Abstract
A MANET consists of numerous mobile nodes that are dynamically connected by wireless links to form a temporary network. Secure routing in the main area of research in MANET. Designing a reliable security protocol for ad hoc routing is a difficult task due to the lack of central authority, node mobility, topology changes, and limited availability of resources. MANETs must have a secure method for transmission which is challenging and main issue. Black hole attack is malicious security attack in ad hoc networks, which can be simply occupied by exploiting limitation of on-demand routing protocols such as Ad Hoc On-Demand distance vector (AODV). The DRAGON-AODV routing protocol is designed by change the AODV routing using dragonfly algorithm. The DRAGON-AODV algorithm has been changed to hold the black hole attack resulting MDRAGON-AODV algorithm. This is done by changing the exploration stage of the DRAGON-AODV algorithm. The MDRAGON-AODV has the better ability to hold the black hole attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Majumder, K., & Sarkar, S. K. (2009). Performance analysis of AODV and DSR routing protocols in hybrid network. International Journal of Advanced Research in Computer Science, 8(4)(Special Issue),140–145 © 2015–2019, IJARCS All Rights Reserved 145 Scenario. Proceedings IEEE Transactions on Networking, pp. 1–4.
Rangarajan, C., Sridevikarumari, S., Sujitha, V. (2017). Recent routing protocols in mobile AdHoc network (MANET). International Journal of Advanced Research in Computer and communication Engineering ICITCSA, 6(1). Pioneer College of Arts and Science, Coimbatore.
Er. Jatinder Kaur & Er. Gurpreet Singh (2017). Review study on MANET routing protocols: challenges and applications. International Journal of Advanced Research in Computer Science, 8(4) (Special Issue).
Sharma, R., Sharma, T. (2016). A comparative review on routing protocols in MANET. International Journal of Computer Applications, 133(1).
Rathee, P., Singla, M., Goyal, D. (2013). A survey on AODV routing protocol in MANETS. IJCSMS International Journal of Computer Science and Management Studies, 13(03).
Raja, L., Baboo, S. S. (2014). An overview of MANET: Applications, attacks and challenges. International Journal of Computer Science and Mobile Computing, IJCSMC, 3(1), 408–417.
Parasher1, R., Rathi, Y. (2015). A_AODV: A modern routing algorithm for mobile Ad-Hoc network. International Research Journal of Engineering and Technology (IRJET), 02(01), e-ISSN: 2395–0056, p-ISSN: 2395–0072. www.irjet.net.
Ding, S., Liu, L. (2010). A node-disjoint multipath routing protocol based on AODV. In Proceedings of 9th International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), pp. 312–316.
Nihad, I., Ilkan, A. M., Ozen, E. (2015). Fuzzy approach to improving route stability of the AODV routing protocol. EURASIP Journal on Wireless Communications and Networking.
Chavan, A. A., Kurule, D. S., & Dere, P. U. (2016). Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. ScienceDirect, Procedia Computer Science, 79, 835–844.
Shashwat, Y., Pandey, P., Arya, K. V., & Kumar, S. (2017). A modified AODV protocol for preventing blackhole attack in MANETs. Information Security Journal: A Global Perpective, 26(5), 240–248.
Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computer and Applications, 27, 1053–1073. https://doi.org/10.1007/s00521-015-1920-1.
Sarkar, D., Choudhury, S. (2018). Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. Journal of King Saud University—Computer and Information Sciences.
Saini, G. L., Panwar, D., & Singh, V. (2014). Modeling, implementation and performance investigation of efficient-AODV routing protocol in MANET using data rate. International Journal of Enhanced Research in Science Technology and Engineering, 3(1), 76–82.
Saini, A., & Singh, V. (2013). Implementation and performance analysis of improved DSR routing protocol to Detect an inimical node in MANETs using NS-2. International Journal for Research and Development in Engineering (IJRDE), 2, 33–44.
Choudhary, S. S., Singh, V., & Dadhich, R. (2011). Performance investigations of routing protocols in manets. In International conference on advances in computing and communications (pp. 54–63). Springer, Berlin.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Goyal, M., Kumar, S., Sharma, V.K., Goyal, D. (2020). Modified Dragon-Aodv for Efficient Secure Routing. In: Sharma, H., Govindan, K., Poonia, R., Kumar, S., El-Medany, W. (eds) Advances in Computing and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0222-4_51
Download citation
DOI: https://doi.org/10.1007/978-981-15-0222-4_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0221-7
Online ISBN: 978-981-15-0222-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)