The document compares the performance of the reactive routing protocols AODV and DYMO in a mobile ad hoc network (MANET) under different types of wormhole attacks. It finds that without attacks, AODV performs better than DYMO. However, under wormhole attacks, the performance of both protocols decreases significantly. All pass and threshold wormhole attacks have a major effect on performance. As the number of nodes increases, the presence of wormhole nodes greatly reduces performance.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document evaluates the performance of the AODV and DSR routing protocols for variable bit rate (VBR) traffic in mobile ad hoc networks (MANETs) with 150 nodes. It analyzes the protocols based on four metrics: packet received, throughput, routing overhead, and network load. The results of simulations in NS-2 show that AODV outperforms DSR in terms of packet received and throughput, with AODV receiving significantly more packets than DSR and achieving higher throughput. DSR has lower routing overhead but also lower performance for packet delivery.
This document summarizes a research paper that evaluates the performance of the Dynamic Source Routing (DSR) routing protocol for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks (MANETs) using the Network Simulator 2 (NS-2). The paper conducts simulations of DSR under different scenarios by varying the terrain size, connection rate, and data send rate. It compares the performance of DSR and an enhanced version of DSR based on packet delivery ratio, average end-to-end delay, and optimal path length. The results show that the enhanced DSR performs better in terms of packet delivery but worse in terms of delay and path length compared to the original DSR protocol.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
This document describes a study that developed a test bed to evaluate load and battery lifetime in wireless mesh networks using a multicast forwarding approach. The test bed used the AODV routing protocol and implemented layer 3 acknowledgments and retransmissions. Results found that the network supported data delivery with acknowledgments even under full load. Battery lifetime across mesh nodes was measured between 19-100% and load was minimum compared to previous work, demonstrating the effectiveness of the multicast forwarding approach. Future work could enhance security and implement cross-layer support between network and MAC layers.
This document analyzes the performance of two on-demand routing protocols (AODV and DSR) in mobile ad hoc networks with varying network sizes up to 50 nodes. It simulates the protocols using the NS-2 network simulator and measures performance metrics like packet delivery fraction, end-to-end delay, normalized routing load, and throughput. The results show that the differences in AODV and DSR protocol mechanics lead to significant variations in performance for different network densities.
This document evaluates the performance of the AODV and DSR routing protocols for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks. It conducts simulations in NS-2 to analyze four performance metrics: packet received, throughput, routing overhead, and network load. The results show that AODV outperforms DSR for packet received, throughput, and routing overhead. DSR has higher network load than AODV. Therefore, the document concludes that AODV is better suited than DSR for VBR multimedia transmission in mobile ad hoc networks.
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...CSCJournals
Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Lots of protocols are developed in this field but it is not easier to decide which one is winner. In this paper, we present investigations on the behavior of five routing protocols AODV (Ad hoc On demand distance vector), DSR (Dynamic Source Routing), DYMO (Dynamic MANET On demand), OLSR (Optimized link state routing) and ZRP (Zone routing protocol) based on IEEE 802.11CSMA/CA MAC protocol are analyzed and compared using QualNet simulator on the basis of performance metrics such as Average Jitter, Total Packets Received, Packet Delivery Ratio, End-to-End Delay, Throughput, Average Queue Length, Average time in Queue, dropped packets due to non availability of routes and Energy consumption in transmit and receive Mode. To test competence and effectiveness of all five protocols under diverse network scenarios costing is done by means varying load by varying CBR data traffic load, changing number of Nodes and mobility. Finally results are scrutinized in from different scenarios to provide qualitative assessment of the applicability of the protocols.
This document summarizes a research paper that compares the performance of two reactive routing protocols (AODV and DSR) in mobile ad hoc networks (MANETs) using the NS-2 simulator. It provides background on MANETs and describes the key mechanisms of AODV and DSR. The document then outlines the simulation setup, including mobility and traffic models, and the performance metrics used to evaluate and compare the protocols: packet delivery ratio, throughput, and average end-to-end delay.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document evaluates the performance of the AODV and DSR routing protocols for variable bit rate (VBR) traffic in mobile ad hoc networks (MANETs) with 150 nodes. It analyzes the protocols based on four metrics: packet received, throughput, routing overhead, and network load. The results of simulations in NS-2 show that AODV outperforms DSR in terms of packet received and throughput, with AODV receiving significantly more packets than DSR and achieving higher throughput. DSR has lower routing overhead but also lower performance for packet delivery.
