ijaser
IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.
Ad hoc On Demand Vector (AODV) is a reactive routing protocol in Mobile Ad hoc Network (MANET). Although the protocol has been around for quite some time, but there is still security issue which made it vulnerable to various attacks such as black hole which tremendously affects
the network performance. There have been several works done to mitigate this problem but
most of the proposed methods introduce overhead to the existing protocol i.e. extra control messages. Most of MANET devices are resource constraint and therefore a light solution is needed. For this reason, in this paper we proposed a method called ERDA (Enhance Route Discovery for AODV). The proposed method is able to mitigate the aforesaid problem by introducing new conditions in the routing table update process and also by adding simple malicious node detection and isolation process to the AODV route discovery mechanism. The proposed method does not introduce any additional control message and moreover, it does not change the existing protocol scheme. In
order to test the proposed method, a simulation model was developed. The simulation results show significant improvement to the network performance after ERDA is implemented in the AODV as compared to the existing AODV protocol.
1. Perkin, C.E., Royer, E.M.: Ad-hoc on demand distance vector routing.
In: Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications, New
Orleans(1999).
2. Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Elsevier, Amsterdam (2004).
3. Mahmood, R.A., Khan, A.I.: A Survey on Detecting Black Hole Attack in AODV- based Mobile Ad Hoc Networks. In: International Symposium on High Capacity Optical Networks and Enabling Technologies (2007).
4. Perkin, C.E.: Ad hoc On Demand Distance Vector (AODV) Routing. Internet draft, draft-ietf- manetaodv-02.txt (November1988).
5. Kumar, V.: Simulation and Comparison of AODV and DSR Routing Protocols in MANETs, Master
Thesis (2009).
6. Xing, F.,Wang, W.: Understanding Dynamic Denial of Service Attacks in Mobile Ad hoc Networks.
In: IEEE Military Communication 2006.
7. Kandwal, Algorithm for Detection and Prevention of Cooperative Black and GrayHoleAttacks in
Mobile Ad Hoc Networks, International Journal ofComputer Applications Volume 1 (2010).
8. Abderrahmane Baadache, Ali Belmehdi, Avoiding Black hole and Cooperative Black hole Attacks in Wireless Ad hoc Networks (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
9. E. A .Mary Anita, V. Vasudevan, BlackHole Attack Prevention in Multicast Routing
Protocols for Mobile Ad hoc networks using Certificate Chaining, International Journal of Computer
Applications (0975 – 8887) Volume 1 – No. 12 (2010).
10. Suman Deswal and Sukhbir Singh, Implementation of Routing Security Aspects in
AODV,International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February,
2010.
11. Sanzgiti, K., Dahill, B., Levine, B.N., Shields, C., Elizabeth, M., Belding-Royer: A secure Routing Protocol for Adhoc networks. In: Proceedings of the 10th EEE International Conference on Network Protocols, ICNP 2002 (2002).
12. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In: Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3–13 (June 2002).