Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 4
Year of Publication: 2014
Authors:
Clarita T. Pinto
Manjunatha A. S.

Clarita T Pinto and Manjunatha A S.. Article: Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(4):9-16, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Clarita T. Pinto and Manjunatha A. S.},
	title = {Article: Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {4},
	pages = {9-16},
	month = {October},
	note = {Full text available}
}

Abstract

Mobile ad hoc networks (MANETs) are infrastructure less networks which consist of dynamic collection of nodes with rapidly changing topologies of wireless links. MANETS are mobile and therefore, they use wireless connections to connect to various networks. Devices in range can communicate in a point-to-point fashion. MANETs are liable to different types of DoS attacks in which packets are dropped. Black hole attack is an event that degrades the performance of the network. This paper discusses the effects of the malicious attacks and the comparison of AODV Routing Protocol with the Revised AODV Routing Protocol in the presence of the Black hole attack based on performance metrics.

References

  • MANETDefinition: http://www. techopedia. com/definition/5532/mobile-ad-hoc-network-manet.
  • MANET Characteristics: http://www. eexploria. com/manet-mobile-ad-hoc-network-characteristics-and-features/
  • Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  • M. Abolhasan, T. Wysocki, E. Dutkiewicz, "A Review of Routing Protocols for Mobile Ad- Hoc Networks", Telecommunication and Information Research Institute University of Wollongong, Australia, June, 2003.
  • C. E. Perkins, E. M. Belding Royer; and S. R. Das (2003) Ad hoc on demand distance vector (AODV) routing RFC 3561. The Internet Engineering Task force, Network Working Group.
  • Ochola EO, Eloff MM, A Review of Black Hole Attack on AODV Routing in MANET.
  • Tamilselvan, L. and Sankaranarayanan, V. , "Prevention of Black hole attack in MANET". The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 21-21, 2007
  • Dokurer, S. ; Ert, Y. M. ; and Acar, C. E. , "Performance analysis of ad hoc networks under Black hole attacks", Southeast Con, 2007, Proceedings IEEE, 148 – 153.
  • Black hole effect mitigations method in AODV routing protocol, 2011 IEEE, Zaid Ahmad, Kamarularifin Abd, Jamalul-lail Ab Manan.
  • Humaira Ehsan, Farrukh Aslam Khan, "Malicious AODV-Implementation and Analysis of Routing Attacks in MANETs"- 2012 IEEE.
  • Sheenu Sharma, Dr. Roopam Gupta, "Simulation Study of Black Hole Attack in the Mobile Ad hoc Networks", November 2009
  • Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto. "Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Security", Vol. 5, No. 3, PP. 338– 346, Nov. 2007
  • ns-2, Network Simulator, http://www. isi. edu/nsnam/ns.
  • Mobility Models: http://www-public. it-sudparis. eu/~gauthier/MobilityModel/mobilitymodel. html
  • Mobility Models: http://en. wikipedia. org/wiki/Mobility_model.
  • Yogesh Chaba, R. B. Patel, Rajesh Gargi, "Analysis Of Mobility Models For Mobile Ad Hoc Networks" Voyager- The Journal of Computer Science and Information Technology, ISSN 0973-4872, Vol. 6, No. 1, July-Dec. 2007 p. p. 50-55.
  • Bhavyesh Divecha1, Ajith Abraham, Crina Grosan and Sugata Sanyal, "Impact of Node Mobility on MANET Routing Protocols Models" School of Technology and Computer Science, Tata Institute of Fundamental Research, India.
  • Tracy Camp, Jeff Boleng and Vanessa Davies, A survey of Mobility Models for Ad hoc Network Research, Wireless Communications and Mobile computing: A special issue on Ad hoc network Research, vol 2, No5, pp. 483-502, 2002.
  • Modified AODV Protocol against Blackhole Attacks in MANET K. Lakshmi1, S. Manju Priya A. Jeevarathinam3 K. Rama4, K. Thilagam, International Journal of Engineering and Technology Vol. 2 (6), 2010, 444-449.