This document summarizes a research paper that evaluates the performance of the Dynamic Source Routing (DSR) routing protocol for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks (MANETs) using the Network Simulator 2 (NS-2). The paper conducts simulations of DSR under different scenarios by varying the terrain size, connection rate, and data send rate. It compares the performance of DSR and an enhanced version of DSR based on packet delivery ratio, average end-to-end delay, and optimal path length. The results show that the enhanced DSR performs better in terms of packet delivery but worse in terms of delay and path length compared to the original DSR protocol.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
This document describes a study that developed a test bed to evaluate load and battery lifetime in wireless mesh networks using a multicast forwarding approach. The test bed used the AODV routing protocol and implemented layer 3 acknowledgments and retransmissions. Results found that the network supported data delivery with acknowledgments even under full load. Battery lifetime across mesh nodes was measured between 19-100% and load was minimum compared to previous work, demonstrating the effectiveness of the multicast forwarding approach. Future work could enhance security and implement cross-layer support between network and MAC layers.
This document analyzes the performance of two on-demand routing protocols (AODV and DSR) in mobile ad hoc networks with varying network sizes up to 50 nodes. It simulates the protocols using the NS-2 network simulator and measures performance metrics like packet delivery fraction, end-to-end delay, normalized routing load, and throughput. The results show that the differences in AODV and DSR protocol mechanics lead to significant variations in performance for different network densities.
This document evaluates the performance of the AODV and DSR routing protocols for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks. It conducts simulations in NS-2 to analyze four performance metrics: packet received, throughput, routing overhead, and network load. The results show that AODV outperforms DSR for packet received, throughput, and routing overhead. DSR has higher network load than AODV. Therefore, the document concludes that AODV is better suited than DSR for VBR multimedia transmission in mobile ad hoc networks.
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...CSCJournals
Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Lots of protocols are developed in this field but it is not easier to decide which one is winner. In this paper, we present investigations on the behavior of five routing protocols AODV (Ad hoc On demand distance vector), DSR (Dynamic Source Routing), DYMO (Dynamic MANET On demand), OLSR (Optimized link state routing) and ZRP (Zone routing protocol) based on IEEE 802.11CSMA/CA MAC protocol are analyzed and compared using QualNet simulator on the basis of performance metrics such as Average Jitter, Total Packets Received, Packet Delivery Ratio, End-to-End Delay, Throughput, Average Queue Length, Average time in Queue, dropped packets due to non availability of routes and Energy consumption in transmit and receive Mode. To test competence and effectiveness of all five protocols under diverse network scenarios costing is done by means varying load by varying CBR data traffic load, changing number of Nodes and mobility. Finally results are scrutinized in from different scenarios to provide qualitative assessment of the applicability of the protocols.
This document summarizes a research paper that compares the performance of two reactive routing protocols (AODV and DSR) in mobile ad hoc networks (MANETs) using the NS-2 simulator. It provides background on MANETs and describes the key mechanisms of AODV and DSR. The document then outlines the simulation setup, including mobility and traffic models, and the performance metrics used to evaluate and compare the protocols: packet delivery ratio, throughput, and average end-to-end delay.
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
A mobile ad-hoc network (MANET) is a collection of
mobile nodes, which communicate over radio. These networks
have an important advantage; they do not require any
existing infrastructure or central administration. Therefore,
mobile ad-hoc networks are suitable for temporary
communication links. This flexibility, however, comes at a
price: communication is difficult to organize due to frequent
topology changes. In this paper we propose on-demand
routing algorithm for mobile, multi-hop ad-hoc networks. The
algorithm is based on ant algorithms, which are a class of
swarm intelligence. The main goal in the design of the
algorithm is to reduce the overhead for routing. Furthermore,
in this paper the performance of AODV protocol is analyzed
by varying mobility and node density parameters through
simulation of results ns2 simulator.
