Filters








2,180 Hits in 3.9 sec

Performance Analysis of AODV using HTTP trafficunder Black Hole Attackin MANET

Ekta Barkhodia
2012 Computer Science & Engineering An International Journal  
The performance analysis of AODV reactive protocol is evaluated with respect to throughput and end-toend delay using OPNET modeller.  ...  The effect of black hole attack on ad hoc network using AODV as a routing protocol with Http traffic load will be examined in this research.  ...  Acknowledgement The authors would like to thank OPNET for modelling tool support through their OPNET University Program.  ... 
doi:10.5121/cseij.2012.2308 fatcat:2cr2xjikyzgsvfwxuqmsep3ctq

A Proposed AODV Black hole Detection Model using the Fuzzy Inference Method in MANET Topology

2021 International Journal of Emerging Trends in Engineering Research  
Studies have shown various detection and mitigation techniques in line with the black hole attack of MANET technology.  ...  Mobile Adhoc Network (MANET)as a network of mobile routers that self-configures has raised some security concerns which one of them has been the Black Hole Attack (BHA).  ...  The proposed model modified an already existing model and integrated the FIM into the AODV protocol of the MANET, in order to better its dictation metrics against the Black hole MANET attack.  ... 
doi:10.30534/ijeter/2021/13962021 fatcat:yzxpushkuzevtau43gotasje4m

AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack

Sanjay Singh, Deepak Choudhary
2017 International Journal of Computer Applications  
The impact of Black hole attack on the performance of Manet is evaluated on the basis of throughput and end to end delay and it was observed that AODV is more susceptible to attack than OLSR.  ...  There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). One of these attacks is Black Hole Attack, which grasps all data packets of network.  ...  , Black hole attack is mainly analyzed on Adhoc On Demand Distance Vector(AODV) and shown how it disrupts the performance of MANET.  ... 
doi:10.5120/ijca2017915208 fatcat:pvsxr2jtnbb4fgr7jaf4ooa33i

Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application

Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh
2014 International Journal of Computer Applications  
AODV, DSR, GRP, OLSR etc. In this Paper the simulation analysis of the performance of AODV, DSR and TORA is compared for VOIP application under black hole attack.  ...  The performance is compared in terms of data dropped, network load, traffic sent and traffic received. The result shows that the overall performance of TORA is better than DSR and AODV.  ...  In this paper we have evaluated the performance of three routing protocols (AODV, DSR and TORA) in MANET based on different scenarios of black hole attack for E-mail application.  ... 
doi:10.5120/18124-9170 fatcat:7lgqdghtinaedfehkno27q6ire

Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack

Amin Mohebi, Ehsan Kamal, Simon Scott
2013 International Journal of Modern Education and Computer Science  
One common method to perform most of researches in the MANET security field is to simulate and analyze the routing protocols in various scenarios.  ...  This work has been based on the implementation and experiments in the OPNET modeler version 14.5.  ...  The research approach adopted in this paper includes a wide review of relevant literature on black hole attacks in MANET, coupled with the collection and analysis of data obtained of OPNET simulator, and  ... 
doi:10.5815/ijmecs.2013.10.03 fatcat:5wggev6omjhcbbw76m5jmzevay

Security Improved Chicken Swarm Optimization Based A* Routing Algorithm on MANETs

2020 International journal of recent technology and engineering  
The comparative examination of Optimized A*, Ad-hoc On-Demand Distance Vector (AODV) with the proposed model against attacks, enhances the performance.  ...  Once those attacks are prevented, the routing efficiency in MANETs for Chicken Swam Optimization based A* algorithm is improved, which is a computer algorithm that is broadly deployed in path finding and  ...  The proposed model also focuses on detecting and preventing the major attacks like blackhole and wormhole attacks. The flow diagram of the proposed MANET routing is shown in Fig. 2 Fig.2.  ... 
doi:10.35940/ijrte.e6379.018520 fatcat:77eyzou4pjbfnclmx3dkyrgr5a

Investigation of Application Attack on MANET

Amit MHolkar, Neha Shinde Holkar, Dhiiraj Nitnawwre
2013 International Journal of Computer Applications  
Most of the works in MANET have been focused on the Network Layer attacks because the attacks can be identified and its effects can be minimized on the Network layer itself.  ...  This paper investigate the effect of Application layer attack on Mobile Ad-hoc Network using OPNET simulator and compare the outcomes of investigation of with and without attacks using different routing  ...  SIMULATION RESULT & ANALYSIS We got four comparative results, two for each routing protocol (AODV & DSR), between scenarios with one attack and one without attack.  ... 
doi:10.5120/12430-9190 fatcat:qawbuoueffcx5egwhslzrm5l2e

Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC

Stephan Eichler, Christian Roman
2006 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems  
In this paper we present a new secure routing protocol for mobile ad hoc networks (MANETs) based on AODV called AODV-SEC.  ...  In addition we present the need for a new certificate type for secure routing in MANETs called mCert. In our opinion the results point out the current difficulties of secure routing protocol design.  ...  Abstract-In this paper we present a new secure routing protocol for mobile ad hoc networks (MANETs) based on AODV called AODV-SEC.  ... 
doi:10.1109/mobhoc.2006.278589 dblp:conf/mass/EichlerR06 fatcat:t7et7uivvvd63dsfzt5lbe74we

MANETs performance analysis with dos attack at different routing protocols

Alaa Zain, Heba El-khobby, Hatem M. Abd Elkader, Mostafa Abdelnaby
2015 International Journal of Engineering & Technology  
The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols.  ...  The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e.  ...  Different kinds of attacks types were studied, and their effects on the performance analysis of MANET [2] .  ... 
doi:10.14419/ijet.v4i2.4609 fatcat:exdn7qckjfg6jcjglvn6hrc7xa

Effect of Black Hole Attack on the Performance of AODV RoutingProtocol under Different Traffic Conditions in Mobile AdHoc Networks

Barinderpal Singh, Kulbir Kaur
2018 International Journal of Advanced Science and Technology  
Performance of Routing protocols in MANETs degrades because of attack occur in the network.  ...  In this paper, the Black hole attack and Rushing is introduced and the performance of AODV routing protocol is carried out with and without Black hole attack and Rushing attack under different traffic  ...  The effect of Black hole attack and Rushing attack is different under different traffic condition with different packet size is different on the performance of AODV routing protocol in MANETs.  ... 
doi:10.14257/ijast.2018.115.02 fatcat:qgmigxaoengnbjhcmnpq2x6k4q

Adaptive Energy-Efficient On-Demand Distance Vector Routing Protocol for MANET

Badal Master, Prasanna Shete
2014 International Journal of Computer Applications  
In this paper we proposed an Advanced secured model for On-demand Distance vector routing protocol, which is highly secured against Denial of Service (DoS) attack and Blackhole (BH) attack.  ...  This method can provide highly secured routing with better performance than the typical AODV in terms of packet delivery ratio, normalized routing load and the average throughput.  ...  A unified analysis of routing increasing malicious nodes AODV will entirely increase or protocols in MANETs, Communications, IEEE decrease, but in the proposed model it is maintained small Transactions  ... 
doi:10.5120/17540-8122 fatcat:5eefi7r3g5culli6hknpfogyii

Preventing clone attacks using dynamic cryptography in MANETs

Saravanan R, Ilavarasan E
2018 Biomedical Research  
The main objective of this method is to prevent clone attacks in MANETs while routing.  ...  A polynomial key based authentication layer in AODV is used to demonstrate the clone attack prevention in the MANET.  ...  Analysis under hierarchical topology The working of PK-AODV and AODV is assessed first in the flat topology in a 30-node scenario.  ... 
doi:10.4066/biomedicalresearch.29-17-1404 fatcat:fbv4nyonnbhjrbfhicoq7tzpdy

The resistance of routing protocols against DDOS attack in MANET

Maha Abdelhaq, Raed Alsaqour, Mada Alaskar, Fayza Alotaibi, Rawan Almutlaq, Bushra Alghamdi, Bayan Alhammad, Malak Sehaibani, Donia Moyna
2020 International Journal of Electrical and Computer Engineering (IJECE)  
The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol  ...  types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol.  ...  ACKNOWLEDGEMENTS This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.  ... 
doi:10.11591/ijece.v10i5.pp4844-4852 fatcat:ipeoti4e5nbgpbcoa6iwwk3paq

Analysis of Possible Attack on AODV Protocol in MANET
English

Nitesh Funde, P. R. Pardhi
2014 International Journal of Engineering Trends and Technoloy  
One of these possible attacks is a Black Hole Attack in which a mobile node falsely replies to the source node that it is having a shortest path to the destination without checking its routing table.  ...  We also analysed the performance of the network in terms of number of packets sent, received, throughput, energy of network before attack and after detection & prevention of Attack.  ...  The analysis shows that how severe the attack is and its effects on MANET. II.  ... 
doi:10.14445/22315381/ijett-v11p258 fatcat:fbvds5pyljd7phteqdx23lv3be

A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET

Kuldeep Singh, Sudesh Rani
2014 International Journal of Computer Applications  
This paper presents the analysis of the effect of various security attacks on the performance of AODV routing protocol against various parameters such as throughput, packet delivery ratio, packet loss,  ...  Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack, wormhole attack etc.  ...  CONCLUSION AND FUTURE WORK This paper presents the analysis and effect of blackhole, grayhole and flooding attack on the performance of AODV routing protocol in MANET.  ... 
doi:10.5120/17757-8870 fatcat:6fpovz4i6jf25fklimk3wvgpeq
« Previous Showing results 1 — 15 out of 2,180 results