THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK

被引:0
|
作者
Mahlous, Ahmed Redha [1 ]
机构
[1] Prince Sultan Univ, Riyadh, Saudi Arabia
关键词
Mobile Communications; Attacks; Simulation; Performance metrics; Routing protocols; BLACK-HOLE; AODV; PERFORMANCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad Hoc Networks (MANