Impact of AODV under Black Hole and Flooding Attack?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Sunanda Puri; Harish Saini;
Page : 324-330
Keywords : MANET; NS; AODV; FLOODING; BLACKHOLE;
Abstract
Mobile Ad Hoc Networks (MANETs) is a collection of wireless mobile nodes connected by wireless links forming a temporary network without the aid of any infrastructure or any centralized administration. Owing to its mobility and broadcast nature MANETs are particularly vulnerable to attacks over traditional wired networks finally makes them susceptible to various active and passive attacks. In particular, black hole attacks and flooding attacks can be easily deployed into the MANETs by the adversary. In the black hole attack, a malicious node falsely replies to the route request that comes from a source node showing it has enough routes to your destination even it does not have any route to the destination. In this way, the malicious node can drop, delay and modify the packets from the source node. On the other hand the attacker nodes in case of flooding attacks generate the false route requests after a very short interval of time thus flooding the network with false route request packets. Our objective is to thoroughly capture and analyse the impact of Black Hole attacks and flooding attacks on MANET performance using reactive (Ad hoc On-Demand Distance Vector-AODV) routing protocol with varying number of Black Hole nodes in the MANET. We have used Performance Metrics i.e. Throughput, Packet delivery Ratio and end to end delay to analyse the impact of both attacks on AODV Routing Protocol in MANET using the network simulator NS-2 simulator
Other Latest Articles
- A NOVEL ALGORITHM FOR SATILLITE IMAGE RESOLUTION ENHANCEMENT BASED ON DUAL-TREE COMPLEX WAVELET TRANSFORM (DT-CWT) AND NONLOCAL MEANS (NLM)?
- A Panorama of Web Accessibility?
- A Security Integrated Data Storage Model for Cloud Environment?
- A Combined Weighted Approach to Detect Code Cloning?
- Subperiosteal Hematoma of orbit an interesting case report and review of literature
Last modified: 2014-08-22 02:11:19