SECURE AWARE HYBRID AODV PROTOCOL IN WIRELESS SENSOR NETWORK: A REVIEW

Authors

  • Dr. Syed Umar, Goli Madhuri , Dikshendra Daulat Sarpate, Gopala Soujanya , B.Rani Author

DOI:

https://doi.org/10.65009/j99sa855

Keywords:

Ad-Hoc Network, MANET, AODV protocol, Wireless Sensor Network,,

Abstract

Versatile Ad-Hoc Network is an independent arrangement of assortment of portable 
Hubs or nodes associated by remote associations. Hubs or nodes are freed to travel, every now and 
again change their position and sort out themselves into a system. Hubs or nodes contain remote 
transmitter and beneficiary that permit them to participate in remote system. Hubs or nodes in 
MANET having double conduct, they go about as switches just as registering gadgets. Constrained 
transmission capacity and changing geography results the issue of Congestion in MANETs. 
Congestion and security issues are both solved in this work using bloom filter and congestion aware 
protocol hybrid combination in AODV protocol. The paper shows analysis of review of better 
energy, PDR, throughput and high speed of the wireless sensor network. 
A remote sensor arrange (WSN) has significant applications, for example, remote ecological 
observing and target following. This has been empowered by the accessibility, especially as of late, 
of sensors that are littler, less expensive, and smart. These sensors are furnished with remote 
interfaces with which they can speak with each other to shape a system. The plan of a WSN relies 
essentially upon the application, and it must consider factors, for example, the earth, the 
application's structure targets, cost, equipment, and framework limitations.

,

References

N. AlMansour and S. Alahmadi, "Secure Ad Hoc On-Demand Distance Vector Routing Protocol

in WSN," 2018.

S. Alkhuder, "Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor

Networks: Working with What the Node Can Offer 2018.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, (2023)

ISSN: 2321-8169 Volume: 11 Issue: 3.

P. Papadimitratos and Z. J. Haas, "Secure on-demand distance vector routing in ad hoc networks,"

Ye Tung, M. Alkhatib and Q. S. Rahman, "Security Issues in Ad-Hoc on Demand Distance Vector

Routing (AODV) in Mobile Ad-Hoc Networks," 2006.

R. S. Mangrulkar and M. Atique, "Trust based secured adhocOn demand Distance Vector Routing

protocol for mobile adhoc network," 2010 Sixth International conference on Wireless

Communication and Sensor Networks, Allahabad, 2010.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,

J. T. Kim, J. Kho, C. Lee, D. Lee, C. Bang and G. Lee, "A Safe AODV (Ad Hoc On-Demand

Distance Vector) Security Routing Protocol," 2008.

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a

survey. Computer Networks” 2002.

A. Broder, and M. Mitzenmacher, “Network Applications of Bloom Filters: A Survey”. In Internet

Mathematics 2010.

Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial

intelligence‐based techniques. Expert Systems, 39(9), e13066.

Habeeb, M. S., & Babu, T. R. (2024). Coarse and fine feature selection for network intrusion

detection systems (IDS) in IoT networks. Transactions on Emerging Telecommunications

Technologies, 35(4), e4961.

Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for Predictive

Data Analytics, 151-169.

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Privacy-Preserving Federated Learning for IoT Devices with Secure Model Optimization",

International Journal of Communication Networks and Information Security (IJCNIS), (2021),

(2), 396–405.

Habeeb, M. S., & Babu, T. R. (2024, October). Enhancing IoT Security Through Advanced Feature

Selection and Deep Learning. In International Conference on Computing and Communication

Networks (pp. 37-49). Singapore: Springer Nature Singapore.

Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized

Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International

Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10),

–1233.

Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.

Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for

ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

Downloads.

Published

2025-09-24

How to Cite

SECURE AWARE HYBRID AODV PROTOCOL IN WIRELESS SENSOR NETWORK: A REVIEW. (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(3), 153-159. https://doi.org/10.65009/j99sa855