IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622116                                                     

Detection of Malicious Node Attacks in Mobile Ad-Hoc Networks using Link Quality Estimation Routing Protocol


A.Viji, J. Jaygeetha
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Mobile Ad hoc Networks (MANETs) are used for providing Quality of Service (QoS) where nodes are having mobility and can travel in any random direction. There are several reactive protocols available in literatures which are suitable for MANETs based on single and multiple paths. Among these, AOMDV protocol is the most suitable for finding multiple paths to the destination. Multipath routing mechanisms have been preferred over single path routing to provide parallel safe paths and to maximize throughput. Applying traditional shortest path metric for multipath route selection leads to traffic concentration at some nodes resulting in congestion, thereby causing performance degradation. Reliable data transmission among mobile nodes in highly dynamic ad hoc networks was not ensured by AOMDV routing protocol due to the selection of the multiple node disjoint paths based on only minimal hop counts that lead to link failures and route breaks.

A.Viji, J. Jaygeetha

Routing; Route discovery; Link quality; Ad hoc on-demand multipath distance vector routing (AOMDV).

  1. Abusalah L., Khokhar A., 2008: "A survey of secure mobile ad hoc routing protocols," Commun Surveys Tuts 10(4), pp 78–93.
  2. Bandaranayake A.U., Agrawal D.P., 2012: "Indoor link quality comparison of IEEE 802.11 a channels in a multi-radio mesh network testbed," J Inf Process Syst 8(1), pp 1–20
  3. Chung K.S., Lee J.E., 2012: "Design and Development of m-Learning Service Based on 3G Cellular Phones," JIPS 8(3), pp 521.
  4. Gawande A., 2013: "Performance analysis of DSR protocol under sinkhole attack in MANETs," International Journal, 1.
  5. Kapoor R.K., Rizvi M.A., 2011: "Exploring Multi Path routing Protocols in Mobile Ad hoc Networks," JCMS, pp. 693–779.
  6. Li X., Mitton N., 2012: "Achieving load awareness in position-based wireless ad hoc routing," Journal of Convergence.
  7. Luo H., Shyu M.L., 2011: "Quality of service provision in mobile multimedia survey," HCIS, pp 1–15.
  8. Mallapur S.V., Patil S.R., 2013: "Stable backbone based multipath routing protocol for mobile ad-hoc networks," ICCPCT, IEEE, pp. 1105–1110.
  9. Marina M.K., Das S.R., 2001: "On-demand multipath distance vector routing in ad hoc networks," International Conference,IEEE, pp. 14-23.
  10. Peng-cheng G.U., 2011: "Research of AODV Routing Protocol for Ad Hoc Networks," Science Technology and Engineering, pp 18-023.
  11. Sumathi R., Srinivas M.G.,2012: "A survey of QoS based routing protocols for wireless sensor networks," J Inf Process Syst 8(4), pp 589–602.
  12. Taneja S.,Kush A., 2010: "Experimental Analysis of DSR, AODV using Speed and Pause time," IJIMT, pp 453–458.

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
582-587 IJSRSET1622116   Technoscience Academy

Cite This Article

A.Viji, J. Jaygeetha, "Detection of Malicious Node Attacks in Mobile Ad-Hoc Networks using Link Quality Estimation Routing Protocol", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.582-587, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622116.php