Reference Hub2
Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks

Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks

Raees Khan ShahSani, Muhammad Bakhsh, Amjad Mahmood
Copyright: © 2012 |Volume: 3 |Issue: 3 |Pages: 14
ISSN: 1947-9301|EISSN: 1947-931X|EISBN13: 9781466614550|DOI: 10.4018/jtd.2012070106
Cite Article Cite Article

MLA

Khan ShahSani, Raees, et al. "Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks." IJTD vol.3, no.3 2012: pp.57-70. http://doi.org/10.4018/jtd.2012070106

APA

Khan ShahSani, R., Bakhsh, M., & Mahmood, A. (2012). Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks. International Journal of Technology Diffusion (IJTD), 3(3), 57-70. http://doi.org/10.4018/jtd.2012070106

Chicago

Khan ShahSani, Raees, Muhammad Bakhsh, and Amjad Mahmood. "Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks," International Journal of Technology Diffusion (IJTD) 3, no.3: 57-70. http://doi.org/10.4018/jtd.2012070106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats. Among them, the Black-hole type of denial-of-service attack causes a major degradation in the performance and trust of the network nodes. In this paper, the authors review and highlight the limitations of the existing solutions and propose a new algorithm to handle the black-hole attacks. The proposed algorithm is comparatively efficient and easy to implement for detecting and avoiding the black-hole attacks. The proposed algorithm has been implemented in Network Simulator (ns-2) to evaluate its performance in term of packet delivery ratio, network load, and end-to-end delay. The simulation results show that the proposed algorithm achieves a considerable enhancement in the overall networking performance and avoids the black-hole attack successfully.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.