CFP last date
20 May 2024
Reseach Article

Improvising Performance with Security of AODV Routing Protocol for MANETs

by Morli Pandya, Ashish Kr. Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 11
Year of Publication: 2013
Authors: Morli Pandya, Ashish Kr. Shrivastava
10.5120/13535-1236

Morli Pandya, Ashish Kr. Shrivastava . Improvising Performance with Security of AODV Routing Protocol for MANETs. International Journal of Computer Applications. 78, 11 ( September 2013), 30-36. DOI=10.5120/13535-1236

@article{ 10.5120/13535-1236,
author = { Morli Pandya, Ashish Kr. Shrivastava },
title = { Improvising Performance with Security of AODV Routing Protocol for MANETs },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 11 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number11/13535-1236/ },
doi = { 10.5120/13535-1236 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:19.339149+05:30
%A Morli Pandya
%A Ashish Kr. Shrivastava
%T Improvising Performance with Security of AODV Routing Protocol for MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 11
%P 30-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Networks are used in different fields. Its popularity has motivated the emergence of mobile ad-hoc networks (MANETs). A mobile Ad-hoc network is a decentralized wireless system which forms a fast changing network. Because of its dynamic nature and changing topology as well as wireless nature, MANET is a growing dynamic network, sometimes called mobile mesh network. MANET poses various kinds of security related problems, which are caused by their nature of collaborative and open systems and by limited availability of assets. The absence of any central coordinator makes the routing a complex one compared to traditional networks. Among various Routing protocols in Mobile Ad-hoc network, the ad hoc on demand distance vector (AODV) is most popular widely used as it has many useful characteristics. The performance will demotes when particular host or nodes fails as it sends message regarding this to source. This paper presents the performance of AODV Reactive routing protocol, along with analysis of different attacks that can be possible on AODV. It also describes two layer signature security schemes which includes secure hash algorithm which aimed at improving normal AODV performance. Here extension of AODV protocol is done, which includes secure hash algorithm and digital signature scheme aimed at further improving its security with network performance. The proposed approach is implemented by using NS2 simulator, a discrete event-driven simulator. This helps to improve the factors like performance and security.

References
  1. S. Doshi, T. X. Brown, Minimum Energy Routing schemes in Wireless Ad hoc networks, IEEE INFOCOM 2002
  2. Ram Ramanathan and Jason Redi, "A brief overview of Ad-hoc Networks: Challenges and Directions", IEEE Communications Magazine May 2002, pp. 20-22.
  3. Mitigating Black Hole Attacks in AODVISSN 0975-3303Mapana J Sci, 11, 4(2012), 65-76 Routing Protocol Using Dynamic Graph
  4. Brijesh Soni, Biplab Kumar Sarkar, Arjun Rajput, "Improvising the Ad hoc on Demand Distance Vector Routing Protocol When Nodes or Links Fails," in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012) © Springer India
  5. International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 5, Sep 2011 DOI : 10. 5121/ijnsa. 2011. 3518 229Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
  6. A Study of Secure Routing in MANET: various attacks on AODV in MANET.
  7. C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance Vector (aodv) routing," IETF RFC 3591, 2003.
  8. A. A. Pirzada and C. McDonald, "Establishing trust in pure ad-hoc networks," Proceedings of the 27th Australasian Computer Science Conference (ACSC), vol. 26, no. 1, pp. 47–54, 2004.
  9. Weichao Wang, Yi Lu, Bharat Bhargava, "On Security Study of Two Distance Vector Routing Protocols for Mobile Adhoc Networks", (IEEE) 2003, 0-7695-1893- 1/03
  10. Eastlake D, Jones P (2001) US Secure Hash Algorithm 1 (SHA1). RFC 3174.
  11. E. Altman and T. Jimenez, Lecture Notes on NS Simulator for Beginners, December 03, 2003.
  12. The Network Simulator – NS2. (http://www. isi. edu/nsnam/ns/index. html).
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc networks Reactive routing protocol Throughput Route discovery SHA algorithm NS-2.