This document presents a comparative analysis of three routing protocols for mobile ad hoc networks (MANETs): AODV, DSR, and OLSR. It analyzes the performance of these protocols under different scenarios varying node mobility, network load, and node density. The key metrics examined are throughput, end-to-end delay, routing overhead, and network load. The analysis found that OLSR generally had the highest throughput and AODV and OLSR introduced less delay than DSR. DSR introduced the highest routing overhead, while protocols performed similarly under varying network loads.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
This document summarizes a research paper that compares the performance of three routing protocols (DSDV, DSR, and AODV) in a mobile ad hoc network using the NS-2 simulator. The paper analyzes key performance metrics like packet delivery ratio and end-to-end delay under different numbers of nodes. Simulation results show that the reactive DSR protocol generates and receives more packets than the proactive DSDV protocol. DSR also has better packet delivery ratio and lower end-to-end delay compared to DSDV and AODV as the number of nodes increases. The paper concludes that DSR performs best in the simulated chain topology network.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
1) The document proposes an improvement to the AODV routing protocol called AODV_V for wireless networks.
2) AODV_V uses a table-driven routing approach like DSDV for stationary nodes to quickly find routes, while using an on-demand approach like AODV for active nodes to reduce overhead.
3) Simulation results showed that AODV_V improved delivery rate and reduced delay and packet loss compared to the standard AODV protocol.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Performance measured in wireless ad hoc networks using multicost parameters b...dlogumorappur
The document summarizes a study on measuring the performance of the Destination Sequenced Distance Vector (DSDV) routing protocol in wireless ad hoc networks using a multicost parameter approach. It proposes a Multicost Parameters Based DSDV (MPB-DSDV) routing protocol that uses multiple cost parameters such as hop count, interference, delay, energy, and transmission power to select optimal paths. The study simulates DSDV and MPB-DSDV and compares their performance based on metrics like packet delivery ratio, dropped packets, end-to-end delay, routing overhead, and route length. The results show that MPB-DSDV outperforms regular DSDV on most metrics due to its ability to
This document summarizes a research paper that proposes a new routing protocol called Timer Based DFS-LAROD (TBD-LAROD) for intermittently connected mobile ad hoc networks (MANETs). The protocol uses a timer function and depth first search approach to handle voids (areas with no nodes) during packet routing. When a node encounters a void, it sets a void flag. This flag is passed along routes to help avoid voids. The timer function considers void flags, node progress towards the destination, and load balancing to select the next hop. Simulation results show TBD-LAROD improves delivery ratio compared to the existing LAROD-LoDiS protocol without void handling.
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
This document compares the performance of the AODV and AntHocNet routing protocols in static wireless networks. It presents simulation results for packet delivery ratio, end-to-end delay, loss rate, throughput, and jitter using the Network Simulator 2 (NS2) and both 802.11 and 802.11b protocols. The results show that AODV generally outperforms AntHocNet across the metrics, having lower delay, higher throughput and packet delivery at various data rates. However, AntHocNet's performance improves relative to AODV at higher data rates and numbers of nodes.
This document analyzes the performance of different routing protocols (AODV, DSR, DSDV) under various mobility models (random waypoint, random direction, random walk) and node speeds in mobile ad hoc networks. It finds that reactive protocols like AODV and DSR generally have higher packet delivery ratios than proactive DSDV, but end-to-end delays vary depending on the mobility model and node speed. The document proposes an algorithm to select the best routing protocol based on whether data delivery or time is the higher priority, and whether nodes are stationary or mobile. DSDV is preferred when data delivery is most important, while DSR performs better for time-critical applications.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A survey of mitigating routing misbehavior in mobile ad hoc networksIAEME Publication
This document summarizes various techniques that can be used to detect and mitigate routing misbehavior in mobile ad hoc networks (MANETs). It discusses how selfish or malicious nodes can degrade network performance by dropping packets. It categorizes the main approaches as credit-based schemes, which use virtual currencies to incentivize packet forwarding, and reputation-based schemes, which use techniques like watchdog and path rater to monitor node behavior and isolate misbehaving nodes. It also describes end-to-end acknowledgment schemes like 2ACK, SACK and BFTR that detect routing errors through feedback from the destination node.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a study comparing the performance of the AODV and MAODV routing protocols in a mobile ad hoc network (MANET) using the Network Simulator 2 (NS-2). The study introduces a malicious node to simulate a hacker attack and analyzes the impact on packet delivery ratio, end-to-end delay, and throughput under different node densities and pause times. The results show that MAODV has lower performance than AODV, and the difference increases as the number of nodes increases due to the greater impact of the malicious node. Future work could extend the study to include more malicious nodes and design a new protocol to detect and mitigate malicious nodes.
