http://www.iaeme.com/IJCET/index.asp 99 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 8, Issue 5, Sep-Oct 2017, pp. 99–106, Article ID: IJCET_08_05_011
Available online at
http://www.iaeme.com/ijcet/issues.asp?JType=IJCET&VType=8&IType=5
Journal Impact Factor (2016): 9.3590(Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
STUDY OF SECURITY ENHANCEMENT IN
AODV ROUTING PROTOCOL IN AD HOC
NETWORKS
Jayashree Agarkhed
Professor, Department of Computer Science & Engineering,
P.D.A College of Engineering, Kalaburagi, India
ABSTRACT
Ad hoc network is a dynamically formed network by collection of movable nodes
with changing topology, due to nodes mobility and without having centralized
administration. Nodes communicate by exchanging data with another node,
establishing multi hop network. This type of communication needs vigilant design of
routing protocols to satisfy various Quality of Service (QoS) parameters. There is a
need to satisfy request of finding a route that utilizes sufficient available resources to
meet the QoS constraints in order to achieve low cost or most stable route in real time
and military applications. The study of Ad hoc On Demand Distance Vector (AODV)
routing protocol has been presented along with security enhancement to AODV
routing protocols.
Key word: AODV, Routing, Security attack, Black hole, Sink hole.
Cite this Article: Jayashree Agarkhed, Study of Security Enhancement in AODV
Routing Protocol in Ad hoc Networks. International Journal of Computer
Engineering & Technology, 8(5), 2017, pp. 99–106.
http://www.iaeme.com/ijcet/issues.asp?JType=IJCET&VType=8&IType=5
1. INTRODUCTION
Mobile Ad hoc networks (MANET) consist of nodes with mobility and get interconnect by
multi hop communication. Nodes in an ad hoc network communicate directly with each other
in a peer to peer manner due to lack of fixed infrastructure. The intermediate nodes act as
router to provide communication between source and destination node. Each node to identify
itself, broadcast periodically a beacon packet. MANET has wide range of applications such as
commercial, health and industrial applications with cooperative huge mobile data exchange.
There is a demand for existing and future application in military networking for robust,
IP-compliant data services within these wireless mobile networks [1]. These networks consist
of dynamic autonomous topology. Wearable computing provides wide applications for
MANET technology. MANET technology when combined properly with satellite information
system, provide a method for flexible communications establishment to assure safety
operations with efficient, survivable, dynamic networking. Most of the applications of