ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Simulation and Review of SAODV NS2 Simulation

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)

Publication Date:

Authors : ; ;

Page : 876-882

Keywords : AODV; SAODV; Digital Signatures; Hash Chain Function;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless mobile ad-hoc networks are networks without using any physical connections. These networks Does not have any fixed topology due to the mobility of the nodes, path loss, multipath propagation, and interference. For this task many routing Protocols have been developed. The purpose of this Review paper is to Review and understand, two mobile ad-hoc routing protocols AODV and SAODV. AODV is a popular reactive routing protocol in MANET. The reactive indicates that a node exchanges routing information only when it has some data to transfer and keeps the routing information renew as long as the communication with the node is available. But AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to AODV rules. To make overall network secure, SAODV is being introduced. SAODV (Secured Ad-Hoc on Demand Vector Routing) is one of the existing secured mechanisms which use digital signature and hash chain function to secure AODV packets. Secured AODV improves the AODV message format by including the security parameter for securing the routing messages. The goal of this master thesis is to analyze and simulate AODV & SAODV routing protocols using NS2.

Last modified: 2014-08-27 21:14:17