AODV Research Papers - Academia.edu (original) (raw)

The Mobile Ad-Hoc Networks (MANET) technology is a self-organized wireless interconnection of communication devices without the use of any fixed network infrastructure/backbone. The performance of Ad-hoc ondemand Distance Vector (AODV)... more

The Mobile Ad-Hoc Networks (MANET) technology is a self-organized wireless interconnection of communication devices without the use of any fixed network infrastructure/backbone. The performance of Ad-hoc ondemand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol is two MANET protocol. Selecting an appropriate routing protocol for steering data packet is a very important issue to evaluate the performance of wireless mobile ad-hoc networks (MANET). In order to guarantee an optimum use of these protocols, we need to test different routing protocols performances. This paper presents the performance analysis comparison of ad-hoc on-demand routing protocol (AODV) and Dynamic Source Routing (DSR) under different performance metrics like throughput, packet drop rate and end-to-end delay. Efficiency achieved by the AODV protocol is higher than DSR protocol in mobile ad-hoc networks. The simulation is done in Network Simulator (NS) 2.

Wireless Sensor Network (WSN) is an infrastructure less that has no central administration and limited capabilities in term of energy, power consumption, and data storage capacity. Furthermore, WSNs are key technologies for IoT. The... more

Wireless Sensor Network (WSN) is an infrastructure less that has no central administration and limited capabilities in term of energy, power consumption, and data storage capacity. Furthermore, WSNs are key technologies for IoT. The routing protocol is one of the most concerned areas in WSNs which is responsible for maintaining the routes in such that network. In this paper, we aim to enhance the security of WSN routing protocol. Our contribution is modified Ad Hoc On-Demand Distance Vector (AODV) routing protocol by building a security layer that utilizes Paillier homomorphic cryptographic mechanism; to protect forwarding packet data and routing during the communication and deliver data integrity and confidentiality The simulation is carried on NS-2 and the results of the proposed scheme are compared to the fundamental AODV routing protocol, these results are examined on various network performance metrices such as packet delivery ratio, throughput and end-to-end delay.

A Network which is form spontaneously by the collection of wireless nodes without any centralized administration or already existing network infrastructure called Mobile Ad-hoc Network (MANET). Performance evaluation of different Ad-Hoc... more

A Network which is form spontaneously by the collection of wireless nodes without any centralized administration or already existing network infrastructure called Mobile Ad-hoc Network (MANET). Performance evaluation of different Ad-Hoc networks routing protocols viz. DSDV, AODV & DSR on the basis of four parameter such as Packet delivery ratio, throughput, packet drop and routing overhead is main objective of this paper. NS-2, which is a discrete event simulation tool, is used in which The Tool Command Language (TCL) is used for simulation of varying parameter for routing algorithm. Importance of selection criteria of routing protocols in dynamic environment is illustrated in the result of this work.

This paper presents a literature review on WSN networks, in which the capacity of network nodes is limited with respect to energy supply, restricted computational capacity and communication bandwidth. WSN is a complex set of applications,... more

This paper presents a literature review on WSN networks, in which the capacity of network nodes is limited with respect to energy supply, restricted computational capacity and communication bandwidth. WSN is a complex set of applications, link technologies, communication protocols, traffic flows and routing algorithms. Simulation is a predominant technique used to study and analyze the performance of a wireless senor network design. To prolong the lifetime of these sensor nodes, designing efficient routing protocols are critical. Basically, the Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network which ensures reliable multi-hop communication. To address this issue, in this paper, various protocols like AODV (Ad-hoc on-demand distance vector routing), DSDV (Destination-Sequenced Distance-Vector Routing) and ZRP (Zone Routing Protocol) are discussed along with various comparative parameters like Throughput, Packet Loss Ratio, End to End Delay and Dropped Packets. The performance of these protocols varies depending on the simulation environment. It will be analyzed in two ways. Firstly, by varying nodes within a margin of 10 to 100 nodes. Another way is by keeping the number of nodes constant and varying the speed of nodes from 10 m/s to 90 m/s.

Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup.... more

Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure
to be configured which makes it more suitable to be used in environments that require on-the-fly setup. This paper discusses
the challenging issues in MANET routing security. It presents FrAODV, a trust-based scheme for securing AODV routing protocol
in MANET using the friendship mechanism. The nodes can evaluate the routing paths according to some selected features (such
as node reputation and identity information) before forwarding the data through these routes. We have used two types of implementation
in our scheme, simulation (using NS2) and real test-bed (using JADHOC). This scheme is believed to provide a robust environment where MANET nodes can trust each other in a secure community.

The need, popularity and easy deployment of MANET with less cost has increase its application areas from military to day-today life and research to business. The application uses MANET need best performance. MANETs are autonomous and... more

The need, popularity and easy deployment of MANET with less cost has increase its application areas from military to day-today life and research to business. The application uses MANET need best performance. MANETs are autonomous and infrastructureless in which nodes are free to move arbitrary, makes network topology unstable and the routing become complex in such dynamic nature of topology. The set of applications for MANETs is diverse, ranging from small to large-scale networks. The network area scalability is an important consideration while measuring the performance of MANET routing protocols. This paper evaluates the performance of MANET Routing Protocols OLSR, AODV, DSR, GRP and TORA on varying network area size using OPNET simulator. The performance of these routing protocols are measured and compared on 'Average Routing Load', 'Average end-to-end delay' and 'Average Throughput' metrics. The performance rank tables give insight to select better then the best routing protocol for application scenario.

Security[16] is an essential feature for wired and wireless network[1]. But due to its unique characteristics of MANETs[10], it creates a number of consequential security challenges to network. MANETs are vulnerable to various attacks[2],... more

Security[16] is an essential feature for wired and wireless network[1]. But due to its unique characteristics of MANETs[10], it creates a number of consequential security challenges to network. MANETs are vulnerable to various attacks[2], blackhole[12] is one of the possible attack. In this paper, we represent an intrusion detection[5] system for MANETs against blackhole attack using fuzzy logic[4]. Our system successfully detects the blackhole in the network and this information is passed to other nodes also. We also provide a detailed performance evaluation based on various network parameters. Our results show that the proposed system not only detects the blackhole[12] node, but improves the performance of AODV under the blackhole attack. General Terms Computer Network, Wireless Network, Manets, Security Issues.

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing... more

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic source routing (DSR) protocol.

MANETs are very advantageous and fruitful when there is no infrastructure or has been destroyed due to some reasons like earthquake, floods and so on. Data communication in MANETs are very challenging issue due to threats like limited... more

MANETs are very advantageous and fruitful when there is no infrastructure or has been destroyed due to some reasons like earthquake, floods and so on. Data communication in MANETs are very challenging issue due to threats like limited battery power, limited bandwidth, mobility, routing and QoS and so on. Due to these challenges and scarcity of resources in MANETs, it's very difficult to achieve high quality of service. QAODV, AODV, OLSR, DSDV and ZRP and so on, are some of very popular routing protocols for MANETs. Minimum no. of hops is the route selection criteria used by most of the routing protocols. This makes it necessary to consider QoS parameters to the routing protocols. Above mentioned protocols are not pure QoS routing protocol and insufficient to achieve high Qos because they do not consider parameters which will affect the QoS, Instead they only consider hop count as a route selection criteria. We present a new QoS based routing algorithm AODV-QSRP (AODV based QoS Routing Protocol) for Mobile Adhoc Netwok. AODV-QSRP is based on existing AODV and is reactive (On-Demand) in nature. AODV-QSRP attempts to provide high QoS for the real time applications while considering the various important QoS parameters like Bandwidth, Delay, Link Quality and Battery power for route selection. We have simulated and compared the performance of AODV-QSRP with QAODV, AODV, OLSR, DSDV and ZRP. To implement and simulating the result Network Simulator-2 (NS-2.32) on Fedora platform is used, which is an event driven and real-time simulator.

