International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064



Downloads: 117

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016


A Survey of Protocols Enhancing the Security and Performance of AODV

Mahima Sharma [2] | Ankita Singh [9]


Abstract: MANET (Mobile Ad Hoc Networks) is a collection of mobile devices such as laptops, mobiles, etcetera that communicate with each other without an access point. Since the devices are on the move, the topology of the MANET keeps on changing. Due to various inherent as well as circumstantial issues of MANET, routing protocols lack in features such as Security, Performance and Power consumption. Ad-hoc On-Demand Distance Vector (AODV) Routing is a reactive routing protocol for MANET. The pitfall of this algorithm is that it wasn’t built keeping security in mind. Several modifications in the protocol have been proposed and implemented to improve its security and performance. This paper aims at presenting a comparative study of some of the approaches presented to enhance AODV’s security and performance. For example: Hashing, Key Management, AODV-AD, IMAODV, Zonal Routing (AODV).


Keywords: MANET, AODV, Reactive Routing Protocol, Hashing, Key Management, AODV-AD, IMAODV, Zonal Routing


Edition: Volume 5 Issue 4, April 2016,


Pages: 814 - 818


How to Download this Article?

Type your Email Address Below, Click Anywhere Outside the Box, That will Activate the Download Button




How to Cite this Article?

Mahima Sharma, Ankita Singh, "A Survey of Protocols Enhancing the Security and Performance of AODV", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 814-818, https://www.ijsr.net/get_abstract.php?paper_id=NOV162692



Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [25]

Share this Article


Top