Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 6463157, 8 pages
http://dx.doi.org/10.1155/2016/6463157
Research Article

The Improved Overhearing Backup AODV Protocol in MANET

Department of Computer Engineering, Islamic Azad University, Isfahan (Khorasgan) Branch, Isfahan, Iran

Received 17 August 2015; Revised 27 December 2015; Accepted 3 January 2016

Academic Editor: Rui Zhang

Copyright © 2016 Elham Zamani and Mohammadreza Soltanaghaei. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. L. Denovic, “Mobile ad hoc network security,” in Proceedings of the 5th International Scientific Conference on Defensive Technologies (OTEH '12), Belgrade, Serbia, September 2012.
  2. S. D. Ubarhande, “Performance evolution of AODV and DSR routing protocols in MANET using NS2,” International Journal of Scientific & Engineering Research, vol. 3, no. 5, pp. 1–5, 2012. View at Google Scholar
  3. P. Jawandhiya, “A survey of mobile Ad Hoc network attacks,” International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063–4071, 2010. View at Google Scholar
  4. K. Sivakumar and G. Selvaraj, “Analysis of worm hole attack in MANET and avoidance using robust secure routing method,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 1, 2013. View at Google Scholar
  5. W. K. Lai, S. Hsiao, and Y. Lin, Adaptive Backup Routing for Ad-Hoc Networks, Elsevier, 2007.
  6. G. M. Lee, “AODV-BR: backup routing in ad hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '00), Chicago, Ill, USA, September 2000.
  7. V. P. Patil, K. T. Patil, A. R. Kharade, and D. Gote, “Performance enhancement of reactive on demand routing protocol in wireless Ad Hoc network,” International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), vol. 1, no. 4, 2012. View at Google Scholar
  8. P. Zhou and W. Li, “A bidirectional backup routing protocol for mobile ad hoc networks,” in Proceedings of the 2nd International Conference on Business Computing and Global Informatization (BCGIN '12), pp. 603–606, IEEE, Shanghai, China, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Su and R. Boppana, “Mitigating wormhole attacks using passive monitoring in mobile ad hoc networks,” in Proceedings of the IEEE Global Telecommunications Conference, pp. 1–5, IEEE, New Orleans, La, USA, November 2008. View at Publisher · View at Google Scholar
  10. R. Siwach and V. Kaul, “Mitigating large propagation delay by mitigating wormhole attack in mobile Ad Hoc network,” International Journal of Science and Research Publications, vol. 3, no. 6, 2013. View at Google Scholar
  11. A. Hassan, S. Ahsan, S. Alshomrani, and A. Alshamrani, “Packet travel time based mechanism for detection and mitigation against wormhole attack in AODV for MANET,” Life Science Journal, vol. 11, pp. 636–641, 2014. View at Google Scholar
  12. Z. Feng, L. Wang, and X. Gao, “An improved routing protocol ad-AODV based on AODV,” in International Conference on Information Science and Computer Applications (ISCA '13), Atlantis Press, 2013.