Difference between AODV and DSDV Routing Protocols Using NS2 Simulation

Monali P. Khobragade, Bharti D. Sayare, Dipika B. Channawar
Volume 1: Issue 2, Revised on – 30 June 2020, pp 85-88


Author's Information
Monali P. Khobragade1 
Corresponding Author
1Department of Computer Science and Engineering, Datta Meghe Institute of Engineering, Technology and Research, Wardha, Maharashtra, India.
monalikhobragade6@gmail.com

Bharti D. Sayare2, Dipika B. Channawar3
2,3Department of Computer Science and Engineering, Datta Meghe Institute of Engineering, Technology and Research, Wardha, Maharashtra, India.


Review Article -- Peer Reviewed
First online on – 30 March 2015,      Revised on – 30 June 2020

Open Access article under Creative Commons License

Cite this article –Monali P. Khobragade, Bharti D. Sayare, Dipika B. Channawar, “Difference between AODV and DSDV Routing Protocols Using NS2 Simulation”, International Journal of Computational and Electronics Aspects in Engineering, RAME Publishers, vol. 1, issue 2, pp. 85-88, 2015, Revised in 2020.
https://doi.org/10.26706/ijceae.1.2.20150109


Abstract:-
Now day while data transmission, security is one of the major issues for data transmission over wireless networks. Existing system utilizes security algorithm for secured data transmission over networks, but in proposed system, security is achieved without any use of security algorithm. Existing work on secure data transmission includes the designs of many security algorithms and system infrastructures. Proposed System will secure data transmission to dynamically route packets between each source and destination. For data transmission, different protocols i.e. Ad-hoc On-Demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) will be utilized which will maintain the routing table of the network. This system will be utilizing 'mobility cluster head' instead of security algorithms for data transmission over wireless networks. 'Mobility Cluster Head' will contain the information of each node within a wireless network and if any unauthorized node will try to hack the information then 'Mobility Cluster Head' or Global Inspector (GI) will try to secure the configured network from the unidentified attackers. Also, we will try to implement different network that uses AODV, and DSDV for wireless network, finally we are conclude which protocol is efficient for secured data transmission without any use of security algorithm.
Index Terms:-
Secured data transmission, Dynamic routing protocol (AODV, DSDV), Mobility Cluster Head or Global Inspector (GI), Mobile Ad-hoc network.
REFERENCES
[1] Chin-Fu Kuo, Ai-Chun Pang ; Sheng-Kun Chan “Dynamic Routing with Security Considerations” IEEE transactions on parallel and distributed systems, vol. 20, no. 1, January 2009.

[2] Anil Kumar V., “Dynamic broadcast routing with security enhancement” International Journal of Advances in Engineering & Technology, May 2011.

[3] Umadevi Durvasula et al, “Efficient implemenation of dynamic routing with security considerations” International Journal of Computer Science & Communication Networks, Vol 1(3), 329-337.

[4] Nirmal Patel and Pratik Modi, “Detecting Sybil attack using AODV in MANET”, International Journal of Advance Engineering and Research Development (IJAERD), Volume 1, Issue 5, May 2014.


To view full paper, Download here


To View Full Paper

Publishing with