scispace - formally typeset
Search or ask a question

Showing papers on "Ad hoc On-Demand Distance Vector Routing published in 2022"


Journal ArticleDOI
TL;DR: A novel cryptographic approach incorporated in AODV protocol to identify and eliminate the common attack strategy, called the blackhole attack in VANET, known as Secure A ODV protocol (SAODV).

27 citations


Journal ArticleDOI
TL;DR: A proposed Cross-Layer and Energy-Aware Ad-hoc On-demand Distance Vector routing protocol for improving FANET performance and shows that the CLEA-AODV surpasses these protocols in terms of PSR, TP, E2E delay, and PDR.
Abstract: In recent years, unmanned aerial vehicles (UAVs) have become the trend for different types of research and applications. UAVs can accomplish some technical and risky tasks while still being safe, mobile, and inexpensive to operate. However, UAVs need flying ad-hoc networks (FANET) to operate in inaccessible or infrastructure-less areas. Subsequently, in many military and civil applications, the UAVs are connected ad hoc. FANET-based UAV systems have been developed for search and rescue, wildlife surveys, real-time monitoring, and delivery services. Maintaining the reliability and connectivity among UAV nodes in FANET becomes challenging because of the UAV movement, environmental conditions, energy efficiency, etc. Energy-aware routing protocols have become essential for developing advanced and effective FANETs. This paper presents a proposed Cross-Layer and Energy-Aware Ad-hoc On-demand Distance Vector (CLEA-AODV) routing protocol for improving FANET performance. The CLEA-AODV protocol is mainly divided into three sections: routing with AODV protocol, Glow Swarm Optimization (GSO)-based Cluster Head Selection, and Cooperative Medium Access Control (MAC). The cross-layer approach is implemented on the network layer and the data layer. The major parameters considered to evaluate the performance of the FANET are Packet Success Rate (PSR), Throughput (TP), End-to-End (E2E) delay, and packet drop ratio (PDR). The Network Simulator version 2 (NS2) is used to implement the CLEA-AODV protocol and evaluate the network performance. The results are compared with the standard AODV, Self-Organization Clustering-GSO (SOC-GSO), and Energy Efficient Neuro-Fuzzy Cluster-based Topology Construction with Meta-Heuristic Route Planning (EENFC-MRP) protocols. The results show that the CLEA-AODV surpasses these protocols in terms of PSR, TP, E2E delay, and PDR.

19 citations


Book ChapterDOI
TL;DR: In this paper , a stable fuzzy logic-based energy-efficient reactive routing protocol for MANETs is proposed, where crisp input is fed to the fuzzy inference engine for calculating the most trusted value which can be used as a metric for the route selection.
Abstract: A mobile ad hoc network is a collection of autonomous mobile nodes having communication capability with one another within a radio range. This is a network with intrinsic attributes like auto-configuration and organization by the network itself. In traditional, AODV single metric is used for the route selection scheme. Here we put forward a stable fuzzy logic-based energy-efficient AODV routing protocol for MANET. This protocol is used for selecting an optimal path to increase network lifetime. Fuzzy logic-based energy-efficient reactive protocol increases the performance metrics by selecting the most trusted node. In the fuzzy logic-based approach, crisp input is fed to the fuzzy inference engine for calculating the most trusted value which can be used as a metric for the route selection. The proposed work is simulated in MATLAB and NS2, and it compares the performance metrics in terms of throughput, end-to-end delay, and packet delivery ratio.

18 citations


Journal ArticleDOI
13 Jan 2022-Drones
TL;DR: Simulation results indicate the proposed E-OLSR outperforms the existing OLSR and achieves supremacy over other protocols mentioned in this paper.
Abstract: The growing need for wireless communication has resulted in the widespread usage of unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol for UAVs is paramount as well as challenging due to its dynamic attributes. The difficulty stems from features other than mobile ad hoc networks (MANET), such as aerial mobility in 3D space and frequently changing topology. This paper analyzes the performance of four topology-based routing protocols, dynamic source routing (DSR), ad hoc on-demand distance vector (AODV), geographic routing protocol (GRP), and optimized link state routing (OLSR), by using practical simulation software OPNET 14.5. Performance evaluation carries out various metrics such as throughput, delay, and data drop rate. Moreover, the performance of the OLSR routing protocol is enhanced and named “E-OLSR” by tuning parameters and reducing holding time. The optimized E-OLSR settings provide better performance than the conventional request for comments (RFC 3626) in the experiment, making it suitable for use in UAV ad hoc network (UANET) environments. Simulation results indicate the proposed E-OLSR outperforms the existing OLSR and achieves supremacy over other protocols mentioned in this paper.

