DocumentCode :
1681533
Title :
Improvising the performance with security of AODV routing protocol in MANETs
Author :
Pandya, Morli ; Shrivastava, A.K.
fYear :
2013
Firstpage :
1
Lastpage :
6
Abstract :
Networks are used in various fields. Network´s popularity has motivated the development of mobile ad-hoc networks (MANETs). A mobile Ad-hoc network is a kind of decentralized wireless system which creates a fast changing network. Due to the dynamic nature and changing topology, MANET is a growing dynamic network, also called mobile mesh network. Mobile ad-hoc network has various kinds of security concern problems, which are caused by their nature of collaborative and open systems and by limited availability of assets. Any central coordinator´s absence makes the routing a complex one compared to traditional networks. There are various Routing protocols in Mobile Ad-hoc network but the ad hoc on demand distance vector (AODV) is most popular widely used as it has many attributes. The performance will downgrade when particular host or nodes fails as it sends message regarding this to particular source. This paper observes the performance of AODV Reactive routing protocol and Analyzes different attacks that can be possible on AODV. The paper also explained two layer signature schemes with security which includes secure hash algorithm which further aimed at improving normal AODV´s performance. The paper also going to propose an extended version to the secure AODV protocol that includes secure hash algorithm aimed at further improving its security with network performance. Thus, this proposed approach improved by using NS2 simulator, a event-driven simulator which helps to improve various factors like performance factor and security factor.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; AODV reactive routing protocol; MANETs; NS2 simulator; ad hoc on demand distance vector; decentralized wireless system; dynamic network; event-driven simulator; fast changing network; mobile ad-hoc networks; mobile mesh network; secure hash algorithm; two layer signature schemes; Ad hoc networks; Mobile communication; Mobile computing; Routing; Routing protocols; Security; Mobile Ad-hoc networks; NS-2; Reactive routing protocol; Route discovery; SHA algorithm; Throughput;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Engineering (NUiCONE), 2013 Nirma University International Conference on
Conference_Location :
Ahmedabad
Print_ISBN :
978-1-4799-0726-7
Type :
conf
DOI :
10.1109/NUiCONE.2013.6780099
Filename :
6780099
Link To Document :
بازگشت