Ad hoc network is a collection of mobile nodes which dynamically form a temporary network without any infrastructure or centralize entity. There are number of routing protocol exists in ad hoc network and this protocols have been... more

Ad hoc network is a collection of mobile nodes which dynamically form a temporary network without any infrastructure or centralize entity. There are number of routing protocol exists in ad hoc network and this protocols have been compared. These protocols are like DSR (Dynamic Source Routing), AODV (Ad-hoc On Demand Distance Vector Routing Algorithm), and TORA (Temporally Ordered Routing Algorithm) like more. AODV is Reactive routing protocol. We modify the existing AODV protocol. All Routing Protocol have different Strategies of routing like End to End delay, Packet delivery ratio, Traffic overhead and Power Consumptions. Routing Deals with route discovery between source and destination. Aim of Dissertation is to improve route error tolerance mechanism of AODV. In our propose scheme the transmission starts from closest neighbor node if the link fail in middle of the transmission. That shows very important reductions in delay and it improves the packet delivery ratio. It also reduces the routing overhead by reducing frequency of route discovery process.

The ubiquity and ease of operation have made wireless networks extremely popular. The Downfall of such popularity is the increased attacks on Mobile Ad-hoc Networks (MANET). The attack studied in this paper is wormhole attack. The choice... more

The ubiquity and ease of operation have made wireless networks extremely popular. The Downfall of such popularity is the increased attacks on Mobile Ad-hoc Networks (MANET). The attack studied in this paper is wormhole attack. The choice of attack was based on the difficulty in identifying and mitigating the attack in real life scenarios. We used AODV protocol for the simulation; the most popular routing protocol used for small-scale networks. Wormhole attack is a potential threat to MANETs; it involves using a two-node system to route packets through a ‘tunnel’ created by the nodes. The attack enables the attacker to manipulate packet traffic, while making it difficult for an Intrusion Detection System (IDS) to detect.

Time has come where the communication is not just limited to only amongst humans. Now, the era has come where dreams of communicating vehicles is becoming the reality. Increasing demand of VANET implementation in car to car communication... more

Time has come where the communication is not just limited to only amongst humans. Now, the era has come where dreams of communicating vehicles is becoming the reality. Increasing demand of VANET implementation in car to car communication has resulted in congestion in handling multiple request and response among communicating and transiting vehicles. In addition to that, one to one congestion control needs to be addressed at each VANET node due to highly volatile traffic and frequently changing topology of the network. This paper presents a unique technique to control congestion over Vehicular Ad Hoc Networks using simple techniques of early detection of congestion. Further, researchers of this paper analyzed congestion control algorithm by implementing it on real time scenario over the simulation environment of SUMO, MOVE and NS2 to investigate the efficiency and probable improvements in the congestion.

In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed.... more

In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. Effective transmission power control is a critical issue in the design and performance of wireless ad hoc networks. Transmission Power affects the Survivability of the Network. Today, the design of packet radios and protocols for wireless ad hoc networks are primarily based on common-range transmission control. Mobility speed of the nodes and extension of ad hoc network affects the performance as well. In this paper, one of the widely used routing protocol AODV with varying transmission range, mobility speed and number of nodes is analyzed. Data transmitted by a node is received by all the nodes within its communication range. This paper focuses on the analysis of varying the range of the transmission in terms of distance, mobility speed and number of nodes in the network. The proposed work has been simulated using NS-2.34.The performance metrics comprises of Network Survivability has been analyzed in this paper.

Mobile Ad-Hoc Network is a collection of mobile node, which communicates with each other to share information among them. Each node acts as a router itself. They are freely to move and change their position within a network and arrange... more

Mobile Ad-Hoc Network is a collection of mobile node, which communicates with each other to share information
among them. Each node acts as a router itself. They are freely to move and change their position within a network and
arrange themselves share all resources with each other. But to share information a routing protocol is needed. Routing
protocol plays an important role in network design and provides the simplicity, decision rights to network, which will increase
the performance of network in various aspects. Like packet delivery ratio, packet delay, throughput, best route path, etc.

Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road... more

Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road condition, petrol bank details, menu in the restaurant, and discount sales can be provided to the drivers and passengers. The speed and time in which the message is sent and received plays an essential part in the Intelligent Transport System (ITS). For this the VANET requires efficient and reliable methods for data communication. Most of the earlier research works deal with the transaction based services provided by road side unit. Moreover the earlier works concentrate on the Intelligent Transport System limited to the city areas where road side units are available in plenty. But this
paper discusses the usefulness of VANET outside the city limit. Usually vehicles which move outside the city area do not get the response from the Road Side Unit (RSU) as its availability is limited. For efficient data communication, an attempt has been made to create a new clustering concept among the VANET nodes. The approach of the present paper considers the Simple Highway Vehicular model (SHWM), in which a new
clustering model has been introduced. This paper also focuses the service discovery through VANET in the absence of road side units when the vehicles are moving inside the city or outside the city.

Vehicular ad hoc networks (VANETs) are becoming popular and promising technologies in the modern intelligent transportation world. They are used to provide an efficient Traffic Information System (TIS), Intelligent Transportation System... more

Vehicular ad hoc networks (VANETs) are becoming popular and promising technologies in the modern intelligent transportation world. They are used to provide an efficient Traffic Information System (TIS), Intelligent Transportation System (ITS), and Life Safety. The mobility of the nodes and the volatile nature of the connections in the network have made VANET vulnerable to many security threats. Black hole attack is one of the security threat in which node presents itself in such a way to the other nodes that it has the shortest and the freshest path to the destination. Hence in this research paper an efficient approach for the detection and removal of the Black hole attack in the Vehicular Ad Hoc Networks (VANET) is described. The proposed solution is implemented on AODV (Ad hoc On demand Distance Vector) Routing protocol one of the most popular routing protocol for VANET. The strategy can detect both the single Black hole attack and the Cooperative Black hole attack in the early phase of route discovery. The simulation is carried on NS2 and the results of the proposed scheme are compared to [14] and the fundamental AODV routing protocol, this results are examined on various network performance metrics such as packet delivery ratio, throughput and end-to-end delay. The found results show the efficacy of the proposed method as throughput and the delivery ratio of the network does not deteriorate in presence of the back holes.

Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that can be established instantly without any help of fixed infrastructure and centralized monitoring. In this scenario, designing an efficient and secure routing protocol has... more

Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that can be established instantly without any help of fixed infrastructure and centralized monitoring. In this scenario, designing an efficient and secure routing protocol has been a major challenge over the last many years. In this paper, we study impact of RREQ flood attack of our proposed Neighbour Defence Technique for AODV (NDTAODV) with the existing Secure Ad Hoc On-demand Distance Vector (SAODV) and Ad Hoc On-demand Distance Vector (AODV) routing protocol by varying network size in MANETs with respect to four major performance metrics i.e. Packet Delivery Fraction (PDF), Average Throughput (AT), End-to-End Delay (AED) and Normalized Routing Load (NRL). Simulation results show that the NDTAODV gives better security and outperform the AODV in all performance metrics and also found nearly same result as that of SAODV with minimised AED and improved NRL without using any complex cryptography processing on the mobile node in MANETs.

Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR,... more

Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.

