A MANET Security Using Routing Methodology
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 173 , Downloads: 106 | CTR: 61 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Wireless networks are growing now in these days and different kind of wireless applications are developed using ad hoc configuration. Mobile ad hoc network is a kind of such wireless network. Due to its ad hoc nature and mobility support the routing protocol played essential role in network. The main responsibility of routing protocol is to create and maintain topology on demand basis. Therefore the ad hoc network is suffers from performance and security issues. Therefore the proposed study investigates the routing protocols supported by mobile ad hoc network and the routing based attack deployment techniques. After analysing them a solution for black hole attack security is provided. The proposed solution involves the implementation of secure route discovery protocol. In order to implement the proposed routing technique traditional AODV routing protocol is modified. The routing protocol is modified in such ways by which the routing path trust value is evaluated and compared for making a decision for malicious path detection. For creating the decisional threshold packet delivery ratio, energy and high sequence number is selected. The implementation and simulation of the proposed routing protocol is performed using network simulator 2. In addition of that the comparative performance study between AODV routing protocol and modified AODV routing protocol is performed. In the comparative study packet delivery ratio and throughput of network is found optimum and better than traditional routing protocol.

Keywords: MANET, Black hole attack, MAC, AODV, QOS, NS2, Packet delivery ratio

Edition: Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

Share this Article

How to Cite this Article?

Shirsty Chandel, Prof. Ashish Tiwari, "A MANET Security Using Routing Methodology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152425, Volume 4 Issue 3, March 2015, 1742 - 1748

173 PDF Views | 106 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 140 , Downloads: 77 | CTR: 55 % | Weekly Popularity: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 146 , Downloads: 83 | CTR: 57 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 157 , Downloads: 88 | CTR: 56 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Black hole attack'

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 133 , Downloads: 104 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Views: 150 , Downloads: 106 | CTR: 71 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Views: 173 , Downloads: 106 | CTR: 61 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Views: 131 , Downloads: 106 | CTR: 81 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1815 - 1819

Survey on Secure and Reliable Data Routing in WSN

Trupti Anil Bomble, M. D. Ingle

Share this Article

Similar Articles with Keyword 'MAC'

Views: 194 , Downloads: 120 | CTR: 62 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Views: 1373 , Downloads: 439 | CTR: 32 % | Weekly Popularity: ⮙28

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Views: 117 , Downloads: 82 | CTR: 70 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Similar Articles with Keyword 'AODV'

Views: 140 , Downloads: 77 | CTR: 55 % | Weekly Popularity: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 114 , Downloads: 104 | CTR: 91 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Views: 133 , Downloads: 104 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Similar Articles with Keyword 'QOS'

Views: 130 , Downloads: 97 | CTR: 75 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 530 - 533

QoS Provisioning Using Latency for IPV6

T. Vengatesh, Dr. S. Thabasu Kannan

Share this Article

Views: 123 , Downloads: 98 | CTR: 80 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Views: 132 , Downloads: 99 | CTR: 75 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Similar Articles with Keyword 'NS2'

Views: 132 , Downloads: 99 | CTR: 75 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Views: 136 , Downloads: 104 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

Views: 127 , Downloads: 105 | CTR: 83 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Views: 128 , Downloads: 105 | CTR: 82 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article

Views: 173 , Downloads: 106 | CTR: 61 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Similar Articles with Keyword 'Packet delivery ratio'

Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 157 , Downloads: 88 | CTR: 56 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 122 , Downloads: 100 | CTR: 82 % | Weekly Popularity: ⮙6

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article
Top