Scenario based performance analysis of reliant ad hoc on-demand distance vector routing (R-AODV) for mobile ad hoc network

A mobile ad-hoc network (MANET) is a peer-to-peer wireless network, that is, nodes can communicate with each other without the use of infrastructure. Besides, nodes are free to join and/or leave the network at anytime, move randomly and organize themselves arbitrarily. Due to this nature of MANET, there could be some malicious and selfish nodes that try compromise the routing protocol functionality and make MANET vulnerable to security attacks which lead to unreliable routing. The current work presents a reliant ad hoc on-demand distance vector routing (R-AODV) based on trusted and shortest path and compare to AODV trust framework to which have been used to overcome the mentioned problem as well. The performance differentials are analyzed using various metrics which are packet delivery fraction, average end-to-end delay, and normalized routing load. The algorithm is implemented and simulated using NS2. The performance differentials are analyzed using various metrics which are packet delivery fraction, average end-to-end delay, and normalized routing load. The results revealed that the developed R-AODV exhibits good performance. Moreover, the proposed routing mechanism is competitive, as compare to trust ad hoc on-demand distance vector (TAODV).   Key words: Reliability, mobile ad-hoc network (MANET), routing protocol

[1]  Francisco J. Ros,et al.  Enhanced access control in hybrid MANETs through utility-based pre-authentication control , 2010, CMC 2010.

[2]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[3]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[4]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[5]  Francis F. Martin,et al.  Computer modeling and simulation , 1968 .

[6]  Sachin Kumar Gupta,et al.  Routing Protocols in Mobile Ad-hoc Networks \ , 2011 .

[7]  D. Jhonson The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .

[8]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .

[9]  Francisco J. Ros,et al.  Enhanced access control in hybrid MANETs through utility-based pre-authentication control , 2010, Wirel. Commun. Mob. Comput..

[10]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[11]  Clayton Campus,et al.  SCHOOL OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING , 1999 .

[12]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[15]  Giuseppe Anastasi,et al.  IEEE 802.11 Ad Hoc Networks: Performance Measurements , 2003, ICDCS Workshops.

[16]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[17]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[18]  H. Bakht Routing protocols for mobile ad hoc networks , 2005 .

[19]  Khaleel Ur Rahman Khan,et al.  Performance Comparison of On-Demand and Table Driven Ad Hoc Routing Protocols Using NCTUns , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).

[20]  Bruce Tuch,et al.  Development of WaveLAN®, an ISM band wireless LAN , 1993, AT&T Technical Journal.

[21]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[22]  B.M. Ali,et al.  Existing MANET routing protocols and metrics used towards the efficiency and reliability- an overview , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[23]  Chris McDonald,et al.  Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .

[24]  Giuseppe Anastasi,et al.  IEEE 802.11 AD HOC Networks: Protocols, Performance, and Open Issues , 2004 .

[25]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).