Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.

Authors and Affiliations

Richa Gulati , Savita Shivani

Keywords

Related Articles

 A Real Time Approach for Indian Road Analysis using ImageProcessing and Computer Vision

Abstract: Road image analysis is an important step towards building automated driver guidance system withthe aid of computer vision. Several road accidents and mishaps are reported every year due to driver negligenceand...

 Survey on Reversible Watermarking

 A number of research papers has been produced about reversible watermarking. Reversible watermarking is one of the important scheme of the watermarking schemes. Some security measures must be  there to prot...

 An Algorithm to Simulate the Temporal Database Using Exponential Distribution

 Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that bett...

 Factory Pattern in Model of Object Oriented Application Development

  Design pattern is a salient milestone in the development of coding techniques. Code reusability is the prime motive of design patterns and it promotes code development by finding the existing solution which could...

 A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations

 In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is  leaked...

Download PDF file
  • EP ID EP88848
  • DOI -
  • Views 158
  • Downloads 0

How To Cite

Richa Gulati, Savita Shivani (2014).  Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-5. https://europub.co.uk/articles/-A-88848