CFP last date
20 December 2024
Reseach Article

Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application

by Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 12
Year of Publication: 2014
Authors: Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh
10.5120/18124-9170

Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh . Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application. International Journal of Computer Applications. 103, 12 ( October 2014), 7-13. DOI=10.5120/18124-9170

@article{ 10.5120/18124-9170,
author = { Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh },
title = { Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 12 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number12/18124-9170/ },
doi = { 10.5120/18124-9170 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:21.788310+05:30
%A Lovepreet Singh
%A Navdeep Kaur
%A Gurjeevan Singh
%T Analysis the Performance of MANET Protocol under Black Hole Attack for E-Mail Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 12
%P 7-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes having ability to communicate with each other without any fixed network infrastructure. Due to the unavailability of controlling entity, routing and network management are done cooperatively by respective nodes. MANET is an autonomous system where each node act as an end system as well as a router to forward packets for other nodes. , intermediate nodes are used to transmitting the packets from the source to the destination node, through different routing protocols i. e. AODV, DSR, GRP, OLSR etc. In this Paper the simulation analysis of the performance of AODV, DSR and TORA is compared for VOIP application under black hole attack. The performance is compared in terms of data dropped, network load, traffic sent and traffic received. The result shows that the overall performance of TORA is better than DSR and AODV.

References
  1. Aujla, Gagangeet Singh and Kang, Sandeep Singh, "Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with Varying number of nodes and traffic applications over MANETs," Department of CSE, Chandigarh Engineering College, India, April 2013.
  2. Mohebi, Amin and Kamal, Ehsan and Scott, Simon, "Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack," International Journal of Modern Education & Computer Science, vol. 5, 2013.
  3. Gupta, Sorabh and Gill, Sumeet and Joshi, Anil, "Analysis of Black Hole Attack on AODV and OLSR Routing Protocols in MANET," IJCA, vol. 1, pp. 11-19, october 2011.
  4. Ramaswamy, Sanjay and Fu, Huirong and Sreekantaradhya, Manohar and Dixon, John and Nygard, Kendall E, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," International Conference on Wireless Networks, 2003.
  5. Su, Ming-Yang, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Computer Communications, vol. 34, pp. 107-117, 2011.
  6. Saini, Akanksha and Kumar, Harish, "Effect Of Black Hole Attack On AODV Routing Protocol In MANET," IJCST, vol. 1, pp. 57-60, 2010.
  7. Guo, Lei and Peng, Yuhuai and Wang, Xingwei and Jiang, Dingde and Yu, Yinpeng, "Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks," Computers & Electrical Engineering, vol. 37, pp. 106-114, 2011.
  8. Saxena, Nidhi and Kumar, Sanjeev and Saxena, Vipul, "Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator," International Journal of Innovative Research and Development, vol. 2, pp. 244-248, 2013.
  9. Tamilarasan, Santhamurthy, "A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET," International Journal of Computer Science Issues(IJCSI), vol. 9, pp. 364-369, January 2012.
  10. Vats, Kuldeep and Sachdeva, Monika and Saluja, Krishan, "Simulation and performance Analysis of OLSR, GRP, DSR Routing Protocol using OPNET," IJETED volume 2, Issue 2, March 2012.
  11. Gupta, S Balaji and Navneeth, T and Sundar, S and Vidhyapathi, CM, "Performance Evaluation of MANET Routing Protocols under Varying Node Mobility," International Journal of Engineering & Technology (0975-4024), vol. 5, 2013.
  12. Tamilarasan, S and Sivaram, Dr R, "An Analysis and Comparison of Multi-Hop Ad-Hoc wireless Routing Protocols for Mobile Node," International Journal of Science and Applied Information Technology, vol. 1, pp. 1-5, march-April 2012.
  13. Singh, S. (2014). Maodv: To identify a secure route selection in manet under blackhole. Master's thesis, Shaheed Bhagat Singh State Technical Campus.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV DSR TORA OPNET E-mail