International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Savithru Lokanath, Aravind Thayur

Ad-hoc mobile networks are very dynamic, self-organizing; self-healing distributed networks which support data networking without an infrastructure. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. Ad-hoc network is a self-organized, dynamically changing multi-hop network. All mobile nodes in an ad-hoc network are capable of communicating with each other without the aid of any established infrastructure or centralized controller. The user can use the network services efficiently and securely while moving. AODV (Ad-hoc On-demand Distance Vector) is a loop-free routing protocol for ad-hoc networks. It is designed to be self-starting in an environment of mobile nodes, withstanding a variety of network behaviors such as node mobility, link failures and packet losses. The AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional routing tables, one entry per destination, and sequence numbers to determine whether routing information is up-to-date and to prevent routing loops.

Keywords: Manets, AODV protocol, Attacks, Malicious nodes

Edition: Volume 2 Issue 11, November 2013

Pages: 374 - 379


How to Cite this Article?

Savithru Lokanath, Aravind Thayur, "Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013499, Volume 2 Issue 11, November 2013, 374 - 379

23 PDF Views | 18 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'Manets'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1987 - 1989

Secured Routing Using ALERT in MANETs

Aniket K. Khasnikar, Smita Kapse

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 980 - 982

A Survey on Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Kajal B. Kunte, Navnath D. Kale

Share this article

Similar Articles with Keyword 'AODV protocol'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti, Dr. Sumit Mittal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1158 - 1163

Performance Analysis of Black hole Attack using CBR/UDP Traffic Pattern with AODV routing Protocol in VANET

Bharti, D.P.Dvedi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 996 - 998

Induced Physical and Chemical Mutagensis on Seed Germination of Chickpea (Cicer arietinum L.)

Manisha G. Nagargoje, Navnath G. Kashid

Share this article

Similar Articles with Keyword 'Attacks'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1783 - 1785

Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

S. N. Shitole, A D Gujar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1297 - 1299

Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Jessy Cherian

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this article

Similar Articles with Keyword 'Malicious nodes'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1827 - 1832

A Device to Device Communication with Trusted Node Mapping in Cellular Network

Vivek Kumar Sinha, Kedarnath Singh

Share this article

Top