THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK

被引:0
|
作者
Mahlous, Ahmed Redha [1 ]
机构
[1] Prince Sultan Univ, Riyadh, Saudi Arabia
关键词
Mobile Communications; Attacks; Simulation; Performance metrics; Routing protocols; BLACK-HOLE; AODV; PERFORMANCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad Hoc Networks (MANETs) are an interconnected system of wireless nodes without any central administration, making them more vulnerable to attacks than their wired counterparts. One such attack is the "gray hole" attack, which affects the integrity of the MANET. In this paper we analyse the effectiveness of three MANET protocols: CGSR, TORA, and ZHLS under a gray-hole attack. Using the NS2.35 simulator, we study the impact of gray-hole attacks on the aforementioned protocols in terms of performance metrics such as packet delivery ratio, jitter and throughput. The results showed that ZHLS is more robust under a gray hole attack than its counterparts CGSR and TORA.
引用
收藏
页码:59 / 72
页数:14
相关论文
共 50 条
  • [1] Effectiveness of reliable routing protocols in Mobile Ad Hoc NETworks
    Kim, Ki-Il
    Kim, Sang-Ha
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2006, 38 (03) : 377 - 390
  • [2] Effectiveness of Reliable Routing Protocols in Mobile Ad Hoc Networks
    Ki-Il Kim
    Sang-Ha Kim
    [J]. Wireless Personal Communications, 2006, 38 : 377 - 390
  • [3] A mechanism for detection of gray hole attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Hariliara, S. G.
    Reddy, Harish
    Balamuralidhar, P.
    [J]. 2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 627 - 631
  • [4] Comparative Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks under JellyFish Attack
    Wazid, Mohammad
    Kumar, Vipin
    Goudar, R. H.
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 147 - 152
  • [5] Rushing Attack Against Routing Protocols in Mobile Ad-Hoc Networks
    Ghoreishi, Seyed-Mohsen
    Abd Razak, Shukor
    Isnin, Ismail Fauzi
    Chizari, Hassan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 220 - 224
  • [6] An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network
    Moradipour, Omid
    Fathi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (04) : 558 - 567
  • [7] An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network
    Omid Moradipour
    Mohammad Fathi
    [J]. International Journal of Wireless Information Networks, 2020, 27 : 558 - 567
  • [8] A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks
    Khosa, Thabiso N.
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) : 532 - 542
  • [9] Attack analysis and detection for ad hoc routing protocols
    Huang, YA
    Lee, W
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2004, 3224 : 125 - 145
  • [10] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377