12 citations


Journal ArticleDOI
TL;DR: The Safe Routing Approach (SRA) as mentioned in this paper uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process, which extends the network's life span and reduces packet loss.
Abstract: Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unauthorized access. Although the current solutions have been designed to defeat the attack nodes, they still require additional hardware, have considerable delivery delays, do not offer high throughput or packet delivery ratios, or do not do so without using more energy. The capability of a mobile node to forward packets, which is dependent on the platform's life quality, may be impacted by the absence of the network node power source. We developed the Safe Routing Approach (SRA), which uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process. The attacking node recognition system is made for irregular routing node detection to protect the controller network's usual properties from becoming recognized as an attack node. The suggested method examines the nearby attack nodes and conceals the trusted node in the routing pathway. The path is instantly assigned after the initial discovery of trust nodes based on each node's strength value. It extends the network's life span and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy consumption, network performance, and detection of attack nodes, the suggested approach is contrasted with AIS, ZIDS, and Improved AODV. The findings demonstrate that the recommended strategy performs superior in terms of PDR, residual energy, and network throughput.

11 citations


Journal ArticleDOI
TL;DR: A QoS-based Dynamic Secured Broker Selection architecture (QoSDSBS) for service composition in MANET, which uses a dynamic broker and provides a secure path selection based on QoS metrics.
Abstract: MANET is a mobile ad hoc network with many mobile nodes communicating without a centralized module. Infrastructure-less networks make it desirable for many researchers to publish and bind multimedia services. Each node in this infrastructure-less network acts as self-organizing and re-configurable. It allows services to deploy and attain from another node over the ad hoc network. The service composition aims to provide a user’s requirement by combining different atomic services based on non-functional QoS parameters such as reliability, availability, scalability, etc. To provide service composition in MANET is challenging because of the node mobility, link failure, and topology changes, so a traditional protocol will be sufficient to obtain real-time services from mobile nodes. In this paper, the ad hoc on-demand distance vector protocol (AODV) is used and analyzed based on MANET’s QoS (Quality of Service) metrics. The QoS metrics for MANET depends on delay, bandwidth, memory capacity, network load, and packet drop. The requester node and provider node broker acts as a composer for this MANET network. The authors propose a QoS-based Dynamic Secured Broker Selection architecture (QoSDSBS) for service composition in MANET, which uses a dynamic broker and provides a secure path selection based on QoS metrics. The proposed algorithm is simulated using Network Simulator (NS2) with 53 intermediate nodes and 35 mobile nodes of area 1000 m × 1000 m. The comparative results show that the proposed architecture outperforms, with standards, the AODV protocol and affords higher scalability and a reduced network load.

10 citations


Journal ArticleDOI
TL;DR: In this paper , an intelligent Hello dissemination model based on reinforcement learning algorithms is proposed to produce a dense reward structure, and facilitate the network learning in flying ad-hoc networks (FANETs).
Abstract: The routing mechanisms in flying ad-hoc networks (FANETs) using unmanned aerial vehicles (UAVs) have been a challenging issue for many reasons, such as its high speed and different directions of use. In FANETs, the routing protocols send hello messages periodically for the maintenance of routes. However, the hello messages that are sent in the network increase the bandwidth wastage on some occasions and the excessive number of hello messages can also cause the problem of energy loss. Scarce works deal with the problem of excessive hello messages in dynamic UAVs scenarios, and treat several other problems, such as bandwidth and energy wastage simultaneously. Generally, the existing solutions configure the hello interval to an excessive long or short time period originating delay in neighbors discovery. Thus, a self-acting approach is necessary for calculating the exact number of hello messages with the aim to reduce the bandwidth wastage of the network and the energy loss; this approach needs to be low complex in terms of computational resource consumption. In order to solve this problem, an intelligent Hello dissemination model, AI-Hello, based on reinforcement learning algorithms, that adapts the hello message interval scheme is proposed to produce a dense reward structure, and facilitating the network learning. Experimental results, considering FANET dynamic scenarios of high speed range with 40 UAVs, show that the proposed method implemented in two widely adopted routing protocols (AODV and OLSR) saved 30.86% and 27.57% of the energy consumption in comparison to the original AODV and OLSR protocols, respectively. Furthermore, our proposal reached better network performance results in relation to the state-of-the-art methods that are implemented in the same protocols, considering parameters, such as routing overhead, packet delivery ratio, throughput and delay.