This document discusses trust-based routing in mobile ad hoc networks (MANETs). It provides an overview of several trust management approaches that have been proposed for MANET routing:
1. A direct and indirect trust formation approach that calculates trust values based on a node's own observations and recommendations from peer nodes. This allows resources to be shared only among trusted nodes.
2. A hybrid trust management framework (HTMF) that more robustly evaluates trust based on direct observations and second-hand information. This makes it resistant to certain attacks.
3. An adaptive multi-level trust (AMLeT) framework that calculates two complementary trust levels - hard and soft trust - depending on security needs. It introduces
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
A mobile ad-hoc network (MANET) is a collection of
mobile nodes, which communicate over radio. These networks
have an important advantage; they do not require any
existing infrastructure or central administration. Therefore,
mobile ad-hoc networks are suitable for temporary
communication links. This flexibility, however, comes at a
price: communication is difficult to organize due to frequent
topology changes. In this paper we propose on-demand
routing algorithm for mobile, multi-hop ad-hoc networks. The
algorithm is based on ant algorithms, which are a class of
swarm intelligence. The main goal in the design of the
algorithm is to reduce the overhead for routing. Furthermore,
in this paper the performance of AODV protocol is analyzed
by varying mobility and node density parameters through
simulation of results ns2 simulator.
This document presents a comparative analysis of three routing protocols for mobile ad hoc networks (MANETs): AODV, DSR, and OLSR. It analyzes the performance of these protocols under different scenarios varying node mobility, network load, and node density. The key metrics examined are throughput, end-to-end delay, routing overhead, and network load. The analysis found that OLSR generally had the highest throughput and AODV and OLSR introduced less delay than DSR. DSR introduced the highest routing overhead, while protocols performed similarly under varying network loads.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
This document summarizes a research paper that compares the performance of three routing protocols (DSDV, DSR, and AODV) in a mobile ad hoc network using the NS-2 simulator. The paper analyzes key performance metrics like packet delivery ratio and end-to-end delay under different numbers of nodes. Simulation results show that the reactive DSR protocol generates and receives more packets than the proactive DSDV protocol. DSR also has better packet delivery ratio and lower end-to-end delay compared to DSDV and AODV as the number of nodes increases. The paper concludes that DSR performs best in the simulated chain topology network.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
1) The document proposes an improvement to the AODV routing protocol called AODV_V for wireless networks.
2) AODV_V uses a table-driven routing approach like DSDV for stationary nodes to quickly find routes, while using an on-demand approach like AODV for active nodes to reduce overhead.
3) Simulation results showed that AODV_V improved delivery rate and reduced delay and packet loss compared to the standard AODV protocol.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Performance measured in wireless ad hoc networks using multicost parameters b...dlogumorappur
The document summarizes a study on measuring the performance of the Destination Sequenced Distance Vector (DSDV) routing protocol in wireless ad hoc networks using a multicost parameter approach. It proposes a Multicost Parameters Based DSDV (MPB-DSDV) routing protocol that uses multiple cost parameters such as hop count, interference, delay, energy, and transmission power to select optimal paths. The study simulates DSDV and MPB-DSDV and compares their performance based on metrics like packet delivery ratio, dropped packets, end-to-end delay, routing overhead, and route length. The results show that MPB-DSDV outperforms regular DSDV on most metrics due to its ability to
This document summarizes a research paper that proposes a new routing protocol called Timer Based DFS-LAROD (TBD-LAROD) for intermittently connected mobile ad hoc networks (MANETs). The protocol uses a timer function and depth first search approach to handle voids (areas with no nodes) during packet routing. When a node encounters a void, it sets a void flag. This flag is passed along routes to help avoid voids. The timer function considers void flags, node progress towards the destination, and load balancing to select the next hop. Simulation results show TBD-LAROD improves delivery ratio compared to the existing LAROD-LoDiS protocol without void handling.
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
This document compares the performance of the AODV and AntHocNet routing protocols in static wireless networks. It presents simulation results for packet delivery ratio, end-to-end delay, loss rate, throughput, and jitter using the Network Simulator 2 (NS2) and both 802.11 and 802.11b protocols. The results show that AODV generally outperforms AntHocNet across the metrics, having lower delay, higher throughput and packet delivery at various data rates. However, AntHocNet's performance improves relative to AODV at higher data rates and numbers of nodes.
