Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Survey on Route Maintenance and Attacks in AODV Routing Protocol

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Pushpendra Dwivedi, Saurabh Gupta

Pushpendra Dwivedi and Saurabh Gupta. Article: A Survey on Route Maintenance and Attacks in AODV Routing Protocol. International Journal of Computer Applications 133(9):23-26, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Pushpendra Dwivedi and Saurabh Gupta},
	title = {Article: A Survey on Route Maintenance and Attacks in AODV Routing Protocol},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {9},
	pages = {23-26},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Mobile ad-hoc network is a self configuring multi hop wireless network that’s infrastructure and topology changes frequently. As the links in the wireless networks goes down very frequently due to highly dynamic environment, therefore, routing becomes a critical task. In the genre of reactive protocols, Ad-hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in Mobile ad-hoc Networks (MANETs). The no. of broadcasts are minimized by AODV, with the creation of routes only when the routes are needed. Routes are maintained locally. This protocol is loop free and single path. This Paper is a survey about what are the different types of attacks can occur in AODV routing Protocol and How the route Maintenance works in this protocol. This paper shows the process of creation of routes, then the types of maintenance and then at last the possible route attacks in AODV.


  1. S.Misra, I.Woungang and S.C. Misra, “Guide to Wireless Ad Hoc Networks”, Springer science, 2009.
  2. Goldsmith AJ, and Wicker SB. “Design challenges for energy-constrained ad hoc wireless networks.” IEEE Wireless Communications 2002; 9(4): 8–27.
  3. AI-Karaki, IN.; and Kamal, A.E., "Routing techniques in wireless sensor networks: a survey", Wireless Communications, IEEE , vol.ll, no.6, pp. 6-28, December 2004.
  4. Shiv Prakash, J.P.Saini, S.C.Gupta, “ review of Energy Efficient Routing Protocols for Mobile Ad Hoc Wireless Networks”, International Journal of computer Information System Vol. 1, No 4, 2010
  5. Royer E.M., Perkins C.E. “Ad-hoc on-demand distance vector routing”, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, p.90, 1999.
  6. Das S. Perkins C.E., Belding-Royer E.M, “Ad-hoc on-demand distance vector (aodv) routing” RFC 3561, IETF Network Working Group, 2003.
  7. M. K. Marina and S. R. Das, "On-Demand Multipath Distance Vector Routing for Ad Hoc Networks,” Proc. of the Int. Conf. on Network Protocols (ICNP), pp. 14-23, Nov. 2001.
  8. Perkins C.E. Lee S.-J., Belding-Royer E.M., “Scalability study of the ad-hoc on-demand distance vector routing protocol”, Int. J. Netw. Manag., 13(2), 2003.
  9. Ochola EO & Eloff MM, “A review of black hole attack on AODV routing in MANET”.
  10. M. A. Shurman, S. M. Yoo, and S. Park,"Black hole attack in wireless ad hoc networks," in ACM 42nd Southeast Conference (ACMSE'04), pp. 96-97, Apr. 2004.
  11. Ei Ei Khin Thandar Phyu, “Impact of black hole attack on aodv routing protocol”, International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014.
  12. V. Kanakaris*, D. Ndzi and D. Azzi, “Ad-hoc Networks Energy Consumption: A review of the Ad-Hoc Routing Protocols”, Journal of Engineering Science and Technology Review 3 (1) (2010) 162-167
  13. A. Iwata, C. C. Chiang, G. Pei, M. Gerla, and T.W. Chen, "Scalable Routing Strategies for Ad-Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-79.
  14. David B. Johnson, Davis A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T. Imielinski and H. Korth, Eds., Kulwer, 1996, pp. 152-81.
  15. VD Park and MS Corson "A highly adaptive distributed routing algorithm for mobile wireless networks", Proc. INFOCOM'97, Apr. 1997, 9 pages
  16. Chai-Keong Toh, "A novel distributed routing protocol to support Ad hoc mobile computing" Proc. 1996 IEEE 15th Annual Int'l. Phoenix Conf. Comp. and Commun., Mar. 1996, pp. 480-86


MANET, routing protocol, node, packet, route, attack.