10 citations


Journal ArticleDOI
TL;DR: In this article, an Artificial Immune System Based Algorithm (AISBA) is proposed to select selfish nodes in MANET, which utilizes principles of Artificial immune Systems (Ais) that in turn mimics the strategy of the human immune system, and two different Trust models are developed as well to distinguish between a genuine node as well as a selfish node.

8 citations


Journal ArticleDOI
TL;DR: Simulation result shows that for increasing number of mobile nodes OLSR offers better throughput and minimum delay than AODV and GRP routing protocols.
Abstract: Mobile Ad Hoc Networks have evolved rapidly and are finding numerous applications in the areas of self-creating, self-organizing and self-administering wireless networks. The present paper describes use of and comparison of three routing protocols. The parameters used for comparison are throughput and delay in response by varying the number of mobile nodes. A random waypoint mobility model was used for fixing the mobile nodes. The simulation study is carried out using OPNET modeler 14.5. Simulation result shows that for increasing number of mobile nodes OLSR offers better throughput and minimum delay than AODV and GRP routing protocols.

7 citations


Journal ArticleDOI
TL;DR: The optimal CH selection for finding the shortest path among the CHs is improved by developing the hybrid K-means with Particle Swarm Optimization (PSO) based hybrid Ad-hoc On-demand Distance Vector (AODV) channelling algorithms.
Abstract: The optimal CH selection for finding the shortest path among the CHs is improved by developing the hybrid K-means with Particle Swarm Optimization (PSO) based hybrid Ad-hoc On-demand Distance Vector (AODV) channelling algorithms. The alive nodes, total packet sending time, throughput, and NL are increased using this hybrid technique, whereas dead nodes and EC are minimized in the network. The proposed algorithm utilizes a rotational method of utilization of cluster head (CH) to ensure that all member nodes are utilized uniformly based on the incoming traffic. The proposed algorithm has been implemented, experimented with, and compared in performance with LEACH, DLBA and GLBA algorithms. The proposed hybrid approach outperforms the existing techniques regarding average energy consumption and load distribution.

6 citations


Proceedings ArticleDOI
15 Jul 2022
TL;DR: Ad-hoc On-Demand Distance Vector (AODV) as mentioned in this paper is a new advanced routing protocol which provides a combination of three different methods: ABC, ANN and SVM.
Abstract: Using the idea of machine learning, the authors of this study provide a novel security mechanism for an Internet of Things model that is built on a mobile ad hoc network (MANET). The Black Hole Assault, also known as BHA, is among the most dangerous threats that can be found in a MANET. In this attack, the attacker node eliminates all of the data flow, which brings the efficiency of the model down. As a consequence of this, the development of a technique that is capable of shielding the system from the BHA node is required. This paper presented Ad-hoc On-Demand Distance Vector. It is a new advanced routing protocol which provides a combination of three different methods: ABC, ANN & SVM. The innovation of the developed framework is the integration of the SVM with the ANN, which allows detecting the attackers inside the identified path by using the AODV routing algorithm. This helps to prevent attacks. In this case, the ANN learning algorithm is used to train the model, while the ABC optimization algorithm and SVM are used to pick the training examples. The purpose of ABC is to improve the path that the transfer of information takes here between origin as well as the node at which it is ultimately received. The ABC algorithm's suggestion of the most efficient path, coupled with the attributes of each node, is then input into the SVMmodel. ANN determines if the node in question is a regular node or an intruder node by examining these qualities. The numerical simulation that was carried out in MATLAB demonstrates that the research that has been presented demonstrates an advantage in terms of Packet Delivery Ratio,latency, and throughput.

Journal ArticleDOI
TL;DR: In this article , the authors proposed an energy aware Q-learning AODV (EAQ-AODV) routing protocol for cognitive radio enabled WSNs, which uses Qlearning based reward mechanism for cluster head selection and AODVM enabled routing protocol based on different parameters such as Residual Energy, Common Channel, Number of Hops, Licensed Channel, Communication Range and Trust Factor to establish the routing path.

Journal ArticleDOI
01 Nov 2022-Heliyon
TL;DR: In this article , the authors present the analysis of Mobile Ad hoc Network (MANET) in a wireless real-time communication medium for a Networked Control System (NCS), and determine whether the simulated behavior is significant for a plant or not.


