Role of Cryptographic Algorithms in Mobile Ad Hoc Network Security: An Elucidation
Veerpal Kaur1, Kamali Gupta2, Vidhu Baggan3, Gagandeep Kaur4, Amanjyoti5

1Veerpal Kaur, Chitkara University Institute of Engineering and Technology Chitkara University, (Punjab), India.
2Kamali Gupta, Chitkara University Institute of Engineering and Technology Chitkara University, (Punjab), India.
3Vidhu Baggan, Chitkara University Institute of Engineering and Technology Chitkara University, (Punjab), India.
4Gagandeep Kaur, Chitkara University Institute of Engineering and Technology Chitkara University, (Punjab), India.
5Amanjyoti, Chitkara University Institute of Engineering and Technology Chitkara University, (Punjab), India.
Manuscript received on 20 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 3750-3754 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B14850982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1485.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Ad hoc Network, an infrastructure-less network is emerging as one of the major dynamic areas of communication. Due to the rapid increase in the moveable devices, an appreciable growth in wireless network is witnessed in the recent years. As the network is growing, the number of intruders is also rising to find a loophole in the security of network to achieve their evil means. So the network is prone to a large amount of attacks like wormhole attack, black hole attack, malicious node attack etc. In order to alleviate such attacks, security measures should be strong enough to combat. The objective of this paper is to study the cryptographic techniques implemented on Mobile Ad hoc Network in order to provide security to the foundation-less systems. Year-wise distribution of the cryptographic approach implementation has been presented and analysis has been made in terms of existing implementation and future work that necessitates its efficacious implementation.
Keywords: Mobile Ad Hoc Network, Cryptographic Techniques, Proactive Techniques, Reactive Techniques, Preventive Techniques, Attacks.
Scope of the Article: Mobile Adhoc Network