We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Mobile Adhoc Network under the Adaptive TCP Variants Techniques for Maximization of Throughput

by Minakshi Halder, L. D. Malviya, Rekha Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 16
Year of Publication: 2012
Authors: Minakshi Halder, L. D. Malviya, Rekha Jain
10.5120/8974-3116

Minakshi Halder, L. D. Malviya, Rekha Jain . Mobile Adhoc Network under the Adaptive TCP Variants Techniques for Maximization of Throughput. International Journal of Computer Applications. 56, 16 ( October 2012), 12-17. DOI=10.5120/8974-3116

@article{ 10.5120/8974-3116,
author = { Minakshi Halder, L. D. Malviya, Rekha Jain },
title = { Mobile Adhoc Network under the Adaptive TCP Variants Techniques for Maximization of Throughput },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 16 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number16/8974-3116/ },
doi = { 10.5120/8974-3116 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:00.084350+05:30
%A Minakshi Halder
%A L. D. Malviya
%A Rekha Jain
%T Mobile Adhoc Network under the Adaptive TCP Variants Techniques for Maximization of Throughput
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 16
%P 12-17
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is an adhoc network which is set up by wireless mobile computers (or nodes) which moves randomly in the places that have no network infrastructure or hard to reach location. Since the nodes communicate with each other to gather network information. They cooperate by forwarding data packets to other nodes in the network. In wireless adhoc networks, cooperation between nodes takes place so that they route each other's packet till it reaches destination. Hence they are exposes to a wide range of security attacks. Also because the vulnerability of routing protocols, the wireless ad-hoc networks have to face several security risks. One of these attacks is the Blackhole Attack against network integrity which absorbs all data packets in the network. Since the data packets do not reach the destination node due to Blackhole attack. As a result data loss will occur. In this paper, we simulated the Black hole attack in various wireless ad-hoc network scenarios: with Blackhole attack and without Blackhole attack and comparison of existing TCP variants: TCP, FullTCP, Reno, Reno/Asym, New Reno, New Reno/Asym, Asym, Sack, Fack and Vegas. The impact of Blackhole attack on the performance of MANET is evaluated on the basis of those two scenarios. The measurements were taken to analyze network performance are Throughput, Packet Delivery Ratio and Total Dropped Packet. The simulation was done by using network simulator (NS-2. 34).

References
  1. Dokurer, S. ; Ert, Y. M. ; Acar, C. E. SoutheastCon, "Performance analysis of ad-hoc networks under black hole attacks". Proceedings IEEE Volume, Issue, 22-25 March 2007 Page(s):148 –153.
  2. Payal N. Raj and Prashant B. Swadas,"DPRAODV: A dynamic learning system against black hole attack in AODV based Manet", International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp: 54-59, 2009.
  3. Sheenu Sharma, Roopam Gupta," Simulation Study of Blackhole Attack in the Mobile Ad-Hoc Networks" Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243 – 250.
  4. Madhusudhananagakumar KS , G. Aghila, "A Survey on Black Hole Attacks on AODV Protocol in MANET" , International Journal of Computer Applications (0975 – 8887) Volume 34– No. 7, November 2011.
  5. Monika Roopak , Dr. Bvr Reddy ,"Performance Analysis of Aodv Protocol under Black Hole Attack" International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 ISSN 2229-5518.
  6. Elizabeth M. Royer and Chai-Keong Toh, "A Review of Current routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, pp 46-55, April 1999.
  7. H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Comm. Magazine, vol. 40, no. 10, 2002, pp. 70 75.
  8. S. Lu, L. Li, K. Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack," International Conference on Computational Intelligence and Security, 2009.
  9. A. Vani, D. Sreenivasa Rao, "Providing of Secure Routing against Attacks in MANETs",International Journal of Computer Applications (0975 – 8887) Volume 24– No. 8, June 2011.
  10. S. R. Biradar 1, Subir Kumar Sarkar2 , Puttamadappa C," A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks" (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 340-344.
  11. Vikas Solomon Abel," Survey of Attacks on Mobile AdhocWireless Networks" International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 2 Feb 2011.
  12. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre," Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET" International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 2, No. 1, February 2012.
  13. Lawrence S. Brakmo and Larry L. Peterson, "TCP Vegas: End to end congestion avoidance on a global Internet," IEEE Journal on Selected Areas in Communications, vol. 13, pp. 1465-1480, October 1995.
  14. Jitendra Padhye , Victor Firoiu , Donald F. Towsley , James F. Kurose, "Modeling TCP Reno performance: a simple model and its empirical validation," IEEE/ACM Transactions on Networking (TON), v. 8 n. 2, p. 133-145, April 2000.
  15. Rajib Das,Dr. Bipul Syam Purkayastha, Dr. Prodipto Das "Security Measures for Black Hole Attack in MANET: An Approach " International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4 Apr 2011.
  16. R. Britto Pradeep, N. Dhinakaran, P. Anitha Christy Angelin,"Comparison of Drop Rates in Different TCP Variants against Various Routing Protocols" International Journal of Computer Applications (0975 – 8887) Volume 20– No. 6, April 2011.
  17. B. S. Yew, B. L. Ong, and R. B. Ahmad," Performance Evaluation of TCP Vegas versus Different TCP Variants in Homogeneous and Heterogeneous Networks by Using Network Simulator 2" International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 03, 2011.
  18. Md. Shohidul Islam, M. A Kashem, W. H Sadid, M. A Rahman, M. N Islam, S. Anam," TCP Variants and Network Parameters: A Comprehensive Performance Analysis" Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, March 18 - 20, 2009, Hong Kong.
  19. R. Manoharan and E. Ilavarasan,"Impact of Mobility on the Performance of Multicast Routing Protocol in MANET" International Journal of Wireless & Mobile Networks (IJWMN), Vol. 2,No. 2,May 2010.
  20. Hesiri Weerasinghe and Huirong Fu," Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation" International Journal of Software Engineering and Its Applications Vol. 2, No. 3, July, 2008, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad-hoc network (MANET) TCP variants routing protocol network security Blackhole attack NS-2.