We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Evaluation of DSR and GRP under Black Hole Attack

by Amritbir Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 21
Year of Publication: 2015
Authors: Amritbir Singh
10.5120/21349-3330

Amritbir Singh . Performance Evaluation of DSR and GRP under Black Hole Attack. International Journal of Computer Applications. 120, 21 ( June 2015), 6-11. DOI=10.5120/21349-3330

@article{ 10.5120/21349-3330,
author = { Amritbir Singh },
title = { Performance Evaluation of DSR and GRP under Black Hole Attack },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 21 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number21/21349-3330/ },
doi = { 10.5120/21349-3330 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:47.047133+05:30
%A Amritbir Singh
%T Performance Evaluation of DSR and GRP under Black Hole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 21
%P 6-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Network is a dynamic network which formed by collection of wireless nodes without any centralized support. Due its features mobile ad hoc network is more prone to security attacks.Black Hole Attack is one of them.Back hole attack is type of security attack in which all data packets routed towards node which not actually exist it drop all data packets. This research paper evaluate the performance of two mobile ad hoc network routing protocols DSR and GRP under black hole attack on certain parameters like end-to-end delay, network load and throughput.OPNET Modeler 14.5 is used as simulation tool. On the basis of observation it found GRP performs better as compared to DSR under black hole attack.

References
  1. A Tamizhselvi,Banu Wahida,R.S.D,“Performance Evaluation of Geographical Routing Protocol Under Different Scenario”, International Journal of Computer Science and Telecommunications(IJCST),ISSN 2047-3338,Vol.3,No.3,pp 64-67,2012
  2. Bo Sun,Yong Guan,Jian Chen and Udo W.Pooch, “Detecting Black Hole Attack in Mobile Adhoc Networks”, The Institute of Electrical Engineers, Michael Faraday House, Six Hill Way,Stevenage,SGI2AY,EPMCC,2003
  3. C.S Murthy, B.S Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols”, Pearson Education,2004
  4. D Johnson Hu, D Maltz, “The Dynamic Source Routing Protocol (DSR) For Mobile Ad Hoc Networks for IPv4”, IETF, RFC 4728,February 2007
  5. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, “A Survey of Black Hole Attacks in Wireless Mobile Adhoc Networks”, Human Centric Computing and Informational Sciences, A Springer Open Journal, 2011
  6. Gagandeep,Aashima,Pawan Kumar, “Analysis of Different Security Attacks in MANETS on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology(IJEAT),ISSN 2249-8958,Vol.1,No.5,pp 269-275,2012
  7. Harjeet Kaur,Manju Bala,Varsha Shani, “Performance Evaluation of AODV,OLSR and ZRP Routing Protocols Under The Black Hole Attack in MANET”,International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering(IJAREEIE),ISSN(Print) 2320-3765 ISSN(Online) 2278-8875,Vol.2,No.6,pp 2555-2563,2013
  8. Irshad Ullah,Shahzad Anwar, “Effects of Black Hole Attack on MANET Using Reactive And Proactive Protocols”, International Journal of Computer Science Issues(IJCSI),ISSN(Print) 1694-0814 ISSN(Online)1694-0784,Vol.10,Issue 3,No.1, pp 152-159,2013
  9. Ms. Gayatri Wahane and Prof. Ashok Kanthe, “Technique for Detection of Cooperative Black Hole Attack in MANET”, IOSR Journal of Computer Science (IOSR-JCE), e-ISSN 2278-0661, pp 59-67,2014
  10. Mohammad Al-Shurman and Seong-Moo Yoo and Seungjin Park, “Black Hole Attack in Mobile Adhoc Networks”, AMCSE 04, April 2-3, Huntsville, AL, USA, 2004
  11. Najiya Sultana ,S.S Saragdevot, “The Effects of Black Hole Attack in Mobile Ad Hoc Network Using OLSR and AODV”,International Journal of Science and Engineering Investigations(IJSEI),ISSN 2251-8843,Vol.2,No.15,pp 97-102,2013
  12. Neha Kaushik and Ajay Dureja,“A Comparative Study of Black Hole Attack in MANET”,International Journal of Electronics and Communication Engineering and Technology(IJECET),Vol.4, Issue 2,pp 93-102,2013
  13. P.V.Jani,“Security within Ad-Hoc Networks”, Position Paper, PAMPAS Workshop,September 2002
  14. Vandna Dahiya,“Analysis of Black Hole Attack on MANET Using Different Routing Protocols”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),ISSN 2278 –1323,Vol.3, No.10,pp 3309-3316, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

MANET DSR GRP OPNET