Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

AODV: Security Considerations

Print
PDF
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications
© 2015 by IJCA Journal
ICACCTHPA 2014 - Number 1
Year of Publication: 2015
Authors:
Serin V Simpson
Saju P John

Serin V Simpson and Saju P John. Article: AODV: Security Considerations. IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014(1):5-12, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Serin V Simpson and Saju P John},
	title = {Article: AODV: Security Considerations},
	journal = {IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications},
	year = {2015},
	volume = {ICACCTHPA 2014},
	number = {1},
	pages = {5-12},
	month = {February},
	note = {Full text available}
}

Abstract

AODV (Ad hoc On Demand Vector) is a reactive routing protocol in wireless mobile ad hoc network (MANET). AODV is accepted because of its capacity to adjust quickly in dynamic system environment with least overhead and small management packet size. The adhoc networks are all that much helpless against Dos attacks on the network layer. Blackhole and Grayhole attacks are the far reaching attacks on adhoc networks. Here the malicious nodes intrude on information transmission in the system by transmitting false routing data. The AODV routing protocol was at first created without considering security as a top priority. So it is not ready to shield against any sort of security attack. However there are numerous security mechanisms available that make AODV secure.

References

  • Sibichen, S and S. Sreedhar. 2013. An Efficient AODV Protocol and Encryption Mechanism for Security Issues in Adhoc Networks, International Conference on Microelectronics, Communication and Renewable Energy, 184-194.
  • Sony, S. J. and S. D. Nayak. 2013. Enhancing Security Features & Performance of AODV Protocol under Attack for MANET, IEEE Transactions on mobile computing, 325-328.
  • Jalil, K. A. , Z. Ahmad and J. L. A. Manan. 2011. Securing Routing Table Update in AODV Routing Protocol, IEEE Conference on Open Systems, 116-121.
  • Jhaveri, R. H. 2013. MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs, Third International Conference on Advanced Computing & Communication Technologies, 254-260.
  • Jhaveri, R. H. , S. J. Patel and D. C. Jinwala. 2012. A Novel Solution for Grayhole Attack in AODV Based MANETs, In Proc. of Third International Conference on Advances in Communication, Network and Computing: Springer, 60-67.
  • Jhaveri, R. H. , S. J. Patel and D. C. Jinwala. 2012. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs, INFOCOMP Journal of Computer Science, 1-12.
  • Zain, J. M. , W. M. B. W. Mohd and E. E. Qawasmeh. 2011. Software Engineering and Computer Systems, Second International Conference, ICSECS, 102-115.
  • Lakhtaria, K. , B. N. Patel, S. G. Prajapati and N. N. Jani. 2009. Securing AODV for MANETs using Message Digest with Secret Key, International Journal of Network Security & Its Applications, 111-116.
  • Patil, S. and J. Raghatwan2. 2014. Survey on Security in Wireless Ad-hoc Network, International Journal of Science and Research, 2041-2044.
  • Sibichen, S and S. Sreedhar. 2013. An Efficient AODV Protocol and Encryption Mechanism for group Communication and Preventing Attacks in Adhoc Networks, International Journal of Scientific & Engineering Research, 01-06.
  • Khachar, K. N. and J. B. Shah. 2014. Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey, IOSR Journal of Computer Engineering, 108-112.
  • Jalil, K. A. , Z. Ahmad and J. L. A. Manan. 2011. ERDA: Enhanced Route Discovery Mechanism for AODV Routing Protocol against Black Hole Attacks, IEEE Conference on Open Systems, 116-121.