Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.

Authors and Affiliations

Richa Gulati , Savita Shivani

Keywords

Related Articles

 Conjunctive Use of Surface and Groundwater as Agri-tourismResource Facilitator: Discourse Analysis for Planning inDeveloping Nations

 Abstract: Ecotourism is increasingly exhibited as a component of the conventional tourism that needsaugmentation with enhanced availability of water resources in sustainable modes. This sustainability isattainable...

 Monitoring Wireless Sensor Network using Android based Smart Phone Application

 Abstract: Wireless Sensor Network application’s is use in detection of natural calamities like forest fire detection, flood detection, , earth quick early detection ,snow detection, traffic congestion and various o...

Applications for Big Data in of Intelligent Distributed Processing

Abstract: Today, “Big Data” has posed new problem of over-information in many different areas. Such areasinclude health care (e.g., hospitals, bioinformatics), e-sciences (e.g., physics, chemistry, and geology), andsocia...

 An Approach to Single Documnent Text Summarization & Simplification

 Abstract: The amount of information available on the internet is increasing day by day which is leading to information overload. For more information than can realistically be digested is available on the World-Wid...

 A Short-Normalized Attack Graph Based Approach for Network Attack Analysis

 Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possibl...

Download PDF file
  • EP ID EP88848
  • DOI -
  • Views 136
  • Downloads 0

How To Cite

Richa Gulati, Savita Shivani (2014).  Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-5. https://europub.co.uk/articles/-A-88848