This document analyzes the performance of different routing protocols (AODV, DSR, DSDV) under various mobility models (random waypoint, random direction, random walk) and node speeds in mobile ad hoc networks. It finds that reactive protocols like AODV and DSR generally have higher packet delivery ratios than proactive DSDV, but end-to-end delays vary depending on the mobility model and node speed. The document proposes an algorithm to select the best routing protocol based on whether data delivery or time is the higher priority, and whether nodes are stationary or mobile. DSDV is preferred when data delivery is most important, while DSR performs better for time-critical applications.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A survey of mitigating routing misbehavior in mobile ad hoc networksIAEME Publication
This document summarizes various techniques that can be used to detect and mitigate routing misbehavior in mobile ad hoc networks (MANETs). It discusses how selfish or malicious nodes can degrade network performance by dropping packets. It categorizes the main approaches as credit-based schemes, which use virtual currencies to incentivize packet forwarding, and reputation-based schemes, which use techniques like watchdog and path rater to monitor node behavior and isolate misbehaving nodes. It also describes end-to-end acknowledgment schemes like 2ACK, SACK and BFTR that detect routing errors through feedback from the destination node.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a study comparing the performance of the AODV and MAODV routing protocols in a mobile ad hoc network (MANET) using the Network Simulator 2 (NS-2). The study introduces a malicious node to simulate a hacker attack and analyzes the impact on packet delivery ratio, end-to-end delay, and throughput under different node densities and pause times. The results show that MAODV has lower performance than AODV, and the difference increases as the number of nodes increases due to the greater impact of the malicious node. Future work could extend the study to include more malicious nodes and design a new protocol to detect and mitigate malicious nodes.
This document discusses trust-based routing in mobile ad hoc networks (MANETs). It provides an overview of several trust management approaches that have been proposed for MANET routing:
1. A direct and indirect trust formation approach that calculates trust values based on a node's own observations and recommendations from peer nodes. This allows resources to be shared only among trusted nodes.
2. A hybrid trust management framework (HTMF) that more robustly evaluates trust based on direct observations and second-hand information. This makes it resistant to certain attacks.
3. An adaptive multi-level trust (AMLeT) framework that calculates two complementary trust levels - hard and soft trust - depending on security needs. It introduces
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a research paper that proposes a method for identifying reliable nodes in an ad hoc wireless network to form stable routing paths. The method evaluates nodes based on their transmission range, signal strength, packet forwarding capacity, and position. Nodes meeting certain thresholds for these metrics are identified as reliable and added to a neighbor routing table. Simulation results showed this selective approach to identifying reliable nodes performed better than the traditional AODV routing protocol at maintaining stable routes in the face of node mobility.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
This document summarizes a proposed scheme called 2ACK for detecting routing misbehavior in mobile ad hoc networks (MANETs) that use the Optimized Link State Routing (OLSR) protocol. The 2ACK scheme involves sending two-hop acknowledgments in the opposite direction of the routing path to detect if any nodes are dropping packets instead of forwarding them as they should. Selfish nodes that refuse to forward packets can reduce network performance. The 2ACK scheme aims to identify these misbehaving nodes in order to improve routing reliability and efficiency in MANETs.
This document compares the performance of three mobile ad hoc network (MANET) routing protocols: AODV, FSR, and IERP. It uses the QualNet network simulator to evaluate these protocols based on various metrics like throughput, average jitter, average end-to-end delay, and packet delivery ratio. The protocols are evaluated under different node speeds on a grid topology network with 90 nodes over an area of 1500x1500 meters. Simulation results show that AODV generally performs best in terms of throughput and packet delivery ratio across varying node speeds, while FSR performs worst for these metrics. IERP shows the worst performance for average end-to-end delay and average jitter as node speed increases.
1) The document analyzes the performance of various routing protocols (AODV, DYMO, OLSR, ZRP, DSR, LAR1) in mobile ad hoc networks (MANETs) under different conditions like node speed and number of nodes.
2) Through simulation, it finds that reactive protocols like AODV and DYMO perform worse than proactive (OLSR) and hybrid (ZRP) protocols as node speed and number increase. DSR also degrades significantly with 100 nodes.
3) It concludes OLSR and ZRP have better performance in terms of total packets received and end-to-end delay compared to AODV and DYMO, especially
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...pijans
In VANET high speed is the real characteristics which leads to frequent breakdown, interference etc.
