





Performance of the Authentication Based AODV Routing Protocol in MANET
Subscribe/Renew Journal
An Ad hoc network is a collection of wireless computers (nodes) communicating among themselves over multi-hop paths. Also it is an infrastructure-less network which has dynamic topology, organized by itself and can be easily deployed with minimum configuration. These are the constraints which draw the attention and importance of ad hoc networks in defense applications. In recent years, security in ad hoc networks becomes an exiting and interesting research topic that has started to receive attention from a number of researchers. Several routing protocols for ad hoc networks have been proposed, but most of them failed to consider the security problem. In this paper, Triple Hash Technique (THT) has been implemented to protect the routing information. The security associations between source node and destination node and also between the nodes are established, when they are in the coverage area of each other, by exchanging appropriate information. This security mechanism is based on Ad hoc On-demand Distance Vector (AODV) routing protocol for ad hoc networks. The results show that in a mobile adhoc network, the Triple Hash Technique provides secure routing even in the presence of malicious nodes.
Keywords
Ad Hoc Network, AODV, Authentication, Triple Hash Technique.
User
Subscription
Login to verify subscription
Font Size
Information

Abstract Views: 290

PDF Views: 3