Mobile Ad-hoc Networking with AODV: A Review

##plugins.themes.academic_pro.article.main##

Rutvij H. Jhaveri
Narendra M Patel

Abstract

Mobile Ad-hoc Networks (MANETs) are becoming a promising and popular way to carry out ubiquitous computing in numerous vital applications. Unique characteristics of these spontaneous networks induce several challenges in the resource constraint environment. In this paper, firstly, we discuss these challenges and research work carried out for various applications of MANETs. Operations of routing protocol become vital in this unstable multi-hop environment. In this paper, we present classification of MANET routing protocols and study a popular reactive routing protocol, Ad-hoc On-demand Distance Vector (AODV). We also study basic operations of AODV and, present its variants and real world implementations. Furthermore, we study the design issues of AODV protocol and review the recent research works carried out to enhance AODV protocol addressing these issues. In spite of the research work of over a decade on the AODV design, there still exist open challenges that pave the way for further research on this prominent on-demand protocol.

##plugins.themes.academic_pro.article.details##

How to Cite
Rutvij H. Jhaveri, & Narendra M Patel. (2015). Mobile Ad-hoc Networking with AODV: A Review. International Journal of Next-Generation Computing, 6(3), 165–191. https://doi.org/10.47164/ijngc.v6i3.100

References

  1. Aalam, S.S., and Victorie, T.A.A. 2012. Path Optimization using Gamma Distribution in MANETs. Journal of Applied Sciences 12, 7 (2012), 627-635.
  2. Al-karaki, J.N., and Kamal, A.E. 2004. Routing techniques in wireless sensor networks: a survey. Wireless Communications, IEEE 11, 6 (Dec. 2004), 6-28.
  3. Almobaideen, W. 2009. SPDA: stability based partially disjoint AOMDV. European Journal of Scienti c Research 27, 3 (2009), 342-348.
  4. Alrayes, M., Biswash, S., Tyagi, N., Tripathi, R., Misra, A., and Jain, S. 2013. : An Enhancement of AODV with Multi-Radio in Hybrid Wireless Mesh Network. ISRN Electronics(2013). Hindawi Publishing Corporation, (2013), 1-13.
  5. ANDERSSON, E., AND LJUNGDAHL, E. Porting AODV-UU into NS-Miracle. http : ==www:cs:kau:se=cs=prtp=pmwiki=uploads=MeshWikipage=aodvuu2nsmiracle:pdf Accessed on Oct. 16, 2015.
  6. AODV-UU, A. O. D. V. Linux Implementation, University of Uppsala.
  7. Bar, R.K., Mandal, J.K., and Singh, M.M. 2013. QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack. Procedia Technology 10 , (2013), 530-537.
  8. Barma, M., Chowdhuri, R., Debbarma, N., Sen, S., and Roy, S. 2013. : Enhancing the Performance of AODV Using Node Remaining Energy and Aggregate Interface Queue Length. In Proceedings of the IEEE International Symposium on Computational and Business Intelligence (ISCBI), (2013). 77-80.
  9. Basagni, S., Conti,M., Silvia Giordano, S., and Stojmenovic, I. 2004. Mobile ad hoc networking. John Wiley & Sons (2004).
  10. Bernardo, L., Oliveira, R., Gaspar,S., Paulino,D., and Pinto, P. 2008. A Telephony Application for Manets: Voice over a MANET-Extended JXTA Virtual Overlay Network. E-Business and Telecommunication Networks. Springer Berlin Heidelberg, (2008), 347-358.
  11. Biradar, S.R., Majumder, K., Sarkar, S.K., and Puttamadappa, C. 2010. Performance evaluation and comparison of AODV and AOMDV. (IJCSE) Int. J. Comput. Sci. Eng 2, 2 (2010), 373-377.
  12. Borgia, E. 2005. : Experimental evaluation of ad hoc routing protocols. In Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops, (2005). PERCOM. 2005 Workshops, 232-236.
  13. BROLIN, J., AND HEDEGREN, M. 2008. Packet Aggregation in Linux. PhD diss., Karlstads universitet, Karlstad. 2008.
  14. Budke, D., Farkas, K., Plattner, B., Wellnitz, O., and Wolf, L. 2006. : Real-time multiplayer game support using QoS mechanisms in mobile ad hoc networks. In Proceedings of the 3rd Annual Conference on Wireless On-demand Network Systems and Services: WONS, (2006). 32-40.
  15. Chakeres, I., and Belding-royer, E. 2004. : AODV routing protocol implementation design. In Proceedings of the 24th IEEE International Conference on Distributed Computing Systems Workshops, (2004). 698-703.
  16. Chibelushi, C., Eardley, A., and Arabo, A. 2013. Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications. Computer Science and Information Technology 1, 2 (2013), 73-81.
  17. Choi, Y. and Lim, Y. 2013. : Geographical AODV protocol for multi-hop maritime communications. In Proceedings of the OCEANS-Bergen, MTS/IEEE, (2013). 1-3.
  18. Conti, M., and Giordano, S. 2014. : Mobile ad hoc networking: milestones, challenges, and new research directions. In Proceedings of the Communications Magazine, IEEE 52, 1 (2014). 85-96.
  19. Cuong, C., Tu, V., and Hai, N. 2013. : MAR-AODV: Innovative Routing Algorithm in MANET Based on Mobile Agent. In Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), (2013). 62-66.
  20. Dandotiya, H., Jain, R., and Bhatia, R. 2013. : Route Selection in MANETs by Intelligent AODV. In Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT), (2013). 332-335.
  21. Devi, S.S., and Sikamani, K.T. 2013. : Improved route error tolerant mechanism for AODV routing protocol in MANET. In Proceedings of the IEEE International Conference on Current Trends in Engineering and Technology (ICCTET), (2013). 187-190.
  22. Dhurandher, S., Woungang, I., Mathur, R., and Khurana, P. 2013. : GAODV: A Modi ed AODV against single and collaborative Black Hole attacks in MANETs. In Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), (2013). 357-362.
  23. Ding, Y., Qu, H. andWang X. 2014. NS2-Based Black Hole Attack Modeling and Simulation of Ad Hoc Network. In Advanced Materials Research 846 (2014), 1697-1700.
  24. Dokurer, S., 2006. Simulation of Black hole attack in wireless Ad-hoc networks. Master0s Thesis, Atlm University. 2006.
  25. Ratliff, S., Dowdell, J., and Perkins, C. 2013. Dynamic MANET On-demand (AODVv2) Routing. Internet Draft. (2013), 1-60.
  26. Effatparvar, M., Effatparvar, M., Darehshoorzadeh, A., Zarei, M., and Yazdani, N. 2010. : Load balancing and route stability in mobile ad hoc networks base on AODV protocol. In Proceedings of the IEEE Intl Conf on Electronic Devices, Systems and Applications (ICEDSA), (2010). 258-263.
  27. Elmoniem, A.M., Ibrahim, H.M., Mohamed, M.H., and Hedar, A.R. 2011. Ant Colony and Load Balancing Optimizations for AODV Routing Protocol. Research article international journal of sensor networks and data communication 1, (2011), 1-14.
  28. Fehnker, A., Van Glabbeek, R., Hfner, P., Mciver, A., Portmann, M., and Tan, W. 2012. Automated analysis of AODV using UPPAAL. In Tools and Algorithms for the Construction and Analysis of Systems, Springer Berlin Heidelberg, (2012), 173-187.
  29. Feng, Z., Wang, L., and Gao, X. 2013. : An improved routing protocol Ad-AODV Based on AODV. In Proceedings of the International Conference on Information Science and Computer Applications (ISCA 2013), Atlantis Press, (2013).
  30. Van Glabbeek, R., Hfner, P., Tan,W., and Portmann, M. 2013. : Sequence numbers do not guarantee loop freedom: AODV can yield routing loops. In Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems (MSWiM '13), ACM, (2013). New York, NY, USA, 91100.
  31. Goyal, P., Parmar, V., and Rishi, R. 2011. Manet: vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management 11 , 32-37.
  32. Gupta, A.K., Sadawarti, H., and Verma, A.K. 2013. Implementation of DYMO routing protocol. International Journal of Information Technology, Modeling and Computing (IJITMC) 1, 2 (2013), 49-57.
  33. Gupta, M.P., and Tuteja, R.K. 2010. Design Strategies for AODV Implementation in Linux. (IJACSA) International Journal of Advanced Computer Science and Applications 1, 6 (2010), 102-107.
  34. Gwalani, S., Belding-royer, E., and Perkins, C. 2003. : AODV-PA: AODV with path accumulation. In Proceedings of the IEEE International Conference on Communications, ICC'03., 1 (2003). 527-531.
  35. Helen, D., and Arivazhagan, D. 2014. Applications, Advantages and Challenges of Ad Hoc Networks. Journal of Academia and Industrial Research (JAIR) 2, 8 (2014), 453-457.
  36. Hoebeke, J., Moerman, I., Dhoedt, B., and Demeester, P. 2004. An overview of mobile ad hoc networks: Applications and challenges. Journal-Communications Network 3, 3 (2004), 60-66.
  37. Hormati, M., 2013. Application Layer Architectures for Disaster Response Systems. PhD diss., Concordia University. 2013.
  38. Hui, L., Xiaoyun, T., Haifeng, Z., and Wei, W. 2013. : Improved AODV for engineering applications in Wireless Ad Hoc Network. In Proceedings of the International Conference on Information, Business and Education Technology (ICIBIT 2013) (2013). 1322-1325.
  39. Hurni, P., and Braun, T. 2008. Energy-ecient multi-path routing in wireless sensor networks. In Ad-hoc, Mobile and Wireless Networks, Springer Berlin Heidelberg, (2008), 72-85.
  40. Islam, N., and Shaikh, Z. 2013. Security Issues in Mobile Ad Hoc Network. In Wireless Networks and Security, Springer Berlin Heidelberg, (2013), 49-80.
  41. Jang, H., Lien, Y., and Tsai, T. 2009. : Rescue information system for earthquake disasters based on MANET emergency communication platform. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, ACM, (2009). 623-627.
  42. Jhaveri, R.H. 2013. Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In Dynamic Ad Hoc Networks, IET Editorial Book, H.F. Rashvand and H.-C. Chao, Eds. Stevenage, (2013), pp. 261-280.
  43. Jhaveri, R.H., and Patel, N.M. 2015. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks (Feb. 2015), 1-18.
  44. Jhaveri, R.H., Patel, A.D., Parmar, J.D., and Shah, B.I. 2010. MANET routing protocols and wormhole attack against AODV. International Journal of Computer Science and Network Security 10, 4 (2010), 12-18.
  45. Jhaveri, R., Patel, S., and Jinwala, D. 2012. : Dos attacks in mobile ad hoc networks: A survey. In Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT) (2012). 535-541.
  46. Jhaveri, R.H., Patel, S.J.,, and Jinwala, D.C 2012. Improving route discovery for aodv to prevent blackhole and grayhole attacks in manets. INFOCOMP Journal of Computer Science 11, 1 (2012), 1-12.
  47. Joshi, P. 2011. Security issues in routing protocols in MANETs at network layer. Procedia Computer Science 3, (2011), 954-960.
  48. Kawadia, V., Zhang, Y., and Gupta, B. 2003. : System Services for Implementing Ad-Hoc Routing: Architecture, Implementation and Experiences. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys), ACM, (June,2003). San Francisco, CA, 99-112.
  49. Kingsbury, R., 2009. Mobile Ad hoc networks for oceanic aircraft communications. PhD diss., Massachusetts Institute of Technology. 2009.
  50. Kumar, D., and Srivastava, A. 2013. A Study Of Disaster Management System With View Of MANET Application. IEEE Trans. on Journal of Advances in Physics. 3, 3 (2013), 249-256.
  51. Kumar, V., 2009. Simulation and Comparison of AODV and DSR routing protocols in MANETs. PhD diss., Thapar University Patiala. 2009.
  52. Lee, M., 2003. Implementing AODV Ad Hoc Routing Protocol for IPv6. PhD diss, Simon Fraser University. 2003.
  53. Li, G., and Chen, J. 2011. The research of routing algorithms based on NS2 in mobile ad hoc networks. In Proceedings of the 2nd IEEE International Conference on Software Engineering and Service Science (ICSESS) (2011). 826-829.
  54. Liu, S., Yang, Y., and Wang, W. 2013. Research of AODV Routing Protocol for Ad Hoc Networks1. In Proceedings of the AASRI Conference on Parallel and Distributed Computing and Systems 5, (2013). 21-31.
  55. Lundgren, H. 2002. Implementation and real-world evaluation of routing protocols for wireless ad hoc networks. IT Licentiate theses. Uppsala University. 2002. 1-74.
  56. Mamatha, G.S., and Sharma, D.S.C. 2010. Analyzing the MANET Variations, Challenges, Capacity and Protocol Issues. International Journal of Computer Science & Engineering Survey (IJICSES). 1, 1 (2010), 14-21.
  57. Manoranjini, J., Chandrasekar, A., and Rajinigirinath, D. 2013. Hybrid Detector for Detection of Black Holes in Manets. IERI Procedia. 4, (2013), 376-382.
  58. Marina, M.K., and Das, S.R. 2002. Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications 6, 3 (2002), 92-93.
  59. Marina, M.K., and Das, S.R. 2006. Ad hoc on-demand multipath distance vector routing. Wireless Communications and Mobile Computing 6, 7 (2006) 969-988.
  60. Martins, J., Correia, S., and Celestino, J. 2010. Ant-DYMO: A bio-inspired algorithm for MANETS. In Proceedings of the 17th IEEE international Conference on Telecommunications (ICT) (2010). 748-754.
