International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 107 | Views: 136

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

A MANET Security Using Routing Methodology

Shirsty Chandel | Prof. Ashish Tiwari

Abstract: Wireless networks are growing now in these days and different kind of wireless applications are developed using ad hoc configuration. Mobile ad hoc network is a kind of such wireless network. Due to its ad hoc nature and mobility support the routing protocol played essential role in network. The main responsibility of routing protocol is to create and maintain topology on demand basis. Therefore the ad hoc network is suffers from performance and security issues. Therefore the proposed study investigates the routing protocols supported by mobile ad hoc network and the routing based attack deployment techniques. After analysing them a solution for black hole attack security is provided. The proposed solution involves the implementation of secure route discovery protocol. In order to implement the proposed routing technique traditional AODV routing protocol is modified. The routing protocol is modified in such ways by which the routing path trust value is evaluated and compared for making a decision for malicious path detection. For creating the decisional threshold packet delivery ratio, energy and high sequence number is selected. The implementation and simulation of the proposed routing protocol is performed using network simulator 2. In addition of that the comparative performance study between AODV routing protocol and modified AODV routing protocol is performed. In the comparative study packet delivery ratio and throughput of network is found optimum and better than traditional routing protocol.

Keywords: MANET, Black hole attack, MAC, AODV, QOS, NS2, Packet delivery ratio

Edition: Volume 4 Issue 3, March 2015,

Pages: 1742 - 1748

How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait