CFP last date
20 December 2024
Reseach Article

Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks

Published on October 2014 by Clarita T. Pinto, Manjunatha A. S.
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 4
October 2014
Authors: Clarita T. Pinto, Manjunatha A. S.
30f0a4c3-649c-4f90-870d-1317ad28cb9b

Clarita T. Pinto, Manjunatha A. S. . Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks. International Conference on Information and Communication Technologies. ICICT, 4 (October 2014), 9-16.

@article{
author = { Clarita T. Pinto, Manjunatha A. S. },
title = { Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 4 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 9-16 },
numpages = 8,
url = { /proceedings/icict/number4/17985-1437/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Clarita T. Pinto
%A Manjunatha A. S.
%T Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 4
%P 9-16
%D 2014
%I International Journal of Computer Applications
Abstract

Mobile ad hoc networks (MANETs) are infrastructure less networks which consist of dynamic collection of nodes with rapidly changing topologies of wireless links. MANETS are mobile and therefore, they use wireless connections to connect to various networks. Devices in range can communicate in a point-to-point fashion. MANETs are liable to different types of DoS attacks in which packets are dropped. Black hole attack is an event that degrades the performance of the network. This paper discusses the effects of the malicious attacks and the comparison of AODV Routing Protocol with the Revised AODV Routing Protocol in the presence of the Black hole attack based on performance metrics.

References
  1. MANETDefinition: http://www. techopedia. com/definition/5532/mobile-ad-hoc-network-manet.
  2. MANET Characteristics: http://www. eexploria. com/manet-mobile-ad-hoc-network-characteristics-and-features/
  3. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  4. M. Abolhasan, T. Wysocki, E. Dutkiewicz, "A Review of Routing Protocols for Mobile Ad- Hoc Networks", Telecommunication and Information Research Institute University of Wollongong, Australia, June, 2003.
  5. C. E. Perkins, E. M. Belding Royer; and S. R. Das (2003) Ad hoc on demand distance vector (AODV) routing RFC 3561. The Internet Engineering Task force, Network Working Group.
  6. Ochola EO, Eloff MM, A Review of Black Hole Attack on AODV Routing in MANET.
  7. Tamilselvan, L. and Sankaranarayanan, V. , "Prevention of Black hole attack in MANET". The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 21-21, 2007
  8. Dokurer, S. ; Ert, Y. M. ; and Acar, C. E. , "Performance analysis of ad hoc networks under Black hole attacks", Southeast Con, 2007, Proceedings IEEE, 148 – 153.
  9. Black hole effect mitigations method in AODV routing protocol, 2011 IEEE, Zaid Ahmad, Kamarularifin Abd, Jamalul-lail Ab Manan.
  10. Humaira Ehsan, Farrukh Aslam Khan, "Malicious AODV-Implementation and Analysis of Routing Attacks in MANETs"- 2012 IEEE.
  11. Sheenu Sharma, Dr. Roopam Gupta, "Simulation Study of Black Hole Attack in the Mobile Ad hoc Networks", November 2009
  12. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto. "Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Security", Vol. 5, No. 3, PP. 338– 346, Nov. 2007
  13. ns-2, Network Simulator, http://www. isi. edu/nsnam/ns.
  14. Mobility Models: http://www-public. it-sudparis. eu/~gauthier/MobilityModel/mobilitymodel. html
  15. Mobility Models: http://en. wikipedia. org/wiki/Mobility_model.
  16. Yogesh Chaba, R. B. Patel, Rajesh Gargi, "Analysis Of Mobility Models For Mobile Ad Hoc Networks" Voyager- The Journal of Computer Science and Information Technology, ISSN 0973-4872, Vol. 6, No. 1, July-Dec. 2007 p. p. 50-55.
  17. Bhavyesh Divecha1, Ajith Abraham, Crina Grosan and Sugata Sanyal, "Impact of Node Mobility on MANET Routing Protocols Models" School of Technology and Computer Science, Tata Institute of Fundamental Research, India.
  18. Tracy Camp, Jeff Boleng and Vanessa Davies, A survey of Mobility Models for Ad hoc Network Research, Wireless Communications and Mobile computing: A special issue on Ad hoc network Research, vol 2, No5, pp. 483-502, 2002.
  19. Modified AODV Protocol against Blackhole Attacks in MANET K. Lakshmi1, S. Manju Priya A. Jeevarathinam3 K. Rama4, K. Thilagam, International Journal of Engineering and Technology Vol. 2 (6), 2010, 444-449.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Routing Protocols Aodv Malicious Attacks Revised Aodv