  61. Mhala, N.N., and Choudhari, N.K. 2010. An Implementation Possibilities For AODV Routing Protocol In Real World. International Journal of Distributed and Parallel Systems. 1, 2 (2010), 118-127.
  62. Mishra, A., Jaiswal, R., and Sharma, S. 2013. A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network. In Proceedings of the 3rd IEEE International Conference on Advance Computing Conference (IACC) (2013). 499-504.
  63. Mohammad, S., Alsanbani, M., and Alahdal, T. 2014. Comparison Study of Routing Protocols in MANET. International Journal of Ad Hoc, Vehicular and Sensor Networks. 1, 1 (2014), 1-9.
  64. Mohammed, Q., and Khan, M. 2012. Distributed Database Systems MANETS. In Proceedings of the International Conference on Computing and Information Technology (ICCIT).
  65. Mohapatra, S., Swin, B., Mahapatra, S., and Behera, S. 2015. : Stability and energy aware reverse AODV routing protocol in MANETS. In Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems (ReTIS) (2015). 526-531.
  66. Mtibaa, A., and Kamoun, F. 2006. MMDV: Multipath and MPR based AODV routing protocol. In Proceedings of the IFIP 5th Annual Mediterranean Ad Hoc Networking Workshop (2006). 137-144.
  67. Mueller, S., Tsang, R., and Ghosal, D. 2004. Multipath routing in mobile ad hoc networks: Issues and challenges. In Performance Tools and Applications to Networked Systems, Springer Berlin Heidelberg, (2004), 209-234.
  68. Nadeem, A., and Howarth, M. 2013. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems 52, 4 (2013), 2047-2058.
  69. Nadeem, A., and Howarth, M. 2014. An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks 13, (2014), 368-380.
  70. Nand, P., and Sharma, S. 2011. Probability based improved broadcasting for AODV routing protocol. In Proceedings of the IEEE International Conference on Computational Intelligence and Communication Networks (CICN) (2011). 621-625.
  71. Ning, P., and Sun, K. 2005. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3, 6 (2005), 795-819.
  72. Perkins, C., Belding-royer, E., and Das, S. 2003. RFC 3561-ad hoc on-demand distance vector (AODV) routing. Internet RFCs. (2003), 1-38.
  73. Pham, P., and Perreau, S. 2003. : Performance analysis of reactive shortest path and multipath routing mechanism with load balance. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, INFOCOM 2003 1, (2003).251-259.
  74. Prathapani, A., Santhanam, L., and Agrawal, D. 2013. Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing 64, 3 (2013), 777-804.
  75. Quispe, L.E., and Galan, L.M. 2014. Behavior of Ad Hoc routing protocols, analyzed for emergency and rescue scenarios, on a real urban area. Expert Systems with Applications 41, 5 (2014), 2565-2573.
  76. Rajabhushanam, C., and Kathirvel, A. 2011. Survey of wireless MANET application in battle eld operations. International Journal of Advanced Computer Science and Applications (IJACSA) 2, 1 (2011).
  77. Raut, S.H., and Ambulgekar, H.P. 2013. Proactive and Reactive Routing Protocols in Multihop Mobile Ad hoc Network. International Journal of Advanced Research in Computer Science and Software Engineering 3, 4 (2013), 152-157.
  78. Sarkar, S., and Datta, R. 2014. A secure and energy-ecient stochastic routing protocol for wireless mobile ad-hoc networks. In Proceedings of the20th IEEE National Conference on Communications (NCC) (2014). 1-6.
  79. Shastri, A., and Shrivastava, G. 2013. : Implementation and Performance Comparison of Improved Route Maintenance Strategy in AODV for Quick Route Healing. In Proceedings of the International Conference on Communication Systems and Network Technologies (CSTN). IEEE Computer Society (2013). 299-302.
  80. Shetty, D.. RO-AODV: Route Optimized Ad-hoc On-demand Distance Vector Routing Protocol.
  81. Shi, F., Liu, W., Jin, D., and Song, J. 2014. A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems 57, 2 (2014), 119-136.
  82. Simaremare, H., Abouaissa, A., Sari, R. F., and Lorenz, P. 2014. Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems (2014).
  83. SINGH, S., DAVIES, B., AND LIN, T. 2012. MANET application for Windows Phone. http : ==pubs:cs:uct:ac:za=honsproj=cgi