Comparative Analysis of Routing Attacks in Ad Hoc Network
Journal: International Journal of Advanced Networking and Applications (Vol.3, No. 05)Publication Date: 2012-03-02
Authors : Bipul Syam Purkayastha; Rajib Das;
Page : 1352-1357
Keywords : MANET; blackhole; flooding; DSR; ns-2;
Abstract
In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.
Other Latest Articles
- A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques
- Elliptic Curve Point Multiplication Using MBNR and Point Halving
- Optimal Routing In Ad-Hoc Network Using Genetic Algorithm
- Energy Aware Node Selection for Cluster-based Data Accuracy Estimation in Wireless Sensor Networks
- Efficient Data Reporting Protocol for Wireless Sensor Networks
Last modified: 2015-12-03 20:16:38