HASH Mechanism to Secure the AODV Protocol in MANETs

Abstract

Mobile ad-hoc networks are self forming network without any fixed infrastructure. An ad hoc network does not have fixed infrastructure, it means a network without the standard routing infrastructure like fixed routers and routing backbones. Since the network is self configuring it is prone to security problems [19]. One such aspect is Routing .The most widely used protocol for ad-hoc networks is DSDV and AODV. The routing protocol Ad hoc On Demand Distance Vector has been built without considering any security mechanisms. In AODV the updates are generated as per demand not on a periodic basis. The freshness of routing in AODV is recognized by the control packet which contains hop-count and sequence field. As the fields are editable, it creates a possible vulnerability that is recurrently abused by malicious nodes to advertise false enhanced routes. To improve the security there are some new mechanisms like hash chains and digital signature. To verify the correct functionality of the protocol it is implemented on NS2 simulator and performed extensive simulations and performance evaluations. This experimentation considers parameters such as packet delivery ratio, control overhead and throughput.

Authors and Affiliations

Sudarsanan. D

Keywords

Related Articles

Wireless Multimedia Sensor Network: A Review

Wireless Sensor Network (WSN) is emerging field of research for multimedia communication. A wireless sensor network (WSN) is a network of spatially distributed devices using sensors in a dense manner. This network monito...

Introduction to Image Registration in Remote Sensing using Matlab

Image registration is used as a preliminary step in other image processing applications. It is difficult to find an accurate, robust, and automatic image registration method, and most existing image registration methods...

Hybrid Power Generation by Using Solar and Wind Energy Hybrid Power Generation Applicable To Future Electric Vehicle

The objective of this concept is to generate electric power from windmill and solar panel and synchronizing with EB power supply. Nowadays power demand is increased highly so need the alternate power source it is very us...

Study of the Evaluation of Damage Caused By Tuta Absoluta (Meyrick) (Lepidoptera: Gelichidae) on Tomato Field in Morocco (Etude de l’évaluation des dégâts provoqués par Tuta Absoluta (Meyrick) (Lepidoptera: Gelichidae) sur tomate en plein champ au Maroc)

Tomato crops in the field, suffering the attacks of a new miner: Tuta absoluta (Meyrick) that caused significant losses in production. The insect may cause losses on tomatoes up to 80 to 100%. The larva is the damaging s...

Trajectory Privacy in Participatory Sensing using K-anonymity

Development of mobile communication, applications represents a challenge for both conceptually and technically so the basic requirements of LBS (location-based services) are numerous. Complex task is to provide user with...

Download PDF file
  • EP ID EP220529
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Sudarsanan. D (2014). HASH Mechanism to Secure the AODV Protocol in MANETs. International journal of Emerging Trends in Science and Technology, 1(5), 579-584. https://europub.co.uk/articles/-A-220529