A MANET Security Using Routing Methodology

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Wireless networks are growing now in these days and different kind of wireless applications are developed using ad hoc configuration. Mobile ad hoc network is a kind of such wireless network. Due to its ad hoc nature and mobility support the routing protocol played essential role in network. The main responsibility of routing protocol is to create and maintain topology on demand basis. Therefore the ad hoc network is suffers from performance and security issues. Therefore the proposed study investigates the routing protocols supported by mobile ad hoc network and the routing based attack deployment techniques. After analysing them a solution for black hole attack security is provided. The proposed solution involves the implementation of secure route discovery protocol. In order to implement the proposed routing technique traditional AODV routing protocol is modified. The routing protocol is modified in such ways by which the routing path trust value is evaluated and compared for making a decision for malicious path detection. For creating the decisional threshold packet delivery ratio, energy and high sequence number is selected. The implementation and simulation of the proposed routing protocol is performed using network simulator 2. In addition of that the comparative performance study between AODV routing protocol and modified AODV routing protocol is performed. In the comparative study packet delivery ratio and throughput of network is found optimum and better than traditional routing protocol.

Authors and Affiliations

Keywords

Related Articles

Features Preferred by Primary School Children in School Uniforms

In today’s world, clothing plays an important role irrespective of the cultures. Clothing is the most intimate environment as it can be carried everywhere with an individual, creating its own room within a room and its o...

The Evaluation of the Electrical Activity of the Chewing Muscles

Abstract: The aim of the study was to evaluate the relation between the teeth occlusion and electrical activity of the chewing muscles. Materials and method: The analyzed sample included 40 adult healthy patients 20 male...

Relationship between Music Preference and Personality Type

"Abstract Music is universally omnipresent and in contemporary society, music is so pervasive that it is absolutely unavoidable. The deliberate access of FM radios in cars, iPods, smart phones and speaker systems has mad...

Comparative Study of Heat Transfer Rate between General Water and Distilled Water

The main objective is to compare the heat transfer rate between two fluids, i.e. general water and distilled water. Here we conduct the heat produce by solar radiation, in this project we are using parabolic trough conce...

A Literature Survey on Contrast Data Mining

Data mining refers to extracting or “mining” knowledge from large amount of data. Data mining also called KDD (Knowledge Discovery). There are some types of classification techniques : Decision Tree, Naïve Bayesian, Neur...

Download PDF file
  • EP ID EP357459
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

(2015). A MANET Security Using Routing Methodology. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357459