Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.

Authors and Affiliations

Richa Gulati , Savita Shivani

Keywords

Related Articles

 Application of Big Data in Intelligent Traffic System

 Abstract: With the rapid developmentof society, transportation industryis also facing unprecedentedchallenges, if big data is used in this area, the advantage is obvious, it can resolve the questions of traditional...

 Selective Encryption of Plaintext Using Multiple Indexing

 Abstract: Selective Encryption is one of the encryption algorithm in the field of multimedia security. They are used for the purpose of hiding image, video or audio files. The main feature of selective encryption i...

 Multimodal Medical Image Fusion Based On SVD

 Image fusion is a promising process in the field of medical image processing, the idea behind is to improve the content of medical image by combining two or more multimodal medical images. In this paper a  ...

 Analysis of Alignment of TEM Image using ECC

 Abstract: TEM images are rapidly gaining prominence in various sectors like life sciences, pathology, medical science, semiconductors, forensics, etc. Hence, it is important to analyse the methods which are availab...

Results for Web Graph Mining Base Recommender System forQuery, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method

Abstract: In Previous paper, We have already discussed a general framework on Web graphs mining based recommender system for Query, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method. In...

Download PDF file
  • EP ID EP88848
  • DOI -
  • Views 140
  • Downloads 0

How To Cite

Richa Gulati, Savita Shivani (2014).  Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-5. https://europub.co.uk./articles/-A-88848