CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior

by Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, Roopam Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 30 - Number 7
Year of Publication: 2011
Authors: Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, Roopam Gupta
10.5120/3652-5104

Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, Roopam Gupta . Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior. International Journal of Computer Applications. 30, 7 ( September 2011), 36-41. DOI=10.5120/3652-5104

@article{ 10.5120/3652-5104,
author = { Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, Roopam Gupta },
title = { Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 30 },
number = { 7 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume30/number7/3652-5104/ },
doi = { 10.5120/3652-5104 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:16:24.693623+05:30
%A Sudhir Agrawal
%A Sanjeev Jain
%A Sanjeev Sharma
%A Roopam Gupta
%T Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior
%J International Journal of Computer Applications
%@ 0975-8887
%V 30
%N 7
%P 36-41
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Node cooperation is the basic paradigm for efficient functioning of MANETs (Mobile Ad hoc Networks). A paradigm shift from this trait causes the nodes to misbehave thereby affecting the network performance. Selfishness to conserve own resources, Maliciousness to disrupt the network fabric or Malfunctioning may cause the nodes to misbehave. MANET characteristics like dynamism of topology, shared wireless channels and open infrastructureless architecture pose security threats to them. This paper examines and analyzes two currently IETF listed reactive routing protocols AODV and DYMO with varying speed of node mobility and varying degree of maliciousness. The performance metrics Packet delivery ratio, Average End-to-end delay & Jitter and Normalized routing overhead are compared when a varying percentage of nodes drop packets.

References
  1. Murthy, C.S.R. and Manoj, B.S. 2008. Ad Hoc Wireless Networks. Pearson Education.
  2. Hubaux, J.P., Buttyan, L. and Capkun, S. 2001. The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC).
  3. Zhou, H. 2003. A Survey on Routing Protocols in MANETs. Technical Report. Michigan State University.
  4. Djenouri, D., Derhab, A. and Badache, N. 2006. Ad hoc networks routing protocols and mobility. International Arab Journal of Information Technology.
  5. Agrawal, S., Jain, S. and Sharma, S. 2011. A Survey of Routing Attacks and Security Measures in Mobile Ad Hoc Networks. Journal of Computing.
  6. Michiardi, P. and Molva, R. 2002. Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks. In Proceedings of European Wireless Conference.
  7. Kargl, F., Schlott, S., Klenk, A., Geiss,A. and Weber, M. 2004. Securing Ad Hoc Routing Protocols. In Proceedings. 30th Euromicro Conference.
  8. Perkins, C. Belding-Royer, E. and Das, S. 2003. RFC 3561: Ad hoc On-Demand Distance Vector (AODV) Routing. http://www.ietf.org/rfc/rfc3561.txt.
  9. Chakeres, I. and Perkins, C. 2010. Dynamic MANET On-Demand (DYMO) Routing Protocol. IETF Internet Draft, v.21, (Work in Progress). http://tools.ietf.org/html/draft-ietf-manet-dymo-21.
  10. Bo, S. M., Xiao, H., Adereti, A. and Malcolm, J. A. 2007. A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS ’07).
  11. Babakhouya, A. Challal, Y. and Bouabdallah, A. 2008. A Simulation Analysis of Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
  12. Gopalakrishnan, K. and Uthariaraj, V. R. 2009. Scenario Based Evaluation of the Impact of Misbehaving Nodes in Mobile Ad hoc Networks. First International Conference on Advanced Computing.
  13. Lima, M. Santos, A. D. and Pujolle, G. 2009. A Survey of Survivability In Mobile Ad Hoc Networks. IEEE Communication Surveys & Tutorials.
  14. Marti, S. Giuli, T. Lai, K. and Baker, M. 2000. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom).
  15. The Network Simulator - ns-2, http://isi.edu/nsnam/ns/, retrieved july 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Networks AODV DYMO Node misbehavior