SECURE AWARE HYBRID AODV PROTOCOL IN WIRELESS SENSOR NETWORK: A REVIEW
DOI:
https://doi.org/10.65009/j99sa855Keywords:
Ad-Hoc Network, MANET, AODV protocol, Wireless Sensor Network,,Abstract
Versatile Ad-Hoc Network is an independent arrangement of assortment of portable
Hubs or nodes associated by remote associations. Hubs or nodes are freed to travel, every now and
again change their position and sort out themselves into a system. Hubs or nodes contain remote
transmitter and beneficiary that permit them to participate in remote system. Hubs or nodes in
MANET having double conduct, they go about as switches just as registering gadgets. Constrained
transmission capacity and changing geography results the issue of Congestion in MANETs.
Congestion and security issues are both solved in this work using bloom filter and congestion aware
protocol hybrid combination in AODV protocol. The paper shows analysis of review of better
energy, PDR, throughput and high speed of the wireless sensor network.
A remote sensor arrange (WSN) has significant applications, for example, remote ecological
observing and target following. This has been empowered by the accessibility, especially as of late,
of sensors that are littler, less expensive, and smart. These sensors are furnished with remote
interfaces with which they can speak with each other to shape a system. The plan of a WSN relies
essentially upon the application, and it must consider factors, for example, the earth, the
application's structure targets, cost, equipment, and framework limitations.
References
N. AlMansour and S. Alahmadi, "Secure Ad Hoc On-Demand Distance Vector Routing Protocol
in WSN," 2018.
S. Alkhuder, "Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor
Networks: Working with What the Node Can Offer 2018.
Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A
Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",
International Journal on Recent and Innovation Trends in Computing and Communication, (2023)
ISSN: 2321-8169 Volume: 11 Issue: 3.
P. Papadimitratos and Z. J. Haas, "Secure on-demand distance vector routing in ad hoc networks,"
Ye Tung, M. Alkhatib and Q. S. Rahman, "Security Issues in Ad-Hoc on Demand Distance Vector
Routing (AODV) in Mobile Ad-Hoc Networks," 2006.
R. S. Mangrulkar and M. Atique, "Trust based secured adhocOn demand Distance Vector Routing
protocol for mobile adhoc network," 2010 Sixth International conference on Wireless
Communication and Sensor Networks, Allahabad, 2010.
Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,
J. T. Kim, J. Kho, C. Lee, D. Lee, C. Bang and G. Lee, "A Safe AODV (Ad Hoc On-Demand
Distance Vector) Security Routing Protocol," 2008.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a
survey. Computer Networks” 2002.
A. Broder, and M. Mitzenmacher, “Network Applications of Bloom Filters: A Survey”. In Internet
Mathematics 2010.
Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial
intelligence‐based techniques. Expert Systems, 39(9), e13066.
Habeeb, M. S., & Babu, T. R. (2024). Coarse and fine feature selection for network intrusion
detection systems (IDS) in IoT networks. Transactions on Emerging Telecommunications
Technologies, 35(4), e4961.
Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for Predictive
Data Analytics, 151-169.
Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,
"Privacy-Preserving Federated Learning for IoT Devices with Secure Model Optimization",
International Journal of Communication Networks and Information Security (IJCNIS), (2021),
(2), 396–405.
Habeeb, M. S., & Babu, T. R. (2024, October). Enhancing IoT Security Through Advanced Feature
Selection and Deep Learning. In International Conference on Computing and Communication
Networks (pp. 37-49). Singapore: Springer Nature Singapore.
Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized
Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International
Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10),
–1233.
Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path
planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning
and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).
Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.
"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."
Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.
M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.
Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for
ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

