Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 14
Year of Publication: 2014
Authors:
Kuldeep Singh
Sudesh Rani
10.5120/17757-8870

Kuldeep Singh and Sudesh Rani. Article: A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET. International Journal of Computer Applications 101(14):30-34, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Kuldeep Singh and Sudesh Rani},
	title = {Article: A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {14},
	pages = {30-34},
	month = {September},
	note = {Full text available}
}

Abstract

Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack, wormhole attack etc. This paper presents the analysis of the effect of various security attacks on the performance of AODV routing protocol against various parameters such as throughput, packet delivery ratio, packet loss, and mean-hop, normalized routing overhead and end-to-end delay.

References

  • Andel, Todd R. , and Alec Yasinsac. "Surveying security analysis techniques in MANET routing protocols. " Communications Surveys & Tutorials, IEEE 9. 4 (2007): 70-84.
  • Perkins, Charles E. , and Elizabeth M. Royer. "Ad-hoc on-demand distance vector routing. " Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on. IEEE, 1999.
  • Liang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy throughput of MANETs under passive and active attacks. " Information Theory, IEEE Transactions on 57. 10 (2011): 6692-6702.
  • Konate, Karim, and G. A. Y. E. Abdourahime. "Attacks Analysis in mobile ad hoc networks: Modeling and Simulation. " Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on. IEEE, 2011.
  • Bandyopadhyay, Alokparna, Satyanarayana Vuppala, and Prasenjit Choudhury. "A simulation analysis of flooding attack in MANET using NS-3. " Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE, 2011.
  • Dembla, Deepak, and Dr Yogesh Chaba. "Modeling and Analysis of an intelligent AODV Routing Protocol based on Route Request Retransmission Strategy in MANETs. " International Journal of Computer Applications (0975-8887) Volume (2011): 6-13.
  • Ruiz, Juan-Carlos, et al. "Black Hole Attack Injection in Ad hoc Networks. " Fault tolerance systems group (GSTF). http://www. ece. cmu. edu/~ koopman/dsn08/fastabs/dsn08fastabs_ruiz. pdf (2011).