A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Performance Analysis of AODV using HTTP trafficunder Black Hole Attackin MANET
2012
Computer Science & Engineering An International Journal
The performance analysis of AODV reactive protocol is evaluated with respect to throughput and end-toend delay using OPNET modeller. ...
The effect of black hole attack on ad hoc network using AODV as a routing protocol with Http traffic load will be examined in this research. ...
Acknowledgement The authors would like to thank OPNET for modelling tool support through their OPNET University Program. ...
doi:10.5121/cseij.2012.2308
fatcat:2cr2xjikyzgsvfwxuqmsep3ctq
A Proposed AODV Black hole Detection Model using the Fuzzy Inference Method in MANET Topology
2021
International Journal of Emerging Trends in Engineering Research
Studies have shown various detection and mitigation techniques in line with the black hole attack of MANET technology. ...
Mobile Adhoc Network (MANET)as a network of mobile routers that self-configures has raised some security concerns which one of them has been the Black Hole Attack (BHA). ...
The proposed model modified an already existing model and integrated the FIM into the AODV protocol of the MANET, in order to better its dictation metrics against the Black hole MANET attack. ...
doi:10.30534/ijeter/2021/13962021
fatcat:yzxpushkuzevtau43gotasje4m
AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack
2017
International Journal of Computer Applications
The impact of Black hole attack on the performance of Manet is evaluated on the basis of throughput and end to end delay and it was observed that AODV is more susceptible to attack than OLSR. ...
There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). One of these attacks is Black Hole Attack, which grasps all data packets of network. ...
, Black hole attack is mainly analyzed on Adhoc On Demand Distance Vector(AODV) and shown how it disrupts the performance of MANET. ...
doi:10.5120/ijca2017915208
fatcat:pvsxr2jtnbb4fgr7jaf4ooa33i
Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application
2014
International Journal of Computer Applications
AODV, DSR, GRP, OLSR etc. In this Paper the simulation analysis of the performance of AODV, DSR and TORA is compared for VOIP application under black hole attack. ...
The performance is compared in terms of data dropped, network load, traffic sent and traffic received. The result shows that the overall performance of TORA is better than DSR and AODV. ...
In this paper we have evaluated the performance of three routing protocols (AODV, DSR and TORA) in MANET based on different scenarios of black hole attack for E-mail application. ...
doi:10.5120/18124-9170
fatcat:7lgqdghtinaedfehkno27q6ire
Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack
2013
International Journal of Modern Education and Computer Science
One common method to perform most of researches in the MANET security field is to simulate and analyze the routing protocols in various scenarios. ...
This work has been based on the implementation and experiments in the OPNET modeler version 14.5. ...
The research approach adopted in this paper includes a wide review of relevant literature on black hole attacks in MANET, coupled with the collection and analysis of data obtained of OPNET simulator, and ...
doi:10.5815/ijmecs.2013.10.03
fatcat:5wggev6omjhcbbw76m5jmzevay
Security Improved Chicken Swarm Optimization Based A* Routing Algorithm on MANETs
2020
International journal of recent technology and engineering
The comparative examination of Optimized A*, Ad-hoc On-Demand Distance Vector (AODV) with the proposed model against attacks, enhances the performance. ...
Once those attacks are prevented, the routing efficiency in MANETs for Chicken Swam Optimization based A* algorithm is improved, which is a computer algorithm that is broadly deployed in path finding and ...
The proposed model also focuses on detecting and preventing the major attacks like blackhole and wormhole attacks. The flow diagram of the proposed MANET routing is shown in Fig. 2
Fig.2. ...
doi:10.35940/ijrte.e6379.018520
fatcat:77eyzou4pjbfnclmx3dkyrgr5a
Investigation of Application Attack on MANET
2013
International Journal of Computer Applications
Most of the works in MANET have been focused on the Network Layer attacks because the attacks can be identified and its effects can be minimized on the Network layer itself. ...
This paper investigate the effect of Application layer attack on Mobile Ad-hoc Network using OPNET simulator and compare the outcomes of investigation of with and without attacks using different routing ...
SIMULATION RESULT & ANALYSIS We got four comparative results, two for each routing protocol (AODV & DSR), between scenarios with one attack and one without attack. ...
doi:10.5120/12430-9190
fatcat:qawbuoueffcx5egwhslzrm5l2e
Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC
2006
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems
In this paper we present a new secure routing protocol for mobile ad hoc networks (MANETs) based on AODV called AODV-SEC. ...
