Investigating the Impact of Selfish Node on AODV Routing Protocol in MANETs in the Context of Simulation Time

Author(s):  
P.V.Venkateswara Rao ◽  
◽  
S. Pallam Shetty

Mobile ad hoc network is appealing mechanization in many applications, including disaster recovery and communication systems and rescue due to the flexibility offered by the diverse network. An equivalent network, although it has been found that legitimate can operate independently, or may link to the wider Internet. A framework has been introduced in recent years operators and attackers, have used this network environment. Mobile Ad hoc Network is the main concern about dynamic routing access. Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast. AODV routing protocol cannot protect against a wormhole attack. In this paper, we implement a technique of pseudo-DNA cryptography, focused on the molecular biology’s central dogma. In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole attack. In the sense of ratio for packet drop, throughput and the delay between two nodes we also examine the impact of the wormhole attack on a parameter of ad hoc network.


2021 ◽  
Vol 14 (1) ◽  
pp. 93-102
Author(s):  
Mallikarjuna Anantapur ◽  
◽  
Patil Venkanagouda ◽  

Mobile ad hoc network is a self-organizing wireless network, which is formed by the wireless mobile devices without any centralized infrastructure. The mobile nodes in the network are mainly affected by the inherent characteristics such as unpredictable network topology and open wireless medium. Especially, the presence of selfish nodes in the network creates the packet loss and affects an entire communication system. In this paper, the hash function with position updating algorithm is proposed in the Ad hoc On-Demand Distance Vector (AODV) routing protocol for improving the security against the selfish nodes. The AODV routing protocol is used to transmit the data packets from the source to the destination. Therefore, the Prevention of Selfish Node using Hash Function (PSNHF) with position update algorithm is proposed for minimizing the packet loss through the network. The performances of proposed AODV-PSNHF method are analysed in terms of energy consumption, throughput, Packet Delivery Ratio (PDR), packet loss and normalized routing load. In addition, the AODV-PSNHF method is compared with the existing trust-aware ad-hoc routing protocol (T2AR). The selfish node identification using hash function and positioning update using AODV-PSNHF method provides reliable and secure data transmission under selfish nodes and shows better performance in terms of throughput, packet delivery ratio and packet loss. For 2% of malicious nodes the PDR of the AODV-PSNHF method is 89%, it is 9% higher when compared to the T2AR protocol whose PDR% is only 80% for the same.


2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


Sign in / Sign up

Export Citation Format

Share Document