HASH Mechanism to Secure the AODV Protocol in MANETs
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 5
Abstract
Mobile ad-hoc networks are self forming network without any fixed infrastructure. An ad hoc network does not have fixed infrastructure, it means a network without the standard routing infrastructure like fixed routers and routing backbones. Since the network is self configuring it is prone to security problems [19]. One such aspect is Routing .The most widely used protocol for ad-hoc networks is DSDV and AODV. The routing protocol Ad hoc On Demand Distance Vector has been built without considering any security mechanisms. In AODV the updates are generated as per demand not on a periodic basis. The freshness of routing in AODV is recognized by the control packet which contains hop-count and sequence field. As the fields are editable, it creates a possible vulnerability that is recurrently abused by malicious nodes to advertise false enhanced routes. To improve the security there are some new mechanisms like hash chains and digital signature. To verify the correct functionality of the protocol it is implemented on NS2 simulator and performed extensive simulations and performance evaluations. This experimentation considers parameters such as packet delivery ratio, control overhead and throughput.
Authors and Affiliations
Sudarsanan. D
Performance evaluation of TiN coated CBN inserts during hard turning of AISI 4340 steel with using Taguchi-Grey-Fuzzy approach
This Hard turning finds a broad range of applications in manufacturing industries. The high wear resistance along with high dimensional accuracy is the primary attributes of the process. However, the critical setback ass...
Dual Sentiment Analysis with Three-Stage Model for Complex Polarity Shift Patterns with Two Sides of One Review
Sentiment classification is a unique process of text categorization whose objective is to categorize a text related to the sentimental polarities of opinions it consists of constructive or adverse, positive or negative....
Detection of Forgery Part in Forgery Image Using Color Intensity
Since many decade’s photographs have been used to document space time events and they have often served as evidence in courts. This process is very time consuming and requires expect knowledge, although photographers are...
Improved Technique by Integrating AHP-TOPSIS for Prioritization
Requirements prioritization is used to minimize risk during development of the software project, so that the most important requirements are implemented first. There are many prioritization techniques are available to pr...
Study on Performance of Infill Wall Masonry RCC Frame Using Alternative Types of Bricks
Here the particular meaning of alternative type of bricks means the non-conventional type of bricks with new idea of using waste polymer materials. This bricks can be become translucent, insulating, light, strong and mec...