Home|Journals|Articles by Year|Audio Abstracts
 

Research Article

EEO. 2021; 20(3): 4163-4172


Aodv Routing System For Manets Security And Efficiency

Neha Garg, Richa Gupta.




Abstract

There are a variety of applications for networks. Its widespread use was a driving force behind the development of mobile ad-hoc networks (MANETs). A mobile ad-hoc network is a decentralised wireless technology that generates a network that can adapt quickly to new circumstances. MANET is a growing dynamic network that is also sometimes referred to as mobile mesh network. This is because of the dynamic aspect of MANET, which includes its changing topology as well as the fact that it is wireless. Due to the fact that MANETs are collaborative and open systems, as well as the limited availability of assets, they present a number of different sorts of security concerns. When compared to more conventional networks, the routing is more complicated because there is no central coordinator to oversee it. The ad hoc on demand distance vector, often known as AODV, is the most popular and commonly used routing protocol in mobile ad hoc networks. This is because it possesses several qualities that are helpful to the network. When a particular host or node fails, it will send a message to the source about this failure, which will cause the performance to degrade. The performance of the AODV Reactive routing protocol is presented in this work, coupled with an examination of the many attacks that are possible to execute against AODV. In addition to this, it provides a description of two layer signature security techniques, one of which is a secure hash algorithm designed to enhance the typical performance of AODV. The AODV protocol is extended here, which contains a secure cryptographic hash and a digital signature method. The goal of this modification is to further improve the security of the protocol while maintaining the network's performance. Using NS2 simulator, which is a discrete event-driven simulator, we have successfully implemented the recommended approach. This helps to enhance things like performance and security, which are both important considerations.

Key words: System , Manets , Security , Efficiency






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.