##plugins.themes.academic_pro.article.main##

Abstract

Mobile ad-hoc networks are self forming network without any fixed infrastructure. An ad hoc network does not have fixed infrastructure, it means a network without the standard routing infrastructure like fixed routers and routing backbones. Since the network is self configuring it is prone to security problems [19].  One such aspect is Routing .The most widely used protocol for ad-hoc networks is DSDV and AODV. The routing protocol Ad hoc On Demand Distance Vector   has been built without considering any security mechanisms.  In AODV the updates are generated as per demand not on a periodic basis. The freshness of routing in AODV is recognized by the control packet which contains hop-count and sequence field. As the fields are editable, it creates a possible vulnerability that is recurrently abused by malicious nodes to advertise false enhanced routes. To improve the security there are some new mechanisms like hash chains and digital signature.  To verify the correct functionality of the protocol it is implemented on NS2 simulator and performed extensive simulations and performance evaluations. This experimentation considers parameters such as packet delivery ratio, control overhead and throughput.

Keywords: AODV,Hashchain,Security,Routing,DigitalSignature

##plugins.themes.academic_pro.article.details##

Author Biographies

Sudarsanan. D, Acharya Institute of Technology, Bangalore,

Assistant Professor, Department of ISE,

Megha. J, Acharya Institute of Technology, Bangalore

M.Tech (STUDENT) Department of ISE,

How to Cite
D, S., & J, M. (2014). HASH Mechanism to Secure the AODV Protocol in MANETs. International Journal of Emerging Trends in Science and Technology, 1(05). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/194

References

[1] Er. Kamaljit Kaur*, Er. Amanpreet Kaur Chela “Simulation and Review of SAODV NS2 Simulation”, IJESRT, [Kaur, 3(2): February, 2014.

[2] Sunil J. Soni, Suketu D. Nayak “Enhancing Security Features & Performance of AODV Protocol under Attack for MANET”, 2013 International Conference on IntelligentSystems and Signal Processing (ISSP).


[3] Madhavi, S. and K. Duraiswamy “Flooding attack aware secure aodv” 2013.

[4] Er. Kamaljit Kaur, Er. Amanpreet Kaur Chela “Simulation and Review of SAODV NS2 Simulation”,IJESRT. February, 2014.

[5] J Rajeshwar, Dr G Narsimha “A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile Ad hoc Networks (MANET)– The Enhancements of AODV, International Journal of Computers and Technology Volume 3 No 2, December 2012.

[6] Alekha Kumar Mishra, Bibhu Dutta Sahoo “A modified adaptive-saodv prototype for performance enhancement in manet”, , April ’09 – September ’09, (IJ-CA-ETS).

[7] Durgesh Wadbude, Vineet Richariya “An Efficient Secure AODV Routing Protocol in MANET “,, (IJEIT) Volume 1, Issue 4, April 2012 .

[8] Savithru Lokanath, Aravind Thayur “Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs”, (IJSR), Volume 2 Issue 11, November 2013.

[9] Mr. Suketu D. Nayak, Mr. Ravindra K. Gupta “Sec.AODV for MANETs using MD5 with Cryptography”, IJCTA | July-Aug 2011.

[10] V.K.Taksande, Dr.K.D.Kulat, “Performance Comparison of DSDV, DSR, AODV Protocol with IEEE 802.11 MAC for Chain Topology for Mobile Ad-hoc Network using NS-2”, IJCA Special Issue on 2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011.

[11] Basavaraj, Sannakashappanavar, C R. Byrareddy, Ravikumar M. Inamathi “Security Enhancement in AODV Routing Protocol for MANETs”, , Int. J. on

[12] Sandhya Khurana Neelima Gupta Nagender Aneja “Reliable Ad-hoc On-demand Distance Vector Routing Protocol”, 2006 IEEE.

[13] The Network Simulator – NS2. (http://www.isi.edu/nsnam/ns/index.html).

[14] The NS Manual, http://www.isi.edu/nsnam/ns.

[15] MANET,.http://www.ietf.org/html.charters/manet charter.

[16] Yuxia Lin, A. Hamed Mohsenian Rad,Vincent W.S. Wong, Joo-Han Song WMuNeP’05,“Experimental Comparisons between SAODV and AODV Routing Protocols, , October 13.

[17] Eitan Altman, Tania Jimenez; NS Simulators for Beginners; lecture notes 2003-2004.

[18] Mustafa Jasim AL-Jubori, Prof. S. S. Pawale,Prof. S. R. Shinde “Efficient Ad-Hoc On-demand Distance Vector Routing Protocol using Link State Algorithm”, Vol 26– No.2, July 2011.