Therefore Performance of adhoc routing protocols is helpful to improve the Quality of Service (QOS). In
this paper we studied various adhoc routing protocols, Reactive, Proactive & Hybrid, taking in to
consideration parameters like speed, altitude, mobility etc in real VANET scenario. The AODV and DYMO
(Reactive), OLSR (Proactive) and ZRP (hybrid) protocols are compared for IEEE 802.11(MAC) and IEEE
802.11(DCF) standard using Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and
data link layer. Hence performance of the protocols in these layers helps to make a right selection of
Protocol for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios
proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF).
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
This document summarizes a simulation study analyzing the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks by varying different parameters. The study uses the Network Simulator 2 (NS-2) tool to simulate ZRP under varying node density, transmission range, pause time, sending rate, and node mobility. Key performance metrics like throughput, end-to-end delay, and normalized routing load are measured. The results show that throughput generally increases with higher node density, transmission range, and pause time, while delay and routing load also tend to increase with those factors. Throughput decreases with higher node mobility, while delay decreases and routing load increases.
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in a mobile ad hoc network simulation using the NS-3 simulator. It describes the key characteristics of each protocol and the simulation setup, which involved 50 nodes moving according to a random waypoint model. The performance metric studied was packet delivery ratio. The results showed that OLSR achieved the highest packet delivery ratio, performing better than AODV and DSDV in delivering packets from source to destination nodes over the 600 second simulation.
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in mobile ad hoc networks based on packet delivery ratio. It simulates the protocols using NS-3 simulator over 600 seconds with 50 nodes moving randomly. The results show that OLSR has the best performance with high and stable packet delivery ratio, while DSDV has the worst performance with many dropped packets. AODV shows average performance throughout the simulation.
This document evaluates the performance of the AODV and DSR routing protocols for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks. It conducts simulations in NS-2 to analyze four performance metrics: packet received, throughput, routing overhead, and network load. The results show that AODV outperforms DSR for packet received, throughput, and routing overhead. DSR has higher network load than AODV. Therefore, the document concludes that AODV is better suited than DSR for VBR multimedia transmission in mobile ad hoc networks.
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
This document evaluates the performance of proactive, reactive, and hybrid ad hoc routing protocols (OLSR, AODV, DYMO, ZRP) for IEEE 802.11 MAC and 802.11 DCF in a vehicular ad hoc network (VANET) simulation using Qualnet. It discusses the characteristics and operations of these four routing protocols. The simulation varies VANET parameters like speed and altitude. The results show that in real traffic scenarios, the proactive OLSR protocol performs more efficiently for IEEE 802.11 MAC and DCF compared to the reactive and hybrid protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
Research Inventy : International Journal of Engineering and Scienceresearchinventy
The document summarizes a study that evaluated the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSDV, and DSR. The protocols were simulated using the NS-2 network simulator across networks of 30 to 70 nodes. Key performance metrics analyzed include packet delivery fraction, average end-to-end delay, normalized routing load, and packet loss. The results found that AODV performed best in terms of packet delivery fraction and shortest end-to-end delay, while DSDV had the lowest normalized routing load and DSR had the lowest packet loss. Overall, the document compares the performance of these three MANET routing protocols under different conditions using simulation results.
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
This document summarizes a research paper that proposes a new hybrid multipath routing protocol called HMPRP for mobile ad hoc networks. HMPRP aims to improve performance metrics like packet delivery ratio, end-to-end delay, energy consumption and throughput. It applies concepts from AODV like route discovery and incorporates received signal strength and node-disjoint multipath routing. Simulation results show HMPRP outperforms AODV, OLSR and ZRP protocols across various node speeds for 150 node networks.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Similar to International Journal of Computational Engineering Research(IJCER) (20)
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
International Journal of Computational Engineering Research(IJCER)
1. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8
Performance Evaluation of Routing Protocols in MANETs under
Wormhole Attack
1,
Pardeep Kaur, 2, Deepak Aggarwal
1,
M. Tech Student , 2, Assistant Professor
1,2
,Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
Abstract
Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central
administrator. Nodes can move fro m one place to another in the network or may leave or join the network at any time.
Due to this the topology of the network changes rapidly. So the routing protocols are required that can adopt the frequent
changes in the network topology. Due to the absence of central ad min istrator the MANETs are vulnerab le to attacks. In
this paper comparison of reactive protocols i.e AODV and DYM O has been done under three types of wormhole attack.
Performance is measured with metrics like Packet Delivery Rat io, Average End -to-End Delay, Th roughput and Jitter by
varying the number of nodes.