In addition we present the need for a new certificate type for secure routing in MANETs called mCert. In our opinion the results point out the current difficulties of secure routing protocol design. ...
Abstract-In this paper we present a new secure routing protocol for mobile ad hoc networks (MANETs) based on AODV called AODV-SEC. ...
doi:10.1109/mobhoc.2006.278589
dblp:conf/mass/EichlerR06
fatcat:t7et7uivvvd63dsfzt5lbe74we
MANETs performance analysis with dos attack at different routing protocols
2015
International Journal of Engineering & Technology
The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. ...
The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. ...
Different kinds of attacks types were studied, and their effects on the performance analysis of MANET [2] . ...
doi:10.14419/ijet.v4i2.4609
fatcat:exdn7qckjfg6jcjglvn6hrc7xa
Effect of Black Hole Attack on the Performance of AODV RoutingProtocol under Different Traffic Conditions in Mobile AdHoc Networks
2018
International Journal of Advanced Science and Technology
Performance of Routing protocols in MANETs degrades because of attack occur in the network. ...
In this paper, the Black hole attack and Rushing is introduced and the performance of AODV routing protocol is carried out with and without Black hole attack and Rushing attack under different traffic ...
The effect of Black hole attack and Rushing attack is different under different traffic condition with different packet size is different on the performance of AODV routing protocol in MANETs. ...
doi:10.14257/ijast.2018.115.02
fatcat:qgmigxaoengnbjhcmnpq2x6k4q
Adaptive Energy-Efficient On-Demand Distance Vector Routing Protocol for MANET
2014
International Journal of Computer Applications
In this paper we proposed an Advanced secured model for On-demand Distance vector routing protocol, which is highly secured against Denial of Service (DoS) attack and Blackhole (BH) attack. ...
This method can provide highly secured routing with better performance than the typical AODV in terms of packet delivery ratio, normalized routing load and the average throughput. ...
A unified analysis of routing increasing malicious nodes AODV will entirely increase or protocols in MANETs, Communications, IEEE decrease, but in the proposed model it is maintained small Transactions ...
doi:10.5120/17540-8122
fatcat:5eefi7r3g5culli6hknpfogyii
Preventing clone attacks using dynamic cryptography in MANETs
2018
Biomedical Research
The main objective of this method is to prevent clone attacks in MANETs while routing. ...
A polynomial key based authentication layer in AODV is used to demonstrate the clone attack prevention in the MANET. ...
Analysis under hierarchical topology The working of PK-AODV and AODV is assessed first in the flat topology in a 30-node scenario. ...
doi:10.4066/biomedicalresearch.29-17-1404
fatcat:fbv4nyonnbhjrbfhicoq7tzpdy
The resistance of routing protocols against DDOS attack in MANET
2020
International Journal of Electrical and Computer Engineering (IJECE)
The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol ...
types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. ...
ACKNOWLEDGEMENTS This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program. ...
doi:10.11591/ijece.v10i5.pp4844-4852
fatcat:ipeoti4e5nbgpbcoa6iwwk3paq
Analysis of Possible Attack on AODV Protocol in MANET
English
2014
International Journal of Engineering Trends and Technoloy
English
One of these possible attacks is a Black Hole Attack in which a mobile node falsely replies to the source node that it is having a shortest path to the destination without checking its routing table. ...
We also analysed the performance of the network in terms of number of packets sent, received, throughput, energy of network before attack and after detection & prevention of Attack. ...
The analysis shows that how severe the attack is and its effects on MANET.
II. ...
doi:10.14445/22315381/ijett-v11p258
fatcat:fbvds5pyljd7phteqdx23lv3be
A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET
2014
International Journal of Computer Applications
This paper presents the analysis of the effect of various security attacks on the performance of AODV routing protocol against various parameters such as throughput, packet delivery ratio, packet loss, ...
Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack, wormhole attack etc. ...
CONCLUSION AND FUTURE WORK This paper presents the analysis and effect of blackhole, grayhole and flooding attack on the performance of AODV routing protocol in MANET. ...
doi:10.5120/17757-8870
fatcat:6fpovz4i6jf25fklimk3wvgpeq
« Previous
Showing results 1 — 15 out of 2,180 results