Journal ArticleDOI
TL;DR: The DSR protocol provides a better performance compared to AODV and DSDV routing protocols in terms of PLR and PDR, and also has better efficiency in RDL and AT compared to other assumed protocols.
Abstract: ABSTRACT Wireless sensor network (WSN) with several sensors is used to group measurements of certain physical quantities or environmental conditions, including sound, temperature, pressure, vibration, motion, or pollution, at various locations and ranges. In WSNs, several protocols address the issue of routing. Sensor nodes in WSN usually have limited energy resources and storage capacities. Therefore, the issue of energy usage in sensors and protocols is very important. This paper analyzes and compares the quality of service (QoS) performances of three important routing protocols of the mobile ad-hoc network (MANET) including Ad-hoc on-demand distance vector (AODV), dynamic source routing (DSR), and destination sequenced distance vector (DSDV), in a smart building case study. The QoS evaluation metrics include residual energy of nodes, instant throughput (IT), average throughput (AT), packet delivery ratio (PDR), packet loss ratio (PLR), and route discovery latency (RDL) based on IEEE 802.15.4 MAC protocol standard. The simulation is carried out using NS2, and the WSN has 16 fixed and 4 mobility nodes with different speeds and paths. The simulation results illustrate that average throughput in AODV is 1.985118 (kbps), however, the figures for DSR and DSDV are 1.977780 and 1.720700 (kbps), respectively. PDR, also, in DSR stands at 1.0, but the figures for AODV and DSDV are lower with the range of 0.999572 and 0.997930, respectively. Overall, The DSR protocol provides a better performance compared to AODV and DSDV routing protocols in terms of PLR and PDR. Also, AODV has better efficiency in RDL and AT compared to other assumed protocols.

Journal ArticleDOI
TL;DR: In this article , an energy-aware trust algorithm based on the AODV protocol and multi-path routing approach (EATMR) is proposed to improve the security of WSNs.
Abstract: Rapid developments in radio technology and processors have led to the emergence of small sensor nodes that provide communication over Wireless Sensor Networks (WSNs). The crucial issues in these networks are energy consumption management and reliable data exchange. Due to the limited resources of sensor nodes, WSNs become a vulnerable target against many security attacks. Thus, energy-aware trust-based techniques have become a powerful tool for detecting nodes’ behavior and providing security solutions in WSN. Clustering-based routings are one of the most effective methods in increasing the WSN performance. In this paper, an Energy-Aware Trust algorithm based on the AODV protocol and Multi-path Routing approach (EATMR) is proposed to improve the security of WSNs. EATMR consists of two main phases: firstly, the nodes are clustered based on the Open-Source Development Model Algorithm (ODMA), and then in the second phase, clustering-based routing is applied. In this paper, the routing process follows the AODV protocol and multi-path routes approach with considering energy-aware trust. Here, the optimal and safe route is determined based on various parameters, namely energy, trust, hop-count, and distance. In this regard, we emphasize the evaluation of node trust using direct trust, indirect trust, and a multi-objective function. The simulation has been performed in MATLAB software in the presence of a Denial of Service (DoS) attack. The simulation results show that EATMR performs better than the state-of-the-art methods in terms of successfully detecting malicious nodes and enhancing network lifetime, energy consumption, and packet delivery ratio. As a conclusion, EATMR shows an average of 4.3 and 6.1% superiority over M-CSO and SQEER in different scenarios, respectively.


Journal ArticleDOI
TL;DR: The current research aims to study the behavior of the state-of-the-art MANET protocols with the ACO technique, a hybrid technique, integrating a reactive route maintaining technique with a proactive method regarding the quality of service (QoS) and statistical analysis.
Abstract: Research on mobile ad-hoc networks (MANETs) is increasing in popularity due to its rapid, budget-friendly, and easily altered implementation, and relevance to emergencies such as forest firefighting and health care provisioning. The main concerns that ad-hoc networks face is dynamic topology, energy usage, packet drop rate, and throughput. Routing protocol selection is a critical point to surmount alterations in topology and maintain quality in MANET networks. The effectiveness of any network can be vastly enhanced with a well-designed routing protocol. In recent decades, standard MANET protocols have not been able to keep pace with growing demands for MANET applications. The current study investigates and contrasts ant colony optimization (ACO) with various routing protocols. This paper compares ad-hoc on-demand multi-path distance vector (AOMDV), dynamic source routing protocol (DSR), ad-hoc on-demand distance vector routing (AODV), and AntHocNet protocols regarding the quality of service (QoS) and statistical analysis. The current research aims to study the behavior of the state-of-the-art MANET protocols with the ACO technique. The ACO technique is a hybrid technique, integrating a reactive route maintaining technique with a proactive method. The reason and motivation for including the ACO algorithm in the current study is to improve by using optimization algorithms proved in other domains. The ACO algorithm appears to have substantial use in large-scale MANET simulation.

