Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Performance of the Authentication Based AODV Routing Protocol in MANET


Affiliations
1 Department of Information Technology, Kongu Engineering College, Perundurai, Erode, Tamilnadu,, India
2 Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu, India
     

   Subscribe/Renew Journal


An Ad hoc network is a collection of wireless computers (nodes) communicating among themselves over multi-hop paths. Also it is an infrastructure-less network which has dynamic topology, organized by itself and can be easily deployed with minimum configuration. These are the constraints which draw the attention and importance of ad hoc networks in defense applications. In recent years, security in ad hoc networks becomes an exiting and interesting research topic that has started to receive attention from a number of researchers. Several routing protocols for ad hoc networks have been proposed, but most of them failed to consider the security problem. In this paper, Triple Hash Technique (THT) has been implemented to protect the routing information. The security associations between source node and destination node and also between the nodes are established, when they are in the coverage area of each other, by exchanging appropriate information. This security mechanism is based on Ad hoc On-demand Distance Vector (AODV) routing protocol for ad hoc networks. The results show that in a mobile adhoc network, the Triple Hash Technique provides secure routing even in the presence of malicious nodes.

Keywords

Ad Hoc Network, AODV, Authentication, Triple Hash Technique.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 118

PDF Views: 3




  • Performance of the Authentication Based AODV Routing Protocol in MANET

Abstract Views: 118  |  PDF Views: 3

Authors

S. Varadhaganapathy
Department of Information Technology, Kongu Engineering College, Perundurai, Erode, Tamilnadu,, India
A. M. Natarajan
Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu, India

Abstract


An Ad hoc network is a collection of wireless computers (nodes) communicating among themselves over multi-hop paths. Also it is an infrastructure-less network which has dynamic topology, organized by itself and can be easily deployed with minimum configuration. These are the constraints which draw the attention and importance of ad hoc networks in defense applications. In recent years, security in ad hoc networks becomes an exiting and interesting research topic that has started to receive attention from a number of researchers. Several routing protocols for ad hoc networks have been proposed, but most of them failed to consider the security problem. In this paper, Triple Hash Technique (THT) has been implemented to protect the routing information. The security associations between source node and destination node and also between the nodes are established, when they are in the coverage area of each other, by exchanging appropriate information. This security mechanism is based on Ad hoc On-demand Distance Vector (AODV) routing protocol for ad hoc networks. The results show that in a mobile adhoc network, the Triple Hash Technique provides secure routing even in the presence of malicious nodes.

Keywords


Ad Hoc Network, AODV, Authentication, Triple Hash Technique.