A Secure anonymous on-demand routing protocol to defend wormhole attack in Vehicular Adhoc Network

2014 ◽  
Vol 9 (1) ◽  
pp. 15-21
Author(s):  
Er. Gurjot Singh
2018 ◽  
Vol 7 (3.12) ◽  
pp. 621
Author(s):  
M Deepa ◽  
P Krishna Priya

In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network   acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile   Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases.  The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm.  This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.  


2017 ◽  
Vol MCSP2017 (01) ◽  
pp. 38-41
Author(s):  
Hari Shankar Sahu ◽  
Rupanita Das

Now a days telecommunication technology leads to a rapid growth of number of users, these number of users nothing but number of nodes in MANET.A wireless ad hoc network is a decentralized type of wireless network. The mobility of nodes effect on the performance of the network. Due to mobility of nodes the link breaks number of times which effect on the packet delivery. Therefore to analyze the performance, packet delivery fraction (PDF)can be used. This paper describe the packet delivery fraction of on demand routing protocol AODV and DSR on different terrain areas using GLOMOSIM.


2014 ◽  
Vol 651-653 ◽  
pp. 1868-1874
Author(s):  
Li Zhu ◽  
Lan Bai

VANETs is a rapid developed wireless mobile MANETs network with special challenge nature. It is a distributed and self-organized communication network based on moving vehicle. This network has characteristics like limited bandwidth, strong mobility, strong dynamic network topology, limited node degrees freedom, equipment capacity constraints and weak physical security. These characteristics usually make typical routing protocol in mobile MANET show a low efficiency in mobile VANETs, even fail. MANET routing algorithm is roughly divided into two categories, namely table driven routing protocol and on-demand routing protocol. It is due to the particularity of driving cars on the road. So how to improve network routing protocol in the performance is now a challenging problem. The purpose of this article studies network routing mechanism based on wireless vehicular networks simulation method. On the basis of analyzing the performance of typical routing protocols in MANET, such as DSDV, AODV and DSR, the improved scheme of AODV on-demand routing algorithm is put forward.


2005 ◽  
Vol 11 (1-2) ◽  
pp. 21-38 ◽  
Author(s):  
Yih-Chun Hu ◽  
Adrian Perrig ◽  
David B. Johnson

2008 ◽  
Vol 2 (4) ◽  
pp. 325-340 ◽  
Author(s):  
Qing Li ◽  
Meiyuan Zhao ◽  
Jesse Walker ◽  
Yih-Chun Hu ◽  
Adrian Perrig ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document