Journal ArticleDOI
TL;DR: In this article , the effect of changing the number of vehicles on the performance of AODV protocol was studied in the highway environment and in the case of vehicle movement at variable speeds between (40-120 km/h) and the simulation time is 200 sec.
Abstract: Vehicular ad-hoc network (VANET), the development of this network in recent years has become one of the most important areas of research. The primary goal of using the VANET network is to reduce the number of deaths and enhance road safety. VANET network faces some problems when routing packets between vehicles, due to the high-speed movement of vehicles. Therefore, researchers have begun to develop routing protocols in the VANET network to overcome these problems when routing packets between vehicles. In this study, the effect of changing the number of vehicles on the performance of ad-hoc on-demand distance vector (AODV) protocol will be studied in the highway environment and in the case of vehicle movement at variable speeds between (40-120 km/h) and the simulation time is 200 sec. The ad-hoc ondemand distance vector protocol performance was evaluated by three performance measures (end-to-end delay, dropped packets, overhead and packet delivery ratio).

Journal ArticleDOI
TL;DR: In this article , the authors advocate for OSPFV [for wireless LANs] protocol integration with built-in security, where threshold evaluation and cryptographic verification are employed, and then their performance is studied to discover the result.

Journal ArticleDOI
TL;DR: In this article , a trust-aware dynamic routing algorithm based on Extended AODV protocol for secure communications in the WSN (TADR-EAODV) is proposed.
Abstract: Compliance with security requirements in Wireless Sensor Networks (WSNs) is known as an important phenomenon in conserving energy consumption due to its dynamic topology . Energy consumption management in WSN can be achieved through secure routing protocols . Authentication, firewall and intrusion detection , and trust management are common ways to provide security on the WSNs. Meanwhile, trust management provides better performance due to ensuring distributed security through collaboration. In this paper, a Trust-Aware Dynamic Routing algorithm based on Extended AODV protocol for secure communications in the WSN (TADR-EAODV) is proposed. TADR-EAODV considers factors such as direct trust, recommended trust, connectivity strength, energy rate and worthiness score to measure the distributed safety level of nodes in routing. We use the AODV protocol for routing work, which is extended through a multi-route routing approach. In addition, a centralized ensemble clustering for node grouping is included in TADR-EAODV, which enables clustering-based routing to enhance WSN performance. Extensive experiments have been performed in the presence of denial-of-service attacks to verify our claims. The experimental results prove that high-performance TADR-EAODV has been able to identify attackers by detecting their anomalous behavior. Besides, TADR-EAODV has improved the average packet transfer rate by 6% to 17% compared to existing state-of-the-art algorithms such as LEACH-TM, TAAO-SDTIM and TAOSC-MHR.

Journal ArticleDOI
TL;DR: The performance of AODV in a linear wireless ad hoc network using different values of NTT using as well as without using Hello messages is investigated, it is observed that choice of value of N TT has a significant effect on establishment of route(s) between source node and destination node that eventually affects the performance of the linear Wireless Ad Hoc network under consideration.
Abstract: Wireless Ad Hoc Networks (WANETs) are predicted to be prevalent networks in coming future because of their infrastructure-less characteristics that result in self-organization, self-healing, and self-configuration of such networks. Routing means the process of selecting a path along which data can be transferred from source to destination that plays a significant role in the performance of ad hoc networks. There are many routing protocols developed for wireless ad hoc networks. One of such protocols, developed by C. E. Perkins, is Ad Hoc On-demand Distance Vector (AODV) routing protocol, which is a reactive routing protocol, AODV is used to establish route(s) between source node(s) and destination node(s) as and when routes are required. Performance of AODV routing protocol depends heavily on choice of values of a set of predefined attributes. One of such attributes of AODV is Node Traversal Time (NTT) which is supposed to play significant role in establishing route(s) between source node(s) and destination node(s). In this paper, we have investigated the performance of AODV in a linear wireless ad hoc network using different values of NTT using as well as without using Hello messages. The performance of the network has been measured using several metrics like Route Error Overhead, Routing Overhead, Normalized Routing Load, Average Hop Count, Total Number of Received Data Packets, Packet Delivery Ratio, Average End-to-End Delay and Throughput. It is observed that choice of value of NTT has a significant effect on establishment of route(s) between source node(s) and destination node(s) that eventually affects the performance of the linear wireless ad hoc network under consideration. The insights gained through this work could be useful in analysis of more realistic and complex networks.


Book ChapterDOI
01 Jan 2022
TL;DR: In this article, the authors analyzed and compared a simulation result of the impact of data flooding, link spoofing and Replay attacks with Optimized Link State Routing Protocol (OLSR) and DATA Flooding, RREQ Flooding and HELLO Flooding attacks with Ad hoc On-Demand Distance Vector (AODV) routing protocol (RFC 3561) on using ns-3 simulator.
Abstract: Amid the most recent decade, a few research endeavors have explored developing Internet of Things (IoT) and Mobile Ad hoc Networks (MANETs) application situations in a new concept called IoT-MANETs. One of the constraints of these applications is the security of the communication between the nodes. In this article, we analyze and compare a simulation result of the impact of DATA Flooding, Link-spoofing and Replay attacks with Optimized Link State Routing Protocol (OLSR) routing protocol (RFC 3626) and DATA Flooding, RREQ Flooding and HELLO Flooding attacks with Ad hoc On-Demand Distance Vector (AODV) routing protocol (RFC 3561) on using ns-3 simulator. In this comparison, we took into consideration the density of the network by the number of nodes included in the network, the speed of the nodes, the mobility model, and even, we chose the IEEE 802.11ac wireless local-area network (WLAN) standard for the MAC layer, in order to have a simulation, which deals with more general and more real scenarios.

Journal ArticleDOI
20 Jan 2022-Webology
TL;DR: The results address the impact of Jammers and show that the MANET's Routing Protocols could improve the throughput and data dropped of the network but on the expense of increasing the delay.
Abstract: MANETs (Mobile Ad hoc Networks) had become the most important next generation wireless network technologies. It is made up of self-configurable mobile nodes, Intruders mieght decrease MANET functionality due to the dispersed and wireless nature of MANETs, and therefore they were vulnerable to numerous attacks at different levels. The important challenges for MANET were the security and routing protocols. This paper examined the impact of Jammer which it was a kind of DoS attack which interfere with the normal operation of network and show how the Jammer increased the delay and data dropped and decreased the throughput which they were the important parameters for the measurements of network performance. This performance could be improved using routing protocols (AODV, DSR, OLSR and GRP). Riverbed Modeler Academic Edition (17.5) was utilized for this study in number of modeled scenarios for video applications. The results address the impact of Jammers and show that the MANET's Routing Protocols could improve the throughput and data dropped of the network but on the expense of increasing the delay.

Journal ArticleDOI
TL;DR: Ad hoc On Demand distance Vector (AODV) routing protocol is evaluated under rushing attack, black hole attack, and grayhole attack and results show that all the above attacks are responsible for the poor throughput, heavy dropping packets and higher end to end delays in the network.
Abstract: In Mobile Ad hoc Network (MANET), performance of the routing protocols is degraded by various network attacks such as black hole attack and rushing attack. Mostly all layers of mobile ad hoc networks are vulnerable to several attacks. Routing protocols used in mobile ad hoc networks are designed by considering that all the nodes are trustable in communication mode. MANET is less secure network due to its features like no centralized administration control and no infrastructure is required. In this paper, Ad hoc On Demand distance Vector (AODV) routing protocol is evaluated under rushing attack, black hole attack, and grayhole attack. Under multiple attacking, single attacking, and without attacking modes, performance of network has been evaluated. By varying the speed, network size, node density, and number of attacking nodes, four different network scenarios have been generated. Performance metrics are considered as average throughput, average end to end delay and packet delivery ratio. Network simulator 2 is used to simulate the attacks over AODV routing protocol. Results show that all the above attacks are responsible for the poor throughput, heavy dropping packets and higher end to end delays in the network. Throughput is degraded as the numbers of attacking nodes are increased. AODV is less affected by rushing attack as compared to black hole and grayhole attacks.

