Protector Control PC-AODV-BH in the Ad Hoc Networks

Boujaada S, Qaraai Y, Agoujil S, Hajar M
2016 International Journal of Information Technology, Modeling and Computing  
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by coupling hash functions, digital signatures and fidelity concept. An
more » ... on under NS2 simulator will be given to compare our proposed approach with SAODV protocol, basing on three performance metrics and taking into account the number of black hole malicious nodes.
doi:10.5121/ijitmc.2016.4201 fatcat:cux5gg6fxzbo3bncqdju6n4e4u