scholarly journals AOMDV-OAM: A Security Routing Protocol Using OAM on Mobile Ad Hoc Network

2021 ◽  
pp. 104-110
Author(s):  
Le Duc Huy ◽  
◽  
Luong Thai Ngoc ◽  
Nguyen Van Tam ◽  

On-demand routing protocol is designed to work efficiently on mobile ad hoc networks (MANET). They operate with the belief that all nodes in the network are friendly, thus hackers exploiting security vulnerabilities to carry out some form of cyber attacks, especially Flooding attacks. This form of attack is easily accomplished by overflowing route request packets into the network. Once the attack frequency is large enough, it shall interfere with the route discovery of other network nodes, damaging network performance. In this article, we will analyze and evaluate the impact of flood attacks on the performance of two routing protocols AOMDV. Thereby, we describe a security solutions using the One Time Password (OTP) authentication mechanism (OAM) and implementing AOMDV-OAM security protocol, which is improved from the AOMDV protocol by using OAM to reduce the harmful effects of flood attacks. Using NS2, we assess the security effectiveness of the AOMDV-OAM protocol in random waypoint network topologies where has flooding attacks. Simulation results show that AOMDV-OAM protocol is very effective in minimizing the harmful effects of flood attacks, the rate of successful packet delivery reached over 99% when the one malicious node attacked with a frequency of 20pkt/s and 50pkt/s for Grid network topology.

Mobile ad hoc network is appealing mechanization in many applications, including disaster recovery and communication systems and rescue due to the flexibility offered by the diverse network. An equivalent network, although it has been found that legitimate can operate independently, or may link to the wider Internet. A framework has been introduced in recent years operators and attackers, have used this network environment. Mobile Ad hoc Network is the main concern about dynamic routing access. Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast. AODV routing protocol cannot protect against a wormhole attack. In this paper, we implement a technique of pseudo-DNA cryptography, focused on the molecular biology’s central dogma. In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole attack. In the sense of ratio for packet drop, throughput and the delay between two nodes we also examine the impact of the wormhole attack on a parameter of ad hoc network.


Author(s):  
Moulay Hicham Hanin ◽  
Mohamed Amnai ◽  
Youssef Fakhri

Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


Sign in / Sign up

Export Citation Format

Share Document