Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Wireless networks are growing now in these days and different kind of wireless applications are developed using ad hoc configuration. Mobile ad hoc network is a kind of such wireless network. Due to its ad hoc nature and mobility support the routing protocol played essential role in network. The main responsibility of routing protocol is to create and maintain topology on demand basis. Therefore the ad hoc network is suffers from performance and security issues. Therefore the proposed study investigates the routing protocols supported by mobile ad hoc network and the routing based attack deployment techniques. After analysing them a solution for black hole attack security is provided. The proposed solution involves the implementation of secure route discovery protocol. In order to implement the proposed routing technique traditional AODV routing protocol is modified. The routing protocol is modified in such ways by which the routing path trust value is evaluated and compared for making a decision for malicious path detection. For creating the decisional threshold packet delivery ratio, energy and high sequence number is selected. The implementation and simulation of the proposed routing protocol is performed using network simulator 2. In addition of that the comparative performance study between AODV routing protocol and modified AODV routing protocol is performed. In the comparative study packet delivery ratio and throughput of network is found optimum and better than traditional routing protocol.
Keywords: MANET, Black hole attack, MAC, AODV, QOS, NS2, Packet delivery ratio
Edition: Volume 4 Issue 3, March 2015
Pages: 1742 - 1748
How to Cite this Article?
Shirsty Chandel, Prof. Ashish Tiwari, "A MANET Security Using Routing Methodology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152425, Volume 4 Issue 3, March 2015, 1742 - 1748
135 PDF Views | 80 PDF Downloads
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'Black hole attack'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1742 - 1748A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 597 - 602Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks
Abhishek Kumar, Shweta Kumari
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1148 - 1153ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1815 - 1819Survey on Secure and Reliable Data Routing in WSN
Trupti Anil Bomble, M. D. Ingle
Similar Articles with Keyword 'MAC'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 633 - 636Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay
Kaushal Kishor, Parma Nand
Similar Articles with Keyword 'QOS'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 530 - 533QoS Provisioning Using Latency for IPV6
T. Vengatesh, Dr. S. Thabasu Kannan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2067 - 2070A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment
Swati Nagpure
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1147 - 1150Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation
Harshada Kupade, Madhav Ingle
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2048 - 2051An Analysis & Survey on Quality of Service Improvement in MANET, VANET and WSN
Amit Yogi, Jayesh Surana
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1876 - 1882Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment
Dr. K. Suresh Babu, Gardas Pavani
Similar Articles with Keyword 'NS2'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1838 - 1842Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1292 - 1295To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection
Sanghavi Parkhi, Hemlata Dakhore
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1742 - 1748A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1107 - 1110Delivery Delay and Distribution in DTN using Probabilistic Routing of Packets
Heena Arora, Gagandeep Singh, Sahil
Similar Articles with Keyword 'Packet delivery ratio'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2048 - 2051An Analysis & Survey on Quality of Service Improvement in MANET, VANET and WSN
Amit Yogi, Jayesh Surana
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar