THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK

被引:0
|
作者
Mahlous, Ahmed Redha [1 ]
机构
[1] Prince Sultan Univ, Riyadh, Saudi Arabia
关键词
Mobile Communications; Attacks; Simulation; Performance metrics; Routing protocols; BLACK-HOLE; AODV; PERFORMANCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad Hoc Networks (MANETs) are an interconnected system of wireless nodes without any central administration, making them more vulnerable to attacks than their wired counterparts. One such attack is the "gray hole" attack, which affects the integrity of the MANET. In this paper we analyse the effectiveness of three MANET protocols: CGSR, TORA, and ZHLS under a gray-hole attack. Using the NS2.35 simulator, we study the impact of gray-hole attacks on the aforementioned protocols in terms of performance metrics such as packet delivery ratio, jitter and throughput. The results showed that ZHLS is more robust under a gray hole attack than its counterparts CGSR and TORA.
引用
收藏
页码:59 / 72
页数:14
相关论文
共 50 条
  • [21] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    [J]. WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342
  • [22] Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)
    Purohit, Kamlesh Chandra
    Dimri, Sushil Chandra
    Jasola, Sanjay
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5099 - 5114
  • [23] Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)
    Kamlesh Chandra Purohit
    Sushil Chandra Dimri
    Sanjay Jasola
    [J]. Wireless Personal Communications, 2017, 97 : 5099 - 5114
  • [24] A black hole attack model using topology approximation for reactive ad-hoc routing protocols
    Badenhop, Christopher W.
    Mullins, Barry E.
    [J]. Badenhop, C.W. (christopher.badenhop@wpafb.af.mil), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 63 - 77
  • [25] Comparative Study of OLSR, DSDV, AODV, DSR and ZRP Routing Protocols Under Blackhole Attack in Mobile Ad Hoc Network
    Singh, Ankit
    Singh, Gurpreet
    Singh, Mandeep
    [J]. INTELLIGENT COMMUNICATION, CONTROL AND DEVICES, ICICCD 2017, 2018, 624 : 443 - 453
  • [26] An enhanced Multipath Strategy in Mobile Ad hoc Routing Protocols
    Alfawaer, Zeyad M.
    Riyaz, Belgaum Mohammad
    [J]. 2017 9TH IEEE-GCC CONFERENCE AND EXHIBITION (GCCCE), 2018, : 1012 - 1017
  • [27] Survey of multipath routing protocols for mobile ad hoc networks
    Tarique, Mohammed
    Tepe, Kemal E.
    Adibi, Sasan
    Erfani, Shervin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (06) : 1125 - 1143
  • [28] Performance comparison of routing protocols for mobile ad hoc networks
    Talooki, Vahid Nazari
    Ziarati, Koorush
    [J]. 2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 105 - +
  • [29] On Demand Routing Protocols for Mobile Ad Hoc Networks: A Review
    Kulkarni, Nidhi S.
    Raman, Balasubramanian
    Gupta, Indra
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 586 - +
  • [30] Analyzing Reactive Routing Protocols for Mobile Ad Hoc Networks
    Kapur, Raj Kamal
    Khatri, Sunil Kumar
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (03)