Performance Analysis in Reactive Routing Protocols in Wireless Mobile Ad Hoc Networks Using DSR, AODV and AOMDV

Selecting an appropriate routing protocol for steering data packets is a very important issue to evaluate the performance of wireless mobile ad hoc networks (MANETs). This selection can be difficult in different situations since in such networks there is no specific infrastructure and standard specifications for network development. In this paper we introduce several reactive routing protocols in the MANET and check some performance metrics such as throughput, end to end delay and packet delivery ratio in order to find the best routing protocol based on the enforced conditions in our network. It is observed that in a network with increased number of nodes to maximum 20 nodes, packet delivery ratio and throughput in DSR and AOMDV routing protocols are better than AODV while in checking end to end delay, AOMDV shows less delay than DSR and AODV.

[1]  R. Leela Velusamy,et al.  Black hole attack and their counter measure based on trust management in manet: A survey , 2011, ARTCom 2011.

[2]  Mazdak Zamani,et al.  A secure model for prevention of black hole attack in wireless mobile ad hoc networks , 2013 .

[3]  Jaya Jacob,et al.  Performance Evaluation of Various Routing Protocols in MANET , 2011 .

[4]  K. Vanaja,et al.  An Analysis of Single Path AODV Vs Multipath AOMDV on Link Break Using ns-2 , 2012 .

[5]  Lu Xi-cheng A Review of Routing Protocols for Mobile Ad Hoc Networks , 2006 .

[6]  M. Phil,et al.  Routing Protocols in Mobile Ad-Hoc Network , 2015 .

[7]  Mingsheng Liu,et al.  The Ad Hoc Network Security Research Based on Trusted Computing and Semantic Remote Attestation , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[8]  H. Bakht Routing protocols for mobile ad hoc networks , 2005 .

[9]  Vinit Garg,et al.  Mitigating Multiple Black Hole Attack using DRI in Wireless Ad Hoc Networks , 2011 .

[10]  Mazdak Zamani,et al.  A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques , 2013 .

[11]  Sachin Kumar Gupta,et al.  Routing Protocols in Mobile Ad-hoc Networks \ , 2011 .

[12]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[13]  Mehdi Medadian,et al.  Proposing a Method to Detect Black Hole Attacks in AODV Routing Protocol , 2012 .

[14]  Mazdak Zamani,et al.  A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents , 2013 .