Open Access   Article Go Back

Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol

D. Shanmugasundaram1 , A. R. Md. Shanavas2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 995-1005, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.9951005

Online published on Apr 30, 2019

Copyright © D. Shanmugasundaram, A. R. Md. Shanavas . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Shanmugasundaram, A. R. Md. Shanavas , “Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.995-1005, 2019.

MLA Style Citation: D. Shanmugasundaram, A. R. Md. Shanavas "Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol." International Journal of Computer Sciences and Engineering 7.4 (2019): 995-1005.

APA Style Citation: D. Shanmugasundaram, A. R. Md. Shanavas , (2019). Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol. International Journal of Computer Sciences and Engineering, 7(4), 995-1005.

BibTex Style Citation:
@article{Shanmugasundaram_2019,
author = {D. Shanmugasundaram, A. R. Md. Shanavas },
title = {Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {995-1005},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4156},
doi = {https://doi.org/10.26438/ijcse/v7i4.9951005}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.9951005}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4156
TI - Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol
T2 - International Journal of Computer Sciences and Engineering
AU - D. Shanmugasundaram, A. R. Md. Shanavas
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 995-1005
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
783 192 downloads 134 downloads
  
  
           

Abstract

Mobile ad-hoc networks (MANET) are a collection of mobile nodes that communicate with each other without any infrastructure. MANET is one of the temporary network, and it can establish anywhere anytime. Security is an necessary requirement in mobile ad-hoc networks to establish protected communication between mobile nodes. MANET are vulnerable to various types of attacks. One of main attacks is cosmic dust attack and black hole attack, it is a denial of service attack and it drops entire incoming packets between one source to destination. In this paper, it introduced new technique for avoiding both attacks with AODV routing protocol. This technique is tested and evaluated by using OmNetpp tool.

Key-Words / Index Term

Mobile ad hoc network (MANET), AODV, cosmic dust attack, Black hole attack

References

[1]. Qussai M. Yaseena, Monther Aldwairi, “An Enhanced AODV Protocol for Avoiding Black Holes in MANET”, Science Direct, Procedia Computer Science , Volume :134,2018, pp. 371–376.
[2]. G. Stephanie Vianna,,T. Vishnu Priya, M. Sathya, “Trust Based Approach To Overcome Black Hole Attack in MANET”, International Journal of Pure and Applied Mathematics, ISSN: 1314-3395,Volume 118 No. 22, 2018, pp. 1763-1769,
[3] Sweta Tarale and Dr. Abha Choubey,” Black Hole Attack Implementation and Detection in Mobile Ad Hoc Networks”, International Journal on Recent and Innovation Trends in Computing and Communication, ISSN: 2321-8169, Volume: 6, Issue: 5, May 2018, pp. 117 - 120.
[4]. Vikram Narayandas, Sujanavan Tiruvayipati, Madusu Hanmandlu and Lakshmi Thimmareddy. “Anomaly Detection System in a Cluster Based MANET”, Computer Communication, Networking and Internet Security, Lecture Notes in Networks and Systems 5,DOI 10.1007/978-981-10-3226-4_2, 2017,pp. 11-21.
[5]. Rashmi and Ameeta Seehra, “Detection and Prevention of Black-Hole Attack in MANETS”, International Journal of Computer Science Trends and Technology (IJCST), ISSN: 2347-8578, Volume 2, Issue 4, Jul-Aug 2014, pp.204-209.
[6]. Minoti Puray and Priyanka Palod, “Black-Hole Attack in MANET: A Study”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 5 Issue 3, March 2016, pp. 597- 601.
[7]. VeerpalKaur and Simpel Rani, “A Hybrid and Secure Clustering Technique for Isolation of Black hole Attack in MANET”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 7, Issue 3, March 2018, pp. 230-237.
[8]. Niranjan Panda1 and Binod Kumar Pattanayak, “Defense Against C-Operative Black-Hole Attack and Gray-hole Attack in MANET”,International Journal of Engineering & Technology, ISSN: 2227-524X, Volume 7, Issue 3.4, 2018, pp. 84-89.
[9]. Asha Ambhaikar, H.R. Sharma, V. K. Mohabey, “Improved AODV Protocol For Solving Link Failure In Manet, International Journal of Scientific & Engineering Research, ISSN 2229-5518, Volume 3, Issue 10, October-2012,pp. 1-6.
[10]. Salman M. Al-Shehri and Pavel Loskot, “Enhancing Reliability of Tactical MANETs by Improving Routing Decisions”, Journal of Low Poer Electrinics and Applications, Volume 8, Issue 49, 2018, pp.1-15.
[11]. S.Gayathri Devi and Dr.A.Marimuthu, “Forwarding Node Reduction with Link Break Time Prediction”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 24,2017, pp. 14441-14446.
[12]. Amanpreet Singh, Bhupinder Kaur, “To Propose a Novel Technique for Link Recovery in MANET”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5 Issue 2, February 2016.
[13]. B.Karthikeyan and Dr.S.Hari Ganesh, “Analysis of Reactive AODV Routing Protocol for MANET”, IEEE Xplore, Digital Library,ISBN:978-1-4799-2876-7, Oct 2014, pp. 264-267, Scopus Index, Impact Factor :5.629.
[14]. B.Karthikeyan and Dr.S.Hari Ganesh, “Security and Time Complexity in AODV Routing Protocol”, International Journal of Applied Engineering Research (ISSN:0973-4562), Vol. 10, No.20,June 2015, pp.15542- 155546.
[15]. B. Karthikeyan and Dr.S.Hari Ganesh, “Encrypt - Security Improved Ad Hoc On Demand Distance Vector Routing Protocol (En-SIm AODV)”, ARPN Journal of Engineering and Applied Sciences (ISSN: 1819-6608), Vol. 11, No. 2, January 2016,pp. 1092-1096.
[16]. B. Karthikeyan,Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan, “ Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (OpTiB-AODV)”, International Journal of Computer Applications (ISSN:0975 – 8887), Vol. 140, No.6, April 2016,pp 7-11.
[17]. B. Karthikeyan, Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan , “High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OpTiB AODV)”,International Journal of Computer Science Engineering(E-ISSN: 2347-2693),Vol. 4, No. 4, April 2016, pp.156-164.