Impact of Multi-Path Security in Wireless Ad Hoc Networks in Indoor Environments by using AOMDV Methods
Seyed Amin Ahmadi Olounabadi1, Avula. Damodaram2, V Kamakshi Prasad3, Mahdi Hosseini4

1Seyed Amin Ahmadi Olounabadi, Ph.D. Scholar Student, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad (Telangana) India.
2Prof. Avula. Damodaram, Faculty of Computer Science & Engineering, Vice-Chancellor Sri Venkateswara University, Tirupati (Andhra Pradesh) India.
3Prof. V Kamakshi Prasad, Head of Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad (Telangana) India.
4Mahdi Hosseini, Ph.D. Scholar Student, Department of Civil Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad (Telangana) India.

Manuscript received on 10 December 2016 | Revised Manuscript received on 18 December 2016 | Manuscript Published on 30 December 2016 | PP: 24-37 | Volume-6 Issue-2, December 2016 | Retrieval Number: B4786126216/16©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Ad hoc Network is a decentralized type of wireless network and also is a local area network (LAN) that is built spontaneously as devices connect. , Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). Multipath routing is the routing technique of using multiple alternative paths through a network, which can yield a variety of benefits such as fault tolerance, increased bandwidth, or improved security. Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV) protocol is an extension to the AODV protocol for computing multiple loop-free and link disjoint paths and also increases the reliability through transmitting the messages in multiple paths with minimal redundancy, which used in present work. Simulations were conducted using the NS2 network simulator. In order to simulate most of the proposed Byzantine attacks in NS2, a protocol independent Byzantine attack simulation module was developed. This module provides the capability to simulate the black hole, Byzantine wormhole, and Byzantine overlay network wormhole attacks without modifying the routing protocol. We are considering our communication path is changeable even path or node is node failed. So data is sending through different paths, it provide high security than single path.
Keywords: Wireless Network, Ad Hoc, AOMDV, Byzantine Attacks

Scope of the Article: Wireless Network