2015
DOI: 10.1007/978-3-319-25067-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Improving Security Issues in MANET AODV Routing Protocol

Abstract: Abstract. Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…According to Gharehkoolchian et al [2], to mitigate node corruption, they introduced a new trust model that incorporates TLs for nodes and sets limitations on TL level. For every node in the network, a TL is assigned It is said to be more respectable if it generally functions by distributing packets and is given the IP address 2.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…According to Gharehkoolchian et al [2], to mitigate node corruption, they introduced a new trust model that incorporates TLs for nodes and sets limitations on TL level. For every node in the network, a TL is assigned It is said to be more respectable if it generally functions by distributing packets and is given the IP address 2.…”
Section: Literature Surveymentioning
confidence: 99%
“…A decentralised MANET is used to construct a dynamic network where there is no central authority and no permanent infrastructure [1]. They communicate with one another in a multi-hop fashion to get past contact coverage and resource limitations [2]. Based on their relative proximity, nodes either make direct connections to one another or act as hosts and routers [3].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the scheme requires buffering of the packets in a circular queue, which incurs significant overhead in searching the match for the packets in the buffer. Gharehkoolchian et al [7] proposed a novel trust model, which uses different trust levels (TL) for nodes and imposes the limitations based on the trust level in order to mitigate the malicious nodes. When a node enters the network, it is assigned TL = 1.…”
Section: Related Workmentioning
confidence: 99%
“…A scheme for the routing protocol AODV is proposed to detect and remove Gray Hole and Black Hole Attacks [8]. In this scheme, the intermediate node detects the malicious node sending false routing information by calculating a PEAK value, where the PEAK value is the maximum possible value of the sequence number that any RREP can have in the current state [9]. Then, when this intermediate node receives a RREP having sequence number higher than the calculated PEAK value; it is marked as DO_NOT_CONSIDER [10].…”
Section: Introductionmentioning
confidence: 99%
“…Our proposed technique differs from the techniques cited above in that it focuses on forwarding only the valid route reply to the next node, even in the case of one or more black hole attacks, by sending twice the same packet reply with the difference of plus one in the sequence number to determine whether the second packet corresponds to the first [12].…”
Section: Introductionmentioning
confidence: 99%