Reference Hub2
Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol

Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol

Geetanjali Rathee, Hemraj Saini
Copyright: © 2017 |Volume: 8 |Issue: 1 |Pages: 18
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781522511953|DOI: 10.4018/IJMCMC.2017010101
Cite Article Cite Article

MLA

Rathee, Geetanjali, and Hemraj Saini. "Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol." IJMCMC vol.8, no.1 2017: pp.1-18. http://doi.org/10.4018/IJMCMC.2017010101

APA

Rathee, G. & Saini, H. (2017). Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 8(1), 1-18. http://doi.org/10.4018/IJMCMC.2017010101

Chicago

Rathee, Geetanjali, and Hemraj Saini. "Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 8, no.1: 1-18. http://doi.org/10.4018/IJMCMC.2017010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and eliminate the malicious nodes involved during routing path formation in mesh environments by doing some amendments in basic AODV routing phenomenon. The proposed mechanism is further merged with previously proposed secure authentication and signature routing (SASR) protocol to address the security threats such as grey hole, black hole attacks and to recover the network metrics in terms of packet loss ratio, packet delivery ratio, computational time and network throughput. Further, the approach is simulated by computing the network throughput in both the scenarios i.e. with the involvement of malicious nodes and without involvement of malicious nodes. Moreover, we have validated the network metrics of proposed mechanism against conventional approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.