CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET

by Kuldeep Singh, Sudesh Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 14
Year of Publication: 2014
Authors: Kuldeep Singh, Sudesh Rani
10.5120/17757-8870

Kuldeep Singh, Sudesh Rani . A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET. International Journal of Computer Applications. 101, 14 ( September 2014), 30-34. DOI=10.5120/17757-8870

@article{ 10.5120/17757-8870,
author = { Kuldeep Singh, Sudesh Rani },
title = { A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 14 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number14/17757-8870/ },
doi = { 10.5120/17757-8870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:40.507507+05:30
%A Kuldeep Singh
%A Sudesh Rani
%T A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 14
%P 30-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack, wormhole attack etc. This paper presents the analysis of the effect of various security attacks on the performance of AODV routing protocol against various parameters such as throughput, packet delivery ratio, packet loss, and mean-hop, normalized routing overhead and end-to-end delay.

References
  1. Andel, Todd R. , and Alec Yasinsac. "Surveying security analysis techniques in MANET routing protocols. " Communications Surveys & Tutorials, IEEE 9. 4 (2007): 70-84.
  2. Perkins, Charles E. , and Elizabeth M. Royer. "Ad-hoc on-demand distance vector routing. " Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on. IEEE, 1999.
  3. Liang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy throughput of MANETs under passive and active attacks. " Information Theory, IEEE Transactions on 57. 10 (2011): 6692-6702.
  4. Konate, Karim, and G. A. Y. E. Abdourahime. "Attacks Analysis in mobile ad hoc networks: Modeling and Simulation. " Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on. IEEE, 2011.
  5. Bandyopadhyay, Alokparna, Satyanarayana Vuppala, and Prasenjit Choudhury. "A simulation analysis of flooding attack in MANET using NS-3. " Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE, 2011.
  6. Dembla, Deepak, and Dr Yogesh Chaba. "Modeling and Analysis of an intelligent AODV Routing Protocol based on Route Request Retransmission Strategy in MANETs. " International Journal of Computer Applications (0975-8887) Volume (2011): 6-13.
  7. Ruiz, Juan-Carlos, et al. "Black Hole Attack Injection in Ad hoc Networks. " Fault tolerance systems group (GSTF). http://www. ece. cmu. edu/~ koopman/dsn08/fastabs/dsn08fastabs_ruiz. pdf (2011).
Index Terms

Computer Science
Information Sciences

Keywords

AODV MANET Blackhole Attack Flooding Attack Grayhole Attack Attacker node Selfish node