We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Detecting and Isolating Malicious Node in AODV Routing Algorithm

by Priyambada Sahu, Sukant Kishoro Bisoy, Soumya Sahoo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 16
Year of Publication: 2013
Authors: Priyambada Sahu, Sukant Kishoro Bisoy, Soumya Sahoo
10.5120/11166-6313

Priyambada Sahu, Sukant Kishoro Bisoy, Soumya Sahoo . Detecting and Isolating Malicious Node in AODV Routing Algorithm. International Journal of Computer Applications. 66, 16 ( March 2013), 8-12. DOI=10.5120/11166-6313

@article{ 10.5120/11166-6313,
author = { Priyambada Sahu, Sukant Kishoro Bisoy, Soumya Sahoo },
title = { Detecting and Isolating Malicious Node in AODV Routing Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 16 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number16/11166-6313/ },
doi = { 10.5120/11166-6313 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:22:33.117786+05:30
%A Priyambada Sahu
%A Sukant Kishoro Bisoy
%A Soumya Sahoo
%T Detecting and Isolating Malicious Node in AODV Routing Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 16
%P 8-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. In MANET, Ad-hoc On-Demand Distance Vector (AODV) floods the control packets to discovery the route. Generally there is a limit on the number of these packets that can be generated or forwarded. Malicious node can disregard this limit and flood the network with fake control packets so that these packets have the limited bandwidth and processing power of genuine nodes in the network while being forwarded. Due to this, genuine route requests suffer and many routes either do not get a chance to materialize or they end up being longer than otherwise. This paper presents a simulation analysis of reactive routing protocol AODV in the presence of malicious attack under different Load. We present the simulations results based on packet delivery fraction, throughput, normalized routing load, and packet loss.

References
  1. C. Perkins, E. Royer, "Ad-hoc On-Demand Distance Vector Routing", Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999, pp. 90-100.
  2. D. Johnson, D. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks", Mobile Computing, Editors: T. Imielinski and H. Korth, pp. 153 – 181, Kluwer, 1996.
  3. C. Perkins, P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers", in: ACM SIGCOMM_94 Conference Communications Architectures, Protocols and Applications, 1994, pp. 234–244.
  4. P. Ning, K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad hoc Routing Protocols", Proceedings of the 2003 Annual IEEE Information Assurance Workshop, June, 2003, pp. 60 – 67.
  5. Perkins C. E. , Terminology for Ad-Hoc Networking, Draft-IETF-MANET-terms-00. txt, November 1997.
  6. Sugata Sanyal, Ajith Abraham, Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia and Nirali Mody, "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks", 6th International Workshop on Distributed Computing (IWDC-2004), A. Sen et al (Eds. ), Springer Verlag, Germany, Lecture Notes in Computer Science, Vol. 3326, ISBN: 3-540-24076-4, pp 541-542, 2004
  7. Jayesh Kataria, P. S. Dhekne, and Sugata Sanyal, "A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks", International Conference on Computers and Devices for Communications, CODEC-06, December 18-20, 2006, Kolkata, India.
  8. The network simulator––ns-2. Available from http://www. isi. edu/nsnam/ns/
  9. Z. Alexander, Performance Evaluation of AODV Routing Protocol: Real-Life Measurements, SCC,June 2003.
Index Terms

Computer Science
Information Sciences

Keywords

AODV Throughput Normalized routing load Packet loss malicious node