Keywords-A ODV, DYMO, MANET, Wormhole
1. Introduction
Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central
administrator. The nodes can leave or join the network at any time. Nodes act as routers that relay packets generated by
other nodes to their destination [Jeroen Hoebeke et al., 2006]. Due to the movement of nodes the topology of the network
changes rapidly. The nodes which are near to each other or within each other’s radio range can communicate direct ly. But
nodes which are far away they use intermediate nodes to send data. MANETs has advantages like Simp le, cheap and fast
setup of networks, mo re robust concerning failure of single component due to decentralized structure because of these
they are used in many applications like wireless sensor networks, rescue operations, sports events and conferences etc.
2. Routing Protocols
Proactive protocols are also known as table driven protocols. In these protocols each node maintains a route in
their routing table to all the destination nodes in the network. Due to that, routes are discovered for every mobile node of
the network, without any request for communication by the hosts [Gurjinder Kau r et al., 2011]. The routing tables are
updated periodically or when a change occurs in the network topology. Some of proactive protocols are DSDV, OLSR
and STAR. Reactive protocols are also known as on-demand routing protocols. In these protocols a route is only
discovered when source node want to send data to the destination node. Source node broadcast a route request message to
find a route to the destination. So me of the reactive routing protocols are DSR, AODV and DYMO. Due to the random
movement of nodes, the network topology becomes unpredictable and changes rapidly. In order to find the most adaptive
and efficient routing protocols for dynamic MANET topologies, the behavior of routing protocols need to be analyzed at
varying node speeds, network size, number of traffic nodes and node density [Fahim Maan et al., 2010].AODV and
DYM O routing protocols are used in simu lation.
2.1 AODV
Ad-hoc on–demand distance vector is a reactive routing protocol. This property imp lies that it requests a route
when it needs one and the nodes which do not want to take part in active co mmunicat ion, need not to maintain routing
tables. AODV uses the sequence number to find fresh routes. AODV has two basic operations: route discovery and route
maintenance. AODV uses RREQ, RREP and RERR messages to find and maintain th e routes.In route discovery , when a
source node desire a route to the destination node for which it does not have a route, it broadcast a route request (RREQ)
message in the network. RREQ message contains source IP address, destination IP address, seque nce number, hop count
and broadcast ID. A neighbor receiving a RREQ may send route reply (RREP), if it is either the destination or if it has
unexpired route to the destination. When destination node send a route reply (RREP) message to the source node, a
forward path is formed. Now source node will send the data through this path.In route maintenance, when a link breakage
in an active route is detected, the node notifies this link breakage by sending a route error (RE RR) message to the source
node [Dong-Won Kum et al., 2010] . The source node will rein itiate the route discovery process if it still has data to send.
2.2 DYMO
DYM O is a successor of AODV. It is a co mb ination of AODV and DSR routing protocols. Similar to AODV,
DYM O has two basic operations, route discovery and route maintenance. In route discovery, the source node broadcast a
RREQ message throughout the network to find the destination node. During this process, each intermediate node records
a route to the source node and rebroadcast the RREQ after appending its own address. This is called the path
||Issn 2250-3005(online)|| ||December || 2012 Page 292
2. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8
accumulat ion function. When the destination node receives the RREQ, it responds with RREP to the source node. Each
intermediate node that receives the RREP records a route to the destination node. When the source node receives RREP
message, the route is established between the source node and the destination node. As path accumulation function can
reduce the routing overhead, although the packet size of the routing packet is increased [Dong-Won Kum et al., 2010].
When a link breaks, the source of the packet is notified. RERR message is sent to inform the source node.
3. Wormhole Attack
High speed of channel lin k
Fig 1. Wormho le attack
Wormhole is a severe type of attack, where t wo attackers are connected to each other through high speed off-channel link.
In this wormhole node receives the packet at one location and send it to other wormhole node through high speed off -
channel link. The worst can happen that nodes can be in dilemma that they are close to the destination even though they
are at far distance.
Three types of wormho le attack are:
1. All Pass: In this wormhole nodes will pass all the packets irrespective of their size.
2. All Drop : In this all the packets are dropped by wormhole nodes.
3 Th reshold: Wormhole drops all the packets size greater than or equal to the threshold value.
4. Simulation And Results
The Qualnet 5.2 simulator is used for simulation. The MA C protocol IEEE 802.11 was used with a data rate of 2
Mbps.
