CFP last date
20 December 2024
Reseach Article

Flood Tolerant AODV Protocol (FT-AODV)

by Pratik Singh, Aman Raj, Debdutta Chatterjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 6
Year of Publication: 2012
Authors: Pratik Singh, Aman Raj, Debdutta Chatterjee
10.5120/8424-2180

Pratik Singh, Aman Raj, Debdutta Chatterjee . Flood Tolerant AODV Protocol (FT-AODV). International Journal of Computer Applications. 53, 6 ( September 2012), 18-27. DOI=10.5120/8424-2180

@article{ 10.5120/8424-2180,
author = { Pratik Singh, Aman Raj, Debdutta Chatterjee },
title = { Flood Tolerant AODV Protocol (FT-AODV) },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 6 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number6/8424-2180/ },
doi = { 10.5120/8424-2180 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:24.637435+05:30
%A Pratik Singh
%A Aman Raj
%A Debdutta Chatterjee
%T Flood Tolerant AODV Protocol (FT-AODV)
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 6
%P 18-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ad hoc network is a collection of wireless computers with dynamically changing topology, communicating among themselves over possibly multi-hop paths, without the help of any infrastructure. Although many ad hoc network routing protocols have been proposed (AODV, SAODV, DSR etc), none of them considers or solves the security problems efficiently within the restrictions of ad hoc networks. Ad hoc networks are vulnerable to many types of attack like Denial Of Service (DOS), Byzantine Attack, Black-hole Attack, Flooding Attack, etc. In this paper we put forward an efficient and reliable security mechanism based on the AODV routing protocol which protects the ad hoc networks from different types of flooding attacks.

References
  1. C. E. Perkins and E. M. Royer, "Ad-hoc On Demand Distance Vector Routing ", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp-90-100, Feb, 1999.
  2. Mobile Ad hoc Networks: Challenges and Future Kavita Taneja and R. B. Patel Proceedings of National Conference on Challenges & Opportunities in Information Technology (COIT-2007) RIMT-IET, Mandi Gobindgarh. March 23, 2007.
  3. Basagni, S. , Conti, M. , Giordano S. , andStojmenovic, I. (Eds. ) Ad Hoc Networking. IEEE Press Wiley, New York, 2003.
  4. Chlamtac, I. , Conti, M. , and Liu, J. J. -N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp. 13–64.
  5. Freebersyser, J. A. , and Leiner, B. A DoD perspective on mobile ad hoc networks. In: Perkins, C. (Ed. ) Ad Hoc Networking, Addison Wesley, Reading, MA, 2001, pp. 29–51.
  6. IETF MANET Working Group. http://www. ietf. org/html. charters/manetcharter. html
  7. Toh, C-K. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, 2002.
  8. Corson, S. , and Macker, J. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501, IETF, Jan. 1999.
  9. Abolhasan, M. , Wysocki, T. , and Dutkiewicz, E. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 2004, pp. 1–22.
  10. Kozat, U. C. , and Tassiulas, L. Service discovery in mobile ad hoc networks: anoverall perspective on architectural choices and network layer support issues. Ad Hoc Networks, 2(1), 2004, pp. 23–44.
  11. B. Awerbuch, D. Holmer, C. Nita Rotaru and Herbert Rubens. "An On-Demand Secure Routing
  12. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617 page 41-48.
  13. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei Wireless Network Security Signals and Communication Technology, 2007, Part II, 103-135, DOI: 10. 1007/978-0-387-33112-6_5.
  14. Protocol Resilient to Byzantine Failures". Proceedings of the ACM Workshop on Wireless Security 2002, Pages 21-30, September 2002.
  15. Deborah Estrin, Daniel Zappala, Tony Li, Yakov Rekhter, and Kannan Varadhan. Source Demand Routing: Packet format and forwarding specification (version 1). Internet Draft, January 1995. Work in progress.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless networks protocols ad hoc network security flooding attacks aodv protocol