Views 
   PDF Download PDF Downloads: 1311

 Open Access -   Download full article: 

Comparative Study of AODV and ODMRP Routing Protocols

Jitendra Soni* and Kokila Uikey

1Department of Computer Engineering, Institute of Engineering and Technology, DAVV, Indore (M.P), India.

2Department of Information Technology, Institute of Engineering and Technology, DAVV, Indore (M.P), India.

Corresponding author Email: jitendrasoni2017@gmail.com

DOI : http://dx.doi.org/10.13005/ojcst/10.03.06

Article Publishing History
Article Received on : 13-Jun-17
Article Accepted on : 28-Jun-17
Article Published : 01 Jul 2017
Article Metrics
ABSTRACT:

Mobile ad-hoc Network [MANET] is the collection of mobile nodes deployed with the short-lived purpose. It is the most innovative and useful variety which provide the facility to establish communication without the prerequisite of any infrastructure. Here, wireless communication medium is usually used for communication and connection establishment purpose. Generally, it is deployed with mobile nodes but can be used for stationary design also. Open nature communication makes it vulnerable for several security threats. This paper has considered the simulation of AODV and ODMRP using Qualnet 5.2 simulator.

KEYWORDS: AODV; ODMRP; Qualnet 5.2

Copy the following to cite this article:

Soni J, Uikey K. Comparative Study of AODV and ODMRP Routing Protocols. Orient.J. Comp. Sci. and Technol;10(3)


Copy the following to cite this URL:

Soni J, Uikey K. Comparative Study of AODV and ODMRP Routing Protocols. Orient. J. Comp. Sci. and Technol;10(3). Available from: http://www.computerscijournal.org/?p=6185


Introduction

Mobile nodes are also combination of few components such as processing unit, storage memory along with transmission and receiving capability. MANET provides special phenomena to provide different level of network services with optimum efforts. Although, MANET doesn’t rely on any infrastructure, but route discovery is also important practice for communication. Routing in MANET plays very important and crucial role in communication. It helps to dynamically discover the route instead of using priorly discovered path. The routing techniques can be defined as the approach to discover the route among mobile nodes. Basically they are classified according to their capabilities and nature of operation. It is popularly known as proactive and reactive routing protocols. Proactive routing protocols are traditional approaches known as distance-vector and link-state algorithms.

Subsequently, reactive routing protocols are latest approaches names as AODV, DSR, ODMRP, DYMO etc. Traditional routing protocols perform route discovery at time of establishment of network. It is very time effective routing protocols but suffer with the issue of extra resource consideration. It performs route discovery process for every route which may not used any time during the communication. These limitations explore the need of optimum energy consumption based routing protocols. Here, AODV, DSR are the kind of protocols who discover the routes only when they get the demand of communication. So, request based route discovery reduce the wastage resource consumption along with optimum resource consumption.  The best part of these reactive routing protocols is they are very adaptive and can manage themselves with the variation in network topology.1

Study of routing protocols observes that open network and wireless nature make it vulnerable for several security threats. Subsequently single path may become overwhelming when the environment does not support the communication.

On demand multi-path routing protocols help to establish communication in more effective ways. It finds multiple paths for each and every communication link instead of single route establishment. Thus this new route discovery and repairing mechanism only needed the configuration for multi-casting instead on single route discovery. This is route is a mesh based network uses group forwarding concept. It maintains the membership group to perform the multi-casting features.2

All such protocols concludes that all are good for communication purpose and very much suitable for MANET but suffers with the issue of susceptibility and security threats. According to study, many security threats can be observe due to this vulnerable nature of routing protocols. Here, this paper has perform the study of AODV and ODMRP routing protocol and proposed different solution to diagnose and mitigate the security threats.

Security Issues

Security is one of the leading and important concerns of any network. It becomes more crucial in the scenario of wireless communication. Open nature and vulnerable situation make it prone and susceptible for several security threats. Enemy and attackers attempt to exploit the loopholes of mobile nodes to apply. Another way, vulnerabilities into existing routing protocols and ad-hoc system make it more susceptible and opportunistic for security threats.5 A lot of loopholes have been observed in AODV and ODMRP routing protocol some of listed below;

Source node can be modified by the attacker after modified the RREQ packet during communication.

Due to broadcasting nature, analyzing can be done easily which may lead for packet tracing and capturing.

Malicious nodes may attempt to route diversion approach to affect the performance by alteration into hop count values. It may lead for packet loss and degrading the communication performance.

Unwanted flooding and overwhelming packet sending may be big reason for resource draining approach.

In few approach, attacker may attempt to perform traffic analysis and alter the node information to compromise the network privacy.

Selective forwarding or dropping is also another thread into wireless network.

Now days, passive attacks are becoming more severe than active attack where attacker node directly attempt to exploit the capabilities of mobile node by performing undesirable activity.

Jellyfish is one of the hybrid kind of attack where attacker node alter the network situation. A detailed study of jellyfish attack is explained into next paper.3

Problem Domain

The study of AODV and ODMRP routing protocols observe that both have important significance into MANET. Study of both routing protocols observes that open nature and zero security models make them vulnerable for various security threats. It has been observe that enemy exploit such issues and attempt to compromise the privacy and confidentiality of network communication.

Subsequently, secure routing protocols are designed to avoid such situations but do not cover all situations and manage such things. Their concern is to maintain authentication, integrity and confidentiality along with non-repudiation but do not cover all kinds of security. ODMRP and AODV vulnerabilities may easily manipulate malicious node to destroy the network routing communication.

Solution Domain

The complete experimental scenarios are classified in below category. A brief description of both is cited below:

Initially, a comparative study for the performance of AODV and ODMRP with AODV has been made. This experimental analysis has been done for 10,20,30,40 and 50 nodes for static and mobile conditions. It has been observed on basis of throughput, PDR, End to End delay and Jitter. A comparative study of the complete work is shown in below graphs.

Experimental Analysis

Throughput of AODV and ODMRP protocols for static node and mobile node are given:

Fig. 1: Throughput Analysis of Static Node

Figure 1: Throughput Analysis of Static Node



Click here to View figure

 

Fig. 2: Throughput Analysis of Mobile Node

Figure 2: Throughput Analysis of Mobile Node 



Click here to View figure

 

PDR of AODV and ODMRP routing protocols for static node and mobile node are given: 

Fig. 3: PDR Analysis of Static Node

Figure 3: PDR Analysis of Static Node 



Click here to View figure

 

Figure 4: PDR Analysis of Mobile Node

Figure 4: PDR Analysis of Mobile Node 



Click here to View figure

 

End to end delay of AODV and ODMRP routing protocols for  mobile node are given:

Figure 5: End to End Analysis of Mobile Node

Figure 5: End to End Analysis of Mobile Node 



Click here to View figure

 

Fig. 5: End to End Analysis of Mobile Node

Figure 6: End to End Analysis of Mobile Node 



Click here to View figure

 

Conclusion

The complete work concludes that better performance has been observed in static node rather than mobile node scenario. The complete experimental analysis generates some observations which are listed below;

In static or mobile AODV based network, enhancement into nodes does not give impact on throughput. Only slight variation is observed.

In static AODV based network, enhancement into nodes raise the PDR but zero variation has been observed into mobile nodes.

In terms of End to End Delay nominal variation has been observed for static node but vast differences has been recorded for mobile nodes.

In static or mobile ODMRP based network, enhancement into nodes does not give impact on throughput. Only slight variation is observed

In static ODMRP based network, enhancement into nodes raise the PDR but zero variation has been observed into mobile nodes.

In terms of End to End Delay nominal variation has been observed for static node but vast differences has been recorded for mobile nodes

References

  1. Md. Saiful Azad, Farhat Anwar, Md. Arafatur Rahman, Aisha H. Abdalla, Akhmad Unggul Priantoro and Omer Mahmoud. Performance,“Comparison of Proactive and Reactive Multicast Routing Protocols over Wireless Mesh Networks.” IJCSNS International Journal of Computer Science and Network Security.2009;9(6).
  2. Sung-JuLee, Mario Gerla, and Ching-Chuan Chiang. “On-Demand Multicast Routing Protocol.” IEEE. 2015.
  3. Manjot Kaur, Malti Rani. “A Novel Defense Mechanism via Genetic Algorithm for Counterfeiting and Combating Jelly Fish Attack in Mobile Ad- Hoc Networks.”IEEE. 2014.
  4. Siddlingappagouda Biradar, Pralahad Kulkarni, “Enhancing the quality of service using M-AODV Protocol in MANETs. IEEE. 2015.
  5. Gauri Kalnoor, Jayshree Agarkhed, “QOS based multipath routing for intrusion detection of sinkhole attack in wireless network.” International conference on circuit, Power and computing technologies. ICCPCT. 2016.
  6. I. Aad and J.P. Hubaux , E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks.”  IEEE/ACM Transactions on Networking.2008;16:791-802.
    CrossRef
  7. C.Jinshong Hwang, Ashwani Kush, Ruchika, “Performance Evaluation of Manet Using Quality of Service Metrics.” Fifth international conference on Innovative Computing Technology. (INTECH 2015) 978-1-4673-7551-1/15/$31.00© 2015 IEEE.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.