Table 1. Simu lation Parameters
Parameter Value
Terrain Size 1500m×1500 m
No. of Nodes 25/ 50/ 75/ 100
No. of wormho le nodes 4/8/12/16
Traffic Type CBR
No. of CBR links 5
Mobility Model Random Waypoint
Routing Protocols AODV, DYM O
MAC 802.11
Packet Size 512 bytes
Speed 0-10m/s
Pause Time 10 sec
Simu lation Time 400 sec
Attack Type Wormhole
4.1 Performance Metrics
Performane Metrics used to measure the performance are :
4.1.1 Packet Deli very Ratio: Packet delivery rat io is calculated by dividing the number of packets received by the
destination through the number of packets originated by source.
4.1.2 Average End-to-End Delay: Average end-to-end delay is the average time it takes a data packet to reach to
destination in seconds. It is calculated by subtracting “time at which first packet was transmitted by source” from “time at
which first data packet arrived to destination.
4.1.3 Throughput: It is defined as total number of delivered data packets divided by the total duration of simulation time.
4.1.4 Jitter: Jitter is the variation in the time between packets arriving, caused by network congestion, and route changes.
||Issn 2250-3005(online)|| ||December || 2012 Page 293
3. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8
Results without wormhole attack
Results wi th Wormhole
All Pass
||Issn 2250-3005(online)|| ||December || 2012 Page 294
4. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8
ALL Drop In all drop, all the packets that are sent by the sender to the receiver are dropped by the wormhole
nodes.
Fig. 12 Throughput for All Drop mode Fig. 13 Avg Jitter fo r All Drop mode
Threshol d (150 Bytes) In this case, wormhole drops all the packets which are above 150 bytes in size.
5. Conlusion And Future Work
Fro m simulat ion results it is concluded that AODV perform better than DYMO without wormhole attack. But
under the wormhole attack the performance of bothe the protocols decreased. But still A ODV has better performance than
DYM O. A ll Pass and Threshold has effected the performance greatly. At 25 nodes it has shown some results but as the
number of nodes increased the wormhole nodes came into existance and decreased the performance co mpletely. All drop
has less affect on the performance as it drop the route request packets and routes are establishe d through other nodes in
the network.In future work performance can be measured with different performance metrics like routing overhead by
varying pause time and speed. Security mechanism to prevent fro m these types of attacks can also be developed.
||Issn 2250-3005(online)|| ||December || 2012 Page 295
5. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8
References
[1] Priti Garg, Asma Tuteja . Co mparative Performance Analysis of Two Ad-hoc Routing Protocols , International
Conference on Network and Electronics Engineering, IPCSIT vol.11,IACSIT Press, Singapore, 2011.
[2] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade. Mobile Ad Hoc Networking: Imperat ives and Challenges ,
IJCA Special Issue on “Mobile Ad-hoc Networks”, 2010.
[3] Jeroen Hoebeke, Ingird Moerman, Bart Dhoebt and Piet Demeester, , An Overview of Mobile Ad-hoc Networking:
Applications and Challenges, 2006.
[4] S. Su resh kumar, T. V.P Sundararajan and A Shan mugam. Perfo rmance Co mparison of three types of wormhole
attack in Mobile Adhoc Network, proceedings of the international conference on information science and
applications, Chennai, India, 2010.
[5] Gu rjinder Kaur, V. K Jain and Yogesh Chaba. Wormhole attacks: Perfo rmance Evaluation of On Demand Routing
Protocols in Mobile Ad-hoc Networks, world conference on informat ion and communication technologies,pp.
1155-1158, 2011.
[6] Dong-Won Kum, Jin-Su Park, You-Ze Cho and Byoung-Yoon Cheon. Performance Evaluation of AODV and
DYM O Routing Protocols in MANET, IEEE CCNC, 2010.
[7] Fahim Maan, Nau man Mazhar. MANET Routing Protocols vs Mobility Models: A Performance
Evaluation,ICUFN, 2010.
[8] MIAO Quan-xing, XU Lei. DYM O Routing Protocol Research and Simu lation Based on NS2 International
Conference on Co mputer Application and System Modeling , 2010.
[9] Rashid Sheikh, Mahakal Singh Chandel, durgesh Kumar Mishra. Security issues in MANET: A Review, IEEE,
2010.
||Issn 2250-3005(online)|| ||December || 2012 Page 296