Implementation of Protected Routing to Defend Byzantine Attacks for MANET’s

Sathisha M S, Suresha D,Alok Ranjan, Prasanna Kumara


Mobile ad-hoc networks are being extensively deployed currently since they provide some features which are difficult or impossible to be emulated by conventional networks. The applications ranges from the defense sector (sensor nodes in hostile territory) to general transportation (gadgets used to communicate traffic congestion while traveling) for providing useful infrastructure during disaster recovery. Due to the significance attached to the applications of MANET, security in ad-hoc networks is an important aspect. This paper is focused on byzantine attacks in MANET’s. Byzantine attacks can be defined as attacks against routing protocols, in which two or more routers collude to drop, fabricate, modify, or misroute packets in an attempt to disrupt the routing services. In this paper a Protected Routing (PR) algorithm is designed and implemented to overcome the problem of Byzantine attacks in mobile ad-hoc network.


Key words: AODV- Ad- hoc On Demand Distance Vector, DOS-denial of service, MANET-Mobile ad-hoc network, PR-Protected Routing

Full Text:




  • There are currently no refbacks.

Copyright (c) 2016 International Journal of Advanced Research in Computer Science