High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)
Keywords:
SIm AODV, MANET, En-SIM AODV, Self-Configuring, HiLeSec-OpTiB AODV, OmNet++Abstract
The most wanted wireless networks is Mobile Ad hoc Network (MANET). MANET can configure easily without any infrastructure which one is used by at present as an infrastructure oriented wired or wireless network. It is one of the infrastructures less network consist of mobile devices. Individually each and every device in the Mobile ad hoc network will act as a router as well as node which provide the flexibility in the physical topology, optimal routing and data communication. In this paper the proposed HiLeSec-OpTiB AODV is the combination of En-SIm and OpTiB AODV. This combined algorithm is tested with intruders(active and passive attackers). This proposed HiLeSec-OpTiB AODV is implemented and tested by the use of OmNet++.
References
. Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security, Volume-9, No-4 (2011), pp 106-110.
. Nagendra, M., and B. Kondaiah. "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks." International Journal of Computer Sciences and Engineering, Volume-2, Issue-5 (2014) pp 15-19.
. B.Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh, “Complexity in Security Issues of MANET Pertaining to AODV Protocol”, International Conference on Contemporary Trends in Computer Science (CTCS - 2014). Feb 2014.
. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh- “Security and Time Complexity in AODV Routing Protocol”, IJAER, pp15542- 155546, Vol 20,June 2015.
. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh- “Security Improved Ad-Hoc On-demand Distance Vector Routing Protocol”, IJARE, pp, Vol ,On Print.
. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh, “Encrypt - Security Improved Ad Hoc On Demand Distance Vector Routing Protocol (En-SIm AODV)”, ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 2, JANUARY 2016
. B.Karthikeyan,Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan, “ Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (OpTiB-AODV)”, International Journal of Computer Applications (0975 – 8887) Volume 140 – No.6, April 2016
.Naincy Juneja, Abhishek Mishra ,An implementation of security policy by using ID in Adhoc routing for mobile network, IJIACS,April 2014.
. Neeraj Saini, Lalit Garg,Enhanced, “AODV Routing Protocol against Black hole Attack”, IJARCSSE, June 2014.
. Rajdeep S. Shaktawat,Dharm Singh, Naveen Choudhary, An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV), IJCA, July 2014.
. Shabnam, Jitendra Arora, “Detection of Cosmic Dust Attack in MANET under AODV Routing Protocol”, IJRASET, May 2014.
. Radha Krishna Bar, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh, “QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack”, 2013.
. Dr.Mahmood K. Ibrahem , Ameer M. Aboud, “A Secure Routing Protocol for MANET”, IJCSET, July 2014.
. Sunil Taneja, Sima Singh, Ashwani Kush, “Encryption Scheme for Secure Routing in Ad Hoc Networks”,IJICT, Vol 1, No 1, ISSN 0976- 4860,2011,PP 22-29.
. Rajdeep S. Shaktawat, Dharm Singh, Naveen Choudhary, “An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE- AODV)”,IJCA (0975 – 8887), PP 34-41. Volume 97– No.8, July 2014,
. A. Jegatheesan, D. Manimegalai, “Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme”, WSEAS TRANSACTIONS on COMPUTERS, E-ISSN: 2224-2872, Volume 14, 2015,PP 124-133.
. Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014
. K.S.Abitha, Anjalipandey, DR.K.P.Kaliyamurthie, “Secured Data Transmission Using Elliptic Curve Cryptography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 3, March 2015,PP 1419-1425
. S. Abila Judith Suganthi, P. Rajesh, “ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL”, Elysium Journal, P-ISSN: 2347-4408, Volume - 2, Issue – 2, April 2015.
.Xiaoxia Qi ,Qijin Wang and Fan Jiang, “ Multi-path Routing Improved Protocol in AODV Based on Nodes Energy”, International Journal of Future Generation Communication and Networking Vol. 8, No. 1 (2015), pp. 207-214
.Manoj Tolani, Rajan Mishra,l “ Effect of Packet Size on Various MANET Routing Protocols”, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Volume 4– No.9, December 2012,PP:10-13.
.Kewal Vora, Jugal Shah, Shreyas Parmar and Shivani Bhattacharjee, "MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (26-31), Oct -2015, E-ISSN: 2347-2693
. Nand Kishore, SukhvirSingh and Renu Dhir, "Energy Related Issues for MANETs: A Study", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (98-100), Mar -2014
. Neha Agarwal and Neeraj Manglani, “A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015pp 1780-1784.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
