• Title/Summary/Keyword: AODV routing protocol

Search Result 208, Processing Time 0.024 seconds

An Adaptive AODV Algorithm for Considering Node Mobility (노드 이동성을 고려한 적응형 AODV 알고리즘)

  • Hong, Youn-Sik;Hong, Jun-Sik;Lim, Hwa-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.529-537
    • /
    • 2008
  • AODV routing protocol is intended for use by mobile' nodes in an ad-hoc network. In AODV nodes create routes on an on-demand basis. As the degree of node mobility becomes high, however, the number of the control packets, RREQ and RREP messages, have increased so rapidly. The unexpected increases in the number of the control packets cause the destination node to decrease the packet receiving rate and also to increase the overall energy consumption of such a network. In this paper, we propose a novel method of adaptively controlling the occurrences of such RREQ messages based on AIAD (additive increase additive decrease) under a consideration of the current network status. We have tested our proposed method with the conventional AODV and the method using timestamp based on the three performance metrics, i.e.. how long does node moves, node velocity, and node density, to compare their performance.

Performance Analysis of Routing Protocols for Mobile Ad-hoc Network under Group Mobility Environment (그룹 이동 환경에서의 무선 애드혹 네트워크 라우팅 알고리즘 성능 분석)

  • Yang, Hyo-Sik;Yeo, In-Ho;Rhee, Jong-Myung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.52-59
    • /
    • 2008
  • Most pier performance analysis results for ad-hoc routing protocols have been based upon the model which each node in the network moves independently without restriction. In most real environments, however, it is very common for a group or multiple groups to move under the direction of group leader or group leaders instead of each node's independent movement. This paper presents the performance analysis of routing protocols for mobile ad-hoc network under group mobility environment. The comparative simulations have been made between a table-driven protocol, DSDV, and two on-demand protocols, AODV and DSR, under a group mobility model, RPGM, which is suitable for the practical applications such as military tactical operation. Multiple group movements are also included. The results show that the protocol performances for single group movement are very similar to node independent movement case. However some differences have been observed by varying pause time and connectivity.

An Enhanced AODV based Energy-aware Routing Protocol for Route Maintenance in MANET (배터리 용량을 고려한 개선된 AODV 라우팅 알고리즘)

  • Kim Kwan-Woong;Lee Jeong-Soo;Pan Ce;Chung Kyung-Taek;Chon Byoung-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.22-30
    • /
    • 2006
  • In this paper, the goal of our proposed algorithm is to reduce link -failure and route failure caused by dead nodes which consume all of the battery life. I propose an algorithm which provides a ability of changing mutes to neighbor nodes before some of intermediate nodes be shutting don to get the stable route maintenance. To achieve this goal, The proposed routing algerian uses additional new messages to check energy status for monitoring energy of neighbor nodes and to change the path to a neighbor node. From extensive simulations, results show that possibility of cut-offs and time-delay cause of packet-loss have been decreased and also the improvement of transmission effectiveness.

A Secure and Efficient Method for Detecting Malicious Nodes in MANET (MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안)

  • Lee KangSeok;Choi JongOh;Ji JongBok;Song JooSeok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.617-622
    • /
    • 2005
  • Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.

A Comparative Analysis on Performance of Wireless Sensor Networks Routing Protocols

  • KRISHNA, KONDA. HARI;NAGPAL, TAPSI;BABU, Y. SURESH
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.240-244
    • /
    • 2022
  • The common goals of designing a routing algorithm are not only to reduce control packet overhead, maximize throughput and minimize the end-to-end delay, but also take into consideration the energy consumption. Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSN's). Three metrics (power consumption, time of transmission and packet loss rate) are used in order to compare three routing protocols which are AODV, DSDV and LEACH.

