CFP last date
20 January 2025
Reseach Article

Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic

by P. V. Venkateswara Rao, S. Pallam Setty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 22
Year of Publication: 2015
Authors: P. V. Venkateswara Rao, S. Pallam Setty
10.5120/21392-4435

P. V. Venkateswara Rao, S. Pallam Setty . Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic. International Journal of Computer Applications. 120, 22 ( June 2015), 18-22. DOI=10.5120/21392-4435

@article{ 10.5120/21392-4435,
author = { P. V. Venkateswara Rao, S. Pallam Setty },
title = { Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 22 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number22/21392-4435/ },
doi = { 10.5120/21392-4435 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:53.759334+05:30
%A P. V. Venkateswara Rao
%A S. Pallam Setty
%T Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 22
%P 18-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs are vulnerable to different kinds of attacks due to inherent properties such as wireless medium, dynamic topology, distributed operation and constrained capability. One of the well-known attacks is the Black Hole attack which is most common in the on-demand routing protocols such as AODV. In this paper, we simulate the Black-hole attack in AODV using NS2 Simulator for both SANETS and MANETS by varying node density in the context of responsive and non-responsive traffic. From the simulation results, the impact of Black-hole attack on the performance of AODV QOS metrics i. e. , throughput, packet delivery ratio is less, for end-to-end delay, routing load is high in MANET and SANET under responsive (TCP) and non-responsive traffic (UDP).

References
  1. S. Corson and J. Macker, "RFC 2501Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Consideration ,"1999.
  2. Constantine Manikopoulos and Li Ling "Architecture of the Mobile Adhoc Network Security (MANS) System" CONEX Laboratory, NJWINS Center
  3. Hsu J. ,Bhatia S. , Takai M. ,bagrodia R. and Acriche M. J. ,(2003),"performance of mobile Ad Hoc Networking routing protocols in realistic scenarios", proceeding of IEEE conference on military communications, Vol. 2,pp. 1268-1273.
  4. Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communications magazine, October 2002.
  5. V. Karpijoki, "Security in Ad Hoc Networks", Seminar on Net Work Security, HUT TML 2000.
  6. J. Broch, D. Maltz, D. B. Johnson, Yih-Chun Hu, J. Jetcheva. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing protocols. "Proceedings of the Fourth Annual ACM/IEEE on Mobile Computing and Networking, MOBICOM 98, October 1998.
  7. C. E. Perkins, S. R. Das, and E. Royer, "Ad-Hoc on Demand Distance Vector (AODV)", March 2000, http://www. ietf. org/internet-drafts/draft-ietf-manet-aodv- 05. txt
  8. D. Djen, L. Khelladi, and A. N. Badache, "A survey of of Security issues in Mobile Ad Hoc Network," Communication Surveys & Tutorials , IEEE, vol. 7 no. 4,2005,pp. 2-28.
  9. Cryptography and Network Security – Willian Stallings
  10. Venkataramana Attada, and S. Pallam Setty, "Cross Layer Design Approach to Enhance the Quality of Service in Mobile Ad Hoc Networks" Wireless Personal Communications, DOI 10. 1007/s11277-015-2609-6, May 2015, Springer.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs SANETs AODV black hole attack NS2 throughput end-to-end-delay packet delivery ratio normalized routing load.