Wireless Mobile Ad-hoc networks (MANET) consist of a set of mobile and collaborative nodes, characterized by the lack of an infrastructure that manages the routing between the nodes of the network. wireless Mobile Ad-hoc networks in the... more

Wireless Mobile Ad-hoc networks (MANET) consist of a set of
mobile and collaborative nodes, characterized by the lack of an
infrastructure that manages the routing between the nodes of the
network. wireless Mobile Ad-hoc networks in the routing process
rely on the transfer of the data packet from source to Destination
over the network. The path from the source node to the Destination
node is chosen based on several criteria called path selection
criteria, single-path routing protocols store the best path of the
Destination node in the source node routing table, and multi-path
routing protocols store multiple paths for the Destination node in
the source node routing table with a view to existence Alternate
routes can be used if the user base path fails. In this research, we
conducted a performance Evaluation of the single-path routing
protocols in wireless mobile Ad-hoc networks AODV, DSR,
DSDV, where the nodes move random movement in the RWP
model, and the contract speed is changed for all performance
parameters (throughput -Data Packets Dropped - Average End-to-
End Delay - Packet Delivery Ratio/Fraction - Normalized Routing
Load - Routing Overhead). The study showed that the performance
of the AODV protocol is best for medium and slow speed in all
measured parameters, while performance of DSDV protocol is the
worst for medium and slow speed, and that there is no effective
routing protocol no matter how fast the nodes are.

Wireless Manet networks are relatively new compared to existing communications networks, their birth and evolution because of the rapid development of communications devices. Network nodes are connected without any type of connection or... more

Wireless Manet networks are relatively new compared to existing communications networks, their birth and evolution because of the rapid development of communications devices. Network nodes are connected without any type of connection or preconfiguration. This type of network is used in multiple areas and positions such as a network between vehicles within the city or a network between students in a room or meeting room. It is used in search and rescue operations and natural disasters because the infrastructure is destroyed. It is difficult to create a network of infrastructure in such cases. Each node in this type of network has a radio field in which to create a path to send and receive packets with other nodes that fall within the same domain. This path is formed by the routing protocol, which is the cornerstone of these networks, "Assessment of the performance of the AODV routing protocol in mobile wireless networks (MANET)", performance values of routing protocol in mobile wireless networks. We selected the most popular AODV routing protocol, simulated using the NS-2 emulator under many simulation scenarios, and guidelines for simulated scenarios, which provide good performance in environments with average number of nodes and data flows with them. We hope to be a valuable reference for colleagues who want to study this type of network.

In wireless ad hoc networks mobile stations or nodes are free to move around. The transmission range of the nodes is fixed in mobile ad hoc networks (MANETs) whereas the network topology changes in a different fashion. Due to dynamic... more

In wireless ad hoc networks mobile stations or nodes are free to move around. The transmission range of the nodes is fixed in mobile ad hoc networks (MANETs) whereas the network topology changes in a different fashion. Due to dynamic nature of network topology some of the network links are destroyed while some new links are established. The routing protocols developed for wired networks cannot be used efficiently for wireless networks. For wireless ad hoc networks there are a few new routing protocols suitable for the dynamically changing ad hoc wireless environment. In this paper we compare the performance of two on-demand routing protocols (AODV and DSR) in terms of QoS parameters such as throughput, minimum, maximum & average delay and packet delivery ratio. We performed extensive simulations using NS-2 simulator using both conventional TCP and TCP Vegas traffic sources.

VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing protocols may be implemented to... more

VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will affect the performance of the entire network as it consumes more bandwidth and drops packets which in turn reduce the performance of AODV routing protocol and vanet.

Mobile ad-hoc networks pose real difficulty in find ing the multihop shortest paths because of continuo us changing positions of the nodes. Traditional ad-hoc routing protocols are proposed to find multi-hop routes based on shortest path... more

Mobile ad-hoc networks pose real difficulty in find
ing the multihop shortest paths because of continuo
us
changing positions of the nodes. Traditional ad-hoc
routing protocols are proposed to find multi-hop
routes based on shortest path routing algorithms, w
hich cannot effectively adapt to time-varying radio
links and network topologies of Ad-hoc networks. In
this paper we proposed an enhanced routing
algorithm, which uses probabilistic approach for th
e stability of the neighboring nodes in finding and
maintaining the routing paths in Ad-hoc networks. T
he probability of a node being stable in the path i
s
modeled by queuing theory, where the stability of a
node is measured by number of packets arrived at a
node and the number of packets being serviced by th
e node per unit time. Proposed approach shows
significant improvement over the traditional Ad-hoc
on-demand distance vector routing protocol as
analyzed in the result analysis section.

