Performance evaluation on modified AODV protocols

Ad hoc On-demand Distance Vector (AODV) is one of reactive routing protocol in Mobile Ad hoc Network (MANET) and many variants are developed based on modifying this protocol. Purposes of modification were mostly related to security and performance improvement, yet the additional processes being introduced in the modification could incur overheads to the modified AODV. The purpose of this paper is to evaluate some of the modified AODV protocols performance by examining their effectiveness in alleviating the black hole attack and further examining the effect of mitigation methods used on overhead. The performance analysis focuses on two conditions, i.e. no-attack and under-attack. Three modified AODV protocols were studied, namely idsAODV, HDAODV and EAODV, and a new modified protocol is proposed. Using NS-2 network simulator, the performance of these protocols under no-attack and under-attack scenarios were collected and analyzed. Simulations were conducted by varying the pause times in random waypoint mobility model. The performance results are presented using comparative analysis based on different performance matrices such as throughput, Packet Delivery Ratio, End-to-end delay, Network Routing Load and Energy usage. The results show that the three modified AODV protocols give positive effect to network performance in both conditions - under-attack and no-attack environment. EAODV protocol outperforms other modified protocols with highest network performance, but with longer delay and higher energy usage than the other modified protocols.

[1]  Siddharth Sharma,et al.  An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks , 2010, ArXiv.

[2]  M. S. Corson,et al.  Architectural considerations for mobile mesh networking , 1996, Proceedings of MILCOM '96 IEEE Military Communications Conference.

[3]  Devesh C. Jinwala,et al.  MOSAODV: Solution to Secure AODV against Blackhole Attack , 2009 .

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[6]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[7]  Jamalul-lail Ab Manan,et al.  An Enhanced Route Discovery Mechanism for AODV Routing Protocol , 2011, ICSECS.

[8]  Riri Fitri Sari,et al.  Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks , 2011 .

[9]  Byoungchul Ahn,et al.  A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks , 2006, EUC Workshops.

[10]  Shakeel Ahmed,et al.  Performance Evaluation of On Demand Routing Protocols AODV and Modified AODV (R-AODV) in MANETS , 2011 .

[11]  E. Karthikeyan,et al.  PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFIC PATTERNS , 2011 .

[12]  Amruta Deshmukh,et al.  Modified AODV Protocols: A Survey , 2011 .

[13]  Jamalul-lail Ab Manan,et al.  Black hole effect mitigation method in AODV routing protocol , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[14]  Geetha Jayakumar,et al.  Ad Hoc Mobile Wireless Networks Routing Protocols - A Review , 2007 .

[15]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..