CFP last date
20 January 2025
Reseach Article

AODV: Security Considerations

Published on February 2015 by Serin V Simpson, Saju P John
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 1
February 2015
Authors: Serin V Simpson, Saju P John
e56468b2-8e7c-4ec5-819c-6240f24e5e13

Serin V Simpson, Saju P John . AODV: Security Considerations. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 1 (February 2015), 5-12.

@article{
author = { Serin V Simpson, Saju P John },
title = { AODV: Security Considerations },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 1 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 5-12 },
numpages = 8,
url = { /proceedings/icaccthpa2014/number1/19429-6003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Serin V Simpson
%A Saju P John
%T AODV: Security Considerations
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 1
%P 5-12
%D 2015
%I International Journal of Computer Applications
Abstract

AODV (Ad hoc On Demand Vector) is a reactive routing protocol in wireless mobile ad hoc network (MANET). AODV is accepted because of its capacity to adjust quickly in dynamic system environment with least overhead and small management packet size. The adhoc networks are all that much helpless against Dos attacks on the network layer. Blackhole and Grayhole attacks are the far reaching attacks on adhoc networks. Here the malicious nodes intrude on information transmission in the system by transmitting false routing data. The AODV routing protocol was at first created without considering security as a top priority. So it is not ready to shield against any sort of security attack. However there are numerous security mechanisms available that make AODV secure.

References
  1. Sibichen, S and S. Sreedhar. 2013. An Efficient AODV Protocol and Encryption Mechanism for Security Issues in Adhoc Networks, International Conference on Microelectronics, Communication and Renewable Energy, 184-194.
  2. Sony, S. J. and S. D. Nayak. 2013. Enhancing Security Features & Performance of AODV Protocol under Attack for MANET, IEEE Transactions on mobile computing, 325-328.
  3. Jalil, K. A. , Z. Ahmad and J. L. A. Manan. 2011. Securing Routing Table Update in AODV Routing Protocol, IEEE Conference on Open Systems, 116-121.
  4. Jhaveri, R. H. 2013. MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs, Third International Conference on Advanced Computing & Communication Technologies, 254-260.
  5. Jhaveri, R. H. , S. J. Patel and D. C. Jinwala. 2012. A Novel Solution for Grayhole Attack in AODV Based MANETs, In Proc. of Third International Conference on Advances in Communication, Network and Computing: Springer, 60-67.
  6. Jhaveri, R. H. , S. J. Patel and D. C. Jinwala. 2012. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs, INFOCOMP Journal of Computer Science, 1-12.
  7. Zain, J. M. , W. M. B. W. Mohd and E. E. Qawasmeh. 2011. Software Engineering and Computer Systems, Second International Conference, ICSECS, 102-115.
  8. Lakhtaria, K. , B. N. Patel, S. G. Prajapati and N. N. Jani. 2009. Securing AODV for MANETs using Message Digest with Secret Key, International Journal of Network Security & Its Applications, 111-116.
  9. Patil, S. and J. Raghatwan2. 2014. Survey on Security in Wireless Ad-hoc Network, International Journal of Science and Research, 2041-2044.
  10. Sibichen, S and S. Sreedhar. 2013. An Efficient AODV Protocol and Encryption Mechanism for group Communication and Preventing Attacks in Adhoc Networks, International Journal of Scientific & Engineering Research, 01-06.
  11. Khachar, K. N. and J. B. Shah. 2014. Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey, IOSR Journal of Computer Engineering, 108-112.
  12. Jalil, K. A. , Z. Ahmad and J. L. A. Manan. 2011. ERDA: Enhanced Route Discovery Mechanism for AODV Routing Protocol against Black Hole Attacks, IEEE Conference on Open Systems, 116-121.
Index Terms

Computer Science
Information Sciences

Keywords

Aodv Manet Erda Digital Signature R- Aodv Mr- Aodv Rsa Key Exchange.