Abstract: Mobile ad-hoc network (MANET) is an autonomous system connected by mobile nodes with wireless links. Due to absence of infrastructure, MANET is used in various applications, such as battlefield, business applications, and remote... more

Abstract: Mobile ad-hoc network (MANET) is an autonomous system connected by mobile nodes with wireless links. Due to absence of infrastructure, MANET is used in various applications, such as battlefield, business applications, and remote areas. As, communication among the nodes is through the insecure wireless link, security is very important issue for this type of networks. MANET is vulnerable to attacks such as Black hole attack, Gray hole attack, wormhole attack, Sybil attack, and Route table modification attack. Which is based on cluster organization of network, this paper provides is approaches are detected and prevent the black hole attack over the MANET. Most of them use the properties of malicious activities of node and network during attack condition. These techniques are provides the efficient detection and prevention over MANET environment this techniques are limited to adopt a single problem of security from black hole detection.
Keywords: MANET, Black hole attack, MAC, AODV, QOS.
Title: A WEIGHTED CLUSTERING ALGORITHM FOR IMPROVING MANET SECURITY
Author: Shirsty Chandel, Prof. Ashish Tiwari
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals

MANET network is a network consisting of a collection of nodes and its dynamic nature and can be made anywhere without using a fixed network infrastructure such as base station, making MANET vulnerable to attacks. One of several attacks... more

MANET network is a network consisting of a collection of nodes and its dynamic nature and can be made anywhere without using a fixed network infrastructure such as base station, making MANET vulnerable to attacks. One of several attacks that occur in the MANET network are black hole and gray hole attacks. Black hole attack is an attack that causes packets around the attacker's node to be lost so that network is at a loss and gray hole attack transmit the packets in inappropriate director or routes. Choosing the right routing protocol is one of the efforts to minimize the impact of black hole attacks. This research was made to enhance the behaviour of AODV routing protocols in minimize the impact of black hole and grey hole attacks. The results of this scheme indicate that proposed AAODV is better than AODV from several qualities of service values such as throughput, delay and packet loss

Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a... more

Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks a re a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model,... more

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and quality of service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile adhoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyzed in the presence of varying the number of mobile nodes, pause time, and traffic connection numbers. Moreover, Routing and QoS performance metrics such as normalized routing load, routing packet, packet delivery ratio, packet drop, end-to-end delay, and throughput are measured to conduct a performance comparison between three routing protocols. Simulation results indicate that AODV outperforms the DSDV and AOMDV protocols in most of the metrics. AOMDV is better than DSDV in terms of end-to-end delay. DSDV provides lower throughput performance results. Network topology parameters have a slight impact on AODV performance.

This chapter presents a multihop routing solution, called Hopefully Longest Jump First, specifically proposed for WSNs arranged in a linear topology and compares it to two simple approaches, named Single Hop and Limited Flooder. At the... more

This chapter presents a multihop routing solution, called Hopefully Longest Jump First, specifically proposed for WSNs arranged in a linear topology and compares it to two simple approaches, named Single Hop and Limited Flooder. At the application level, we suppose that a Master Node, deployed at one side of the WSN, progressively queries each of the N Slave Nodes. On its turn, when queried, a Slave Node replies to the Master Node. The performance of the proposed routing schemes is evaluated and compared on the basis of experimental results involving a real indoor WSN composed of 11 Telos motes, representing 1 Master Node and 10 Slave Nodes. The WSN has been deployed inside ISMB Lab. The analysis is based on performance metrics such as end-to-end delay and end-to-end packet delivery success rate, also considering the impact of the distance between two adjacent nodes and thus the expected number of neighbors within a node radio coverage.