The attack in adhoc network can
be prevented by using a securing routing protocol. It should have following
properties
1. Authenticity: when a
routing table is updated, it must verify whether updates were provided by
authenticated node.
2. Integrity of information : when
a routing table is updated the information must be verified whether it is
modified or not
3. In order updates: sequence
numbers or some mechanism must be used to maintain updates in order.
4. Maximum update time: updates
in routing table must be done as quickly as possible.
5. Authorization: only
authorized nodes must be able to send update packets.
0 comments