A Reactive Routing Scheme based on the Prediction of Link State for Communication between UAV Squadrons in a Large-Scale FANET (대규모 FANET에서 UAV 편대간 통신을 위한 링크 상태 예측에 기반한 반응적 라우팅 기법)

  • Hwang, Heedoo;Kwon, Oh Jun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.593-605
    • /
    • 2017
  • In applications which are covered wide range, it is possible that one or more number of Unmanned Aerial Vehicle(UAV) squadrons are used to perform a mission. In this case, it is most important to communicate seamlessly between the UAV squadrons. In this paper, we applied the modified OLSR(OSLR-Pds) which can prediction for state of the link for the communication in UAV squadron, and applied the modified AOMDV which can build multi-path for the communication between UAV Squadrons. The mobility of nodes are modeled using Gauss-Markov algorithm, and relative speed between nodes were calculated by derive equation of movement, and thereby we can predict link state for in a squadron and between squadrons. An experiment for comparing AODV, AOMDV and the proposed routing protocol was conducted by three factors such as packet delivery ratio, end to end delay, and routing overhead. In experiment result, we make sure that the proposed protocol performance are superior in these three factors. However, if the density of the nodes constituting FANET are too low, and if the moving speed of node is very slow, there is no difference to others protocols.

A Routing Metric to Improve Route Stability in Mobile Wireless Sensor Networks

  • XU, Yi-Han;WU, Yin;SONG, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2245-2266
    • /
    • 2016
  • The hop count routing metric is widely used in routing protocols of Wireless Sensor Networks (WSNs) due to its simplicity and effectiveness. With a lower hop count route, fewer transmissions are required to send a packet from the source to the destination. This can improve the throughput of a network because fewer transmissions results in less channel contention and interference. Despite this, the hop count routing metric may not be ideal for mobile scenarios where the topology of a network changes constantly and rapidly. In this paper, we propose to increase route stability in mobile WSNs by discovering paths that are more stable during route discoveries using routing metrics. Two routing metrics were proposed, the true beauty of these routing metrics lies in the fact that they can even be used even without specialized hardware such as GPS and other sensors. We implemented the proposed routing metrics in the AODV routing protocol and found that they are highly effective and outperform other stability-based routing metrics and the hop count routing metric.

Performance Enhancement of AODV Routing Protocol Based on Interrupt Message and Backup Path Strategy in MANET (MANET환경에서 Interrupt Message와 Backup path 기법에 기반한 AODV의 성능개선)

  • Lee, Yun-kyung;Kim, Ju-gyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1313-1329
    • /
    • 2015
  • In MANET, frequent route breaks lead to repeated route discovery process and this increases control packet overhead and packet drop. AODV-I improves performance of AODV by using the event driven approach which removes periodic Hello message. Unlike the Hello message, Interrupt message which is sent for each event can detect and predict the link failure because it allows node to know the status of the neighbor node. From this characteristics of Interrupt message, performance of AODV-I can be further improved by adding a processing procedures for each type of Interrupt message and it is also possible to improve AODV-I by adding the Backup path scheme because it originally has problems due to a single path of AODV. In this paper, we propose AODV-IB that combines improved Backup path scheme and Interrupt message approach of AODV-I in order to reduce transmission delay and the number of route discoveries. AODV-IB improves AODV-I by adding proper processing procedures for the link failure prediction and detection for each Interrupt message. We also implement improved Backup path strategy in AODV-IB by minimizing delay without additional Control packet. Simulation results, using the simulator QualNet 5.0, indicate that proposed AODV-IB performs better than AODV-I.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A Study on AODV Routing protocol's Performance evaluation in Mobile Ad Hoc Network (이동 애드혹 네트워크에서 AODV 라우팅 프로토콜의 성능 평가)

  • Kang, Kyeong-In;Park, Kyong-Bae;Jung, Chan-Hyeok;Oh, Se-Duck;Bae, Jin-Seung;Lee, Kwang-Bae;Kim, Hyun-Wook;Kim, Young-Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1261-1264
    • /
    • 2002
  • Ad-hoc 무선망은 각자의 이동 노드에 대한 제약이 없고, 유선망이나 기지국과 같은 기반구조를 필요로 하지 않기 때문에 병원, 전시장, 생산 현장과 같은 곳에서 사용되는 자치분산 네트워크이다. 최근 들어 이동 Ad-hoc 네트워크에서 사용되는 AODV, DSR, TORA, ZRP등의 라우팅 프로토콜 연구가 활발히 이루어지고 있는 실정이다. 따라서 본 논문에서는 AODV 라우팅 프로토콜을 사용하여 다양한 네트워크 환경에서 성능평가와 라우팅 프로토콜의 문제점을 수정, 개선하였다.

  • PDF