Effects Of Wormhole Attack On AODV And DSR Routing Protocol Through The Using NS2 Simulator
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Mobile Adhoc Networks (MANET) are self organizing, decentralized networks and possess dynamic topology, which make them attractive for routing attacks. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. The security of the AODV and DSR protocol is compromised by a particular type of attack called ‘Worm hole attack’. Wormhole attack is a network layer attack observed in MANET, which completely disrupts the communication channel. In This paper we analyses the performance of AODV and DSR routing protocols with and without wormhole attack using Network Simulator 2. For analyzing the performance we considered total packets received, total bytes received, first packet received, last packet received, average end-to-end delay and throughput as measures.
Authors and Affiliations
Mohamed Otmani , Dr. Abdellah Ezzati
A Comparitative Survey on Malicious Nodes and Their Attacks in MANET
Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or n...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s &nb...
A Generic Open Source Framework for Auto Generation of DataManipulation Commands
Abstract: Free and open source technology has gained a tremendous importance in software development dueto its low cost and holds numerous other compelling advantages both from the perspective of software user andsoftwar...
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Abstract: The Internet Protocol Version 6 (IPv6) has gained popularity with companies,organizations andInternet service providers (ISPs) due to its enhancements over IPv4 such as (IPv6 128bit compared to ofipv4(32...
A Survey of Recommendation Algorithms
Abstract: Recommender system can be defined as the subclass of information filtering system which attemptsto give the guidance to the users regarding the useful services based on their personalized preferences, pas...