Proceedings ArticleDOI
08 May 2022
TL;DR: In this article , the authors compare the performance of two routing protocols: Ad-hoc on Demand Distance Vector (AODV) and Destination-Sequenced Distance Vector protocol (DSDV) in VANETs.
Abstract: Vehicle Ad-Hoc Networks (VANETs) are a special type of Mobile Ad-Hoc Network (MANETs). In VANETs, a group of vehicles communicates with each other to transfer data without a need for a fixed infrastructure. In this paper, we compare the performance of two routing protocols: Ad-hoc on Demand Distance Vector protocol (AODV) and Destination-Sequenced Distance Vector protocol (DSDV) in VANETs. We measure the reliability of each protocol in the packet delivery.

Journal ArticleDOI
TL;DR: In this paper , the authors proposed an improvement of AODV protocol called AMAODV (Adaptive Mobility aware AODVM), which is based on new metric combine more routing metrics between each node and one hop neighbor.
Abstract: A mobile ad-hoc network (MANET) is different from other wireless networks in many ways. One of the key differences is that a MANET is a multihop wireless network,i.e., a routing path is composed of intermediate mobile nodes and wireless links connecting them. In this paper, heterogeneous Mobile Ad-hoc Networks (H-MANETs) are considered. H-MANETs are composed of nodes with different transmission range. We propose an improvement of AODV protocol called AMAODV (Adaptative Mobility aware AODV). This protocol is based on new metric combine more routing metrics (distance, relative velocity, queue length and hop count) between each node and one hop neighbor. Which permits to avoid losing route. Through the simulation, it is confirmed that this improvement has higher packet delivery ratio and less average end-to-end delay than basic AODV protocol.

Journal ArticleDOI
TL;DR: A black hole attack detection algorithm (BDA) based on statistical theory that collects information in real time so it can detect and prevent black hole attacks as they begin to act and has very good performance in the network scenario underblack hole attack with different number of malicious nodes.
Abstract: One of the challenges of Mobile Ad Hoc Networks (MANET) is black hole attack. This is a form of destructive attack, causing very heavy damage to network performance once successfully implemented. By replying to the route with HC=1 and the largest SN, the malicious node fools the source node into thinking that it has the best and freshest cost-effective route to the destination node. As a result, all the data packets get caught in the malicious node and go missing without being able to reach the destination node. Most of the previous research was based on the characterization of black hole attacks or simple check mechanisms to detect cyberattacks. This leads to limitations that need to be overcome such as: Error rate in malicious node detection algorithm, routing waste, data routing efficiency in normal network scenario. This paper proposes a black hole attack detection algorithm (BDA) based on statistical theory. BDA collects information in real time so it can detect and prevent black hole attacks as they begin to act. The proposed solution uses a balance threshold value, calculated based on statistical theory, as the threshold for detecting black hole attack. A node that replies to the route with an SN value greater than the threshold is identified as a malicious node and isolated immediately upon attack. The article also proposes a black hole attack detection routing protocol (BDAODV) by improving the AODV protocol using BDA solution. The performance of the BDAODV protocol is evaluated and compared with related solutions on a network model with random mobile nodes. The simulation results have shown that the proposed protocol has very good performance in the network scenario under black hole attack with different number of malicious nodes.

Proceedings ArticleDOI
01 Dec 2022
TL;DR: In this paper , the authors compared the effectiveness and efficiency of the IDS-based deep learning systems in VANET routing protocols, including DS R (Dynamic Source Routing), DSDV (Destination Sequence Distance Vector) and AODV (Ad hoc on Demand Distance Vector).
Abstract: Both the world and technology are changing. Autonomous vehicles are already common on several nations' roadways thanks to advancements in electronics. We're getting closer to a time when everyone will drive safer, greener vehicles. A dedicated vehicular ad hoc network named VANET was developed for this reason. Routing protocols are among the most crucial components for network dependability. The most well-known VANET routing protocols are examined in this work. These three are DS R (Dynamic Source Routing), DSDV (Destination Sequence Distance Vector) and AODV (Ad hoc on Demand Distance Vector). In vehicular ad hoc networks, as well as in autonomous and connected vehicles, there are numerous cutting-edge techniques for intrusion detection. An intrusion detection system's primary task is to find and report attacks (IDS). IDS is improved with deep learning to make it smarter and more precise. On the other side, it suggests additional difficulties. This research compares the effectiveness and efficiency of the proposed IDS -based deep learning systems.