AODV Routing Protocol Performance in Malicious Environment

  • Bhupendra PatelEmail author
  • Anurag Gupta
  • Nabila Hyder
  • Kamlesh Rana
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


The Mobile Ad-hoc Network (MANET) is constructed based on wireless medium and it is of self organizing manner. MANET is simple to set up and has changing topology. The mobile Ad-hoc networks are in danger of different attacks because MANET operational environment is open and dynamic. In MANET, data transfer use the different Routing protocols. Selfish (Malicious) node work is completely different as compared to normal Mobile nodes. Malicious nodes have capability to remove or modify the Routing Information. It also sends the fake Route Request to access user’s data. It is responsible for attacks on the existing normal mobile nodes and creates receiver collision, restricted transmission power, fake misbehavior etc. Malicious node carries different types of attacks on the networks so it directly or indirectly effects the routing Performance. The intention of this work is to check and analyze the Network performance in malicious environment and provide prevention for the attack. Throughput and Delay are analyzed for Denial of Service (DoS) attack and prevention scenarios.


MANET AODV Routing Protocol 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ismail, I.I., Ja’afar, M.H.F.: Mobile Ad Hoc Network Overview. In: Proceedings of Asia-Pacific Conference on Applied ElectromagneticsGoogle Scholar
  2. 2.
    Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocolsGoogle Scholar
  3. 3.
    Liu, C., Kaiser, J.: A Survey of Mobile Ad Hoc network Routing Protocols. University of Ulm Tech. Report Series, Nr. 2003-08Google Scholar
  4. 4.
    Chlamtac, I., Conti, M., Jennifer, J.-N.: Liu.: Mobile ad hoc networking: imperatives and challengesGoogle Scholar
  5. 5.
    Al-Omari, S.A.K., Sumari, P.: An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Application. Journal on Applications of Graph Theory in Wireless Ad-hoc Networks and sensor Networks 2(1) (2010)Google Scholar
  6. 6.
    Taneja, K., Patel, R.B.: Mobile Ad hoc Networks: Challenges and Future. In: Proceedings of National Conference on Challenges & Opportunities in Information Technology (2007)Google Scholar
  7. 7.
    Sheikhl, R., Chandee, M.S., Mishra, D.K.: Security Issues in MANET: A Review. In: 7th International Conference on Wireless and Optical Communications Networks (2010)Google Scholar
  8. 8.
    Kumar, V., Sharma, R., Kush, A.: Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks. International Journal of Computer Science and Management Research 1(3) (2012)Google Scholar
  9. 9.
    Saini, A., Kumar, H.: Effect of Black Hole Attack on AODV Routing Protocol In MANET. IJCST 1(2) (2010)Google Scholar
  10. 10.
    Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. IFIP, vol. 100, pp. 107–121. Springer, Heidelberg (2002)Google Scholar
  11. 11.
    Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2009)Google Scholar
  12. 12.
    Crépeau, C., Davis, C.R., Maheswaran, M.: A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. In: 21st International Conference on Advanced Information Networking and Applications Workshops (2007)Google Scholar
  13. 13.
    Li, X., Xu, S.: A Stochastic Modeling of Coordinated Internal and External Attacks. Submitted to Dependable Systems and Networks (DSN) (2007)Google Scholar
  14. 14.
    Chouhan, N.S., Yadav, S.: Flooding Attacks Prevention in MANET. IJCTEEGoogle Scholar
  15. 15.
    Patel, B.B., Thaker, C.S., Jani, N.R.: Analysis and Implementation of Malicious Node in AODV Routing Protocol 6(4) (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Bhupendra Patel
    • 1
    Email author
  • Anurag Gupta
    • 2
  • Nabila Hyder
    • 2
  • Kamlesh Rana
    • 2
  1. 1.CSE Dept.Dr. Jivraj Mehta Inst. of TechnologyMogar, AnandIndia
  2. 2.Dept. of Computer Science EngineeringGalgotias College of Engineering & TechnologyGreater NoidaIndia

Personalised recommendations