Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.

Authors and Affiliations

Richa Gulati , Savita Shivani

Keywords

Related Articles

A Survey on Different Levels of Risks during Different Phases in Data Warehouse

Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...

 Classification of Mammogram Images for Detection of BreastCancer

 Abstract: Breast cancer is the most commonly observed cancer in women both in the developing and thedeveloped countries of the world. The survival rate in it has improved over the past few years with thedevelopment...

A New Multi-Agent Game Solver

Abstract: A new N-person game solver is presented in this work. The new software is an advance in the whole sate of art for the investigation of N-person games. It is now possible to investigate entire classes of games a...

 Detecting Masquerade in Face Recognition System – A Literature survey

 A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of masq...

 Human Being Character Analysis from Their Social Networking Profiles

In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...

Download PDF file
  • EP ID EP88848
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Richa Gulati, Savita Shivani (2014).  Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-5. https://europub.co.uk/articles/-A-88848