COMPARATIVE ANALYSIS OF EXISTING ALGORITHMS WITH A NEW APPROACH FOR ELIMINATE THE BLACKHOLE AND WORMHOLE ATTACK TO FIND THE BEST PATH FOR ROUTING
DOI:
https://doi.org/10.29121/shodhkosh.v5.i5.2024.2106Keywords:
RREQ, RREP, AODV, Block Hole, Wormhole Attack, SAODV, MSAODVAbstract [English]
Effective routing algorithms are crucial for optimizing network communication in various domains, including telecommunications, computer networks, and transportation systems. This research paper proposes a novel routing algorithm and compares its performance with existing algorithms to identify the most efficient solution. By evaluating factors such as latency, throughput, scalability, and resource utilization, this study aims to provide insights into improving network routing for enhanced performance and reliability. These algorithms have go through the important role in networks and in suggesting the best path for data transmission. In this study, we propose a novel routing algorithm and conduct a comprehensive comparison with established algorithms to identify the best path for routing in various network scenarios with the removal of blackhole and wormhole attack. The proposed algorithm is designed to optimize path selection based on key metrics such as packet delivery ratio, end-to-end delay, throughput and robustness. To evaluate its performance, we implement the proposed algorithm alongside well-known routing algorithms, and prominent routing protocol such as AODV. In this research we found that it the packet delivery ratio and throughput become higher than this is the proof that the data packet has been follows the best path to the destination. Using a simulated environment, we generate diverse test cases representing different network topologies, traffic patterns, and failure scenarios. Through extensive experimentation, we collect and analyzed performance metrics for each algorithm, enabling a thorough comparison of their strengths and weaknesses. Our findings provide valuable insights into the effectiveness of the proposed algorithm relative to existing approaches. Research highlights its unique advantages and areas for improvement, offering valuable guidance for network engineers and researchers seeking optimal routing solutions. This study contributes to the ongoing evolution of routing algorithms, facilitating more efficient and reliable network communication in diverse environments.
References
S. Zeadally E. Yaprak1 Y. Li X. Che , “A Survey of Network Performance Tools For Computer Networks Classes” , Division of Engineering Technology, 2001
Asha Ambaikar, H.R. Sharma, V. K. Mohabey , “ Improved AODV for Solving Link Failure In Manet” , International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012 1 ISSN 2229-5518 2012
Sunil Kumar and Pankaj Negi , “A Link Failure Solution in Mobile Adhoc Network through Backward AODV (B-AODV)”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011 ISSN (Online): 2230-7893, 2011
Ravindra .E, VinayaDatt V Kohir and V. D Mytri , “A Local Route Repair Algorithm Based On Link Failure Prediction In Mobile Adhoc Network”, World Journal of Science and Technology 2011, 1(8): 64-67 ISSN: 2231 –2587, 2011
Srinath Perur, Abhilash P. and Sridhar Iyer , “Router Handoff: A Preemptive Route Repair Strategy for AODV” IEEE, 2003
Donatas Sumyla, “ Mobile Adhoc Networks” , IEEE Personal Communications Magazine, April 2003, pp. 46-55
Charles, E.P., Elizabeth, M.R.: Ad hoc On-Demand Distance Vector Routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (1999)
Refik, M., Pietro, M.: Security in ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 756–775. Springer, Heidelberg (2003)
Panagiotis, P., Zygmunt, J.H.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX (2002)
Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile computing. Kluwer Academic Publ., Dordrecht (1996)
M.F. Khan, K.-L.A. Yau, Route Selection in 5G-based Flying Ad-hoc Networks using Reinforcement Learning, in: Int. Conf. on Control Sys., Comp. and Eng., ICCSCE, 2020, pp. 23–28. DOI: https://doi.org/10.1109/ICCSCE50387.2020.9204944
Y. Wang, Y. Tang, BRLR: A Routing Strategy for MANET Based on Reinforcement Learning, in: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, 2021, pp. 1412–1417. DOI: https://doi.org/10.1109/TrustCom53373.2021.00199
Tsvetan Marinov and Borislava Petkova, "Comparative Analysis of AODV and MTP Routing Protocols in VANET", 2023 58th International Scientific Conference on Information Communication and Energy Systems and Technologies (ICEST) Nis Serbia, 29 June 2023 – 01 July 2024 DOI: https://doi.org/10.1109/ICEST58410.2023.10187345
Salam, T. and Hossen, M., 2020. Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network. Wireless Personal Communications, 113(1), pp.189-222. DOI: https://doi.org/10.1007/s11277-020-07185-6
Muhannad Tahboush 1 And Mary Agoyi “A Hybrid Wormhole Attack Detection In Mobile Ad-Hoc Network (MANET) “ January 11, 2021, Date Of Publication January 13, 2021 Digital Object Identifier 10.1109/ACCESS.2021.3051491
Aditya Bhawsar; Yogadhar Pandey; Upendra Singh” Detection And Prevention Of Wormhole Attack Using The Trust-Based Routing System”, IEEE Electronics And Sustainable Communication Systems (ICESC), 2020 International Conference. DOI: https://doi.org/10.1109/ICESC48915.2020.9156009
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi And A. Mammeri.” Graph-Based Wormhole Attack Detection In Mobile Ad Hoc Networks (Manets)”, International Conference On Mobile And Secure Services (Mobisecserv). Doi:10.1109/Mobisecserv.2018.8311439, 2018. DOI: https://doi.org/10.1109/MOBISECSERV.2018.8311439
Sudhir Kumar Sharma And Shruti Thapar , “Detection And Prevention Policies Of Attack In MANET” Proceedings Of International Conference On Innovative Advancement In Science And Technology (IAET 2020), India, Https://Dx.Doi.Org/10.2139/Ssrn.3548382. DOI: https://doi.org/10.2139/ssrn.3548382
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Prajeet Sharma, Pratima Gautam

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.