.

Author Articles
Implementing Security Features in MANET Routing Protocols

By Abhishek Vyas Satheesh A.

DOI: https://doi.org/10.5815/ijcnis.2018.08.06, Pub. Date: 8 Aug. 2018

Mobile ad-hoc network or MANET is an auto-organizing network of mobile nodes. It lacks centralized control and is connected by wireless links. One of the many benefits of MANETs is that it can be utilized where there is no proper infrastructural support for wireless access and wired backbone is not possible. One major drawbacks of MANET is that as it is an infracture-less network, created on the fly, so here each node also functions as a router. So, each node participates in the routing of packets and information along the network. Due to this feature in MANETs, it is convenient to attack one of the nodes of MANET and then organize an attack on the whole network. To, secure the routing protocols in MANETs there are already a number of security features included in many of the unicast and multicast routing protocols. Like the use of unique signature and the use of secured algorithmic approach to secure against the various network layer routing attacks in MANETs. In this paper it is proposed that the use of hashing and secured algorithmic approaches like, Alpha Numeric Routing, when combined can introduce a unique security feature to On-Demand Routing protocols both in its multicast and unicast avatars. Some comparison, is done in the end of the new approach combines with the existing approaches by only using, Alpha Numeric Reflex Routing Algorithm. The outcome of the implementation was as expected, the results satisfied the input algorithms. Last but not the least analysis of the results is done and there is a discussion about the obtained results.

[...] Read more.
Other Articles