Paper
14 March 2013 Implementation of secure AODV in MANET
Rizwan Akhtar, Noor Ul Amin, Imran Memon, Mohsin Shah
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 876803 (2013) https://doi.org/10.1117/12.2010536
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
Mobile Ad hoc Networks (MANETs) comprised of autonomous and self-organizing mobile computing devices which do not have a fixed infrastructure but rather they use ad-hoc routing protocols for data transmission and reception. Ad hoc on demand distance vector (AODV) is an IP reactive routing protocol which is optimized for MANETs and it can also be used for other wireless ad-hoc networks. Nodes in network cannot perform route discovery or maintenance functions itself. This problem is resolved by using AODV as it computes the routing distance from sending node to receiving node at preset intervals. This research paper proposed Secure Routing Protocol (SRP) AODV for MANETs and its implementation. Performance of proposed SRP is compared to ordinary AODV. The simulation results reveal that proposed SRP is more efficient and secure than ordinary AODV. SRP AODV can be used for further research towards development of a commercial demand for the MANET routing protocol using Blowfish cryptosystem for encryption and decryption for secure routing in a given mobile ad hoc network.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rizwan Akhtar, Noor Ul Amin, Imran Memon, and Mohsin Shah "Implementation of secure AODV in MANET", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876803 (14 March 2013); https://doi.org/10.1117/12.2010536
Lens.org Logo
CITATIONS
Cited by 8 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Computer simulations

Mobile communications

Data communications

Data transmission

Detection and tracking algorithms

Back to Top