IJMECS Vol. 5, No. 10, 8 Oct. 2013
Cover page and Table of Contents: PDF (size: 350KB)
Full Text (PDF, 350KB), PP.19-26
Views: 0 Downloads: 0
Mobile Ad hoc Network (MANET), Black hole attack, Cooperative Black hole attack, Ad-hoc On-demand Distance Vector (AODV)
In this paper, two routing protocols (AODV and DSR) are simulated under regular operation, single and cooperative black hole attack. This work has been performed by simulator to show consequence of black hole attacks in MANET by using various graphs which are used to collect data in term of several metrics. One common method to perform most of researches in the MANET security field is to simulate and analyze the routing protocols in various scenarios. This work has been based on the implementation and experiments in the OPNET modeler version 14.5. Finally the results have been computed and compared to stumble on which protocol is least affected by these attacks.
Amin Mohebi, Ehsan Kamal, Simon.Scott, "Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack", International Journal of Modern Education and Computer Science (IJMECS), vol.5, no.10, pp.19-26, 2013. DOI:10.5815/ijmecs.2013.10.03
[1]Weerasinghe, H. and H. Fu, “Preventing cooperative black hole attacks in mobile ad hoc networks”. Simulation implementation and evaluation. Future Generat. Commun. Netw, 2007, Volume 10, Issue, 6, pp. 362- 367.
[2]Deng H, Li W, Agrawal “Routing Security in Wireless Ad-hoc Networks”. IEEE Communications Magazine, 2002 Volume 103, Issue, 10 pp. 70 – 75.
[3]Bo Sun,Yong Guan,Jian Chen,Udo W.Pooch “Detecting Black-hole Attack in Mobile Ad Hoc Network”. 5th European Personal Mobile Communications Conference, Glasgow, April 2003 Volume 492, Issue, 22-25 pp. 490 – 495.
[4]Mohammad AL-Shurman,Seon-Moo Yoo and Seungiin Park,” Black Hole Attack in Mobile Ad Hoc Networks” ACMSE’04,April 2-3,2004,Huntsville,AL,USA.
[5]Latha Tamilselvan & Sankaranarayanan, V. (2007). Prevention of Blackhole Attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007) Pages 21-27.
[6]Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L, “ Developing a BDSRScheme to Avoid Black Hole Attack Based on Proactive and ReactiveArchitecture in MANETs”. Paper presented at the 13th InternationalConference on Advanced Communication Technology, Phoenix Park, Korea,Feb. 2011, pp. 13-16 .
[7]Rutvij H. Jhaveri , Sankita J. Patel. (2012). DoS Attacks in Mobile Ad-hoc Networks: A Survey. 2012 Second International Conference on Advanced Computing & Communication Technologies. 2 (2), p535-540.
[8]Mukija, A, “Reactive Routing Protocols for Mobile Ad Hoc network”. IEEE Network magazine, special issue on networking security, 2001, Volume 14.
[9]K.Netmesiter “Routing protocols In Mobile Ad Hoc Networks: Challenges And Solutions”. IEEE Wireless Communications Magazine, Sponsored byIEEE Communications Society, February 2010,Volume 11, Issue.
[10]Bouam and Z. Othman. “Securing Ad Hoc Networks”. IEEE Network magazine, special issue on networking security, November/December 2003,Volume 13, Issue, 6.
[11]Deborah Estrin, Lewis Girod, Greg Pottie, and Mani Srivastava. Instrumenting the world with wireless sensor networks. In International Conference on Acoustics, Speech, and SignalProcessing, 2001.
[12]N.V Trang and X.Xing “Rate–adaptive Multicast in MANETS” WiMob’2005, Volume 3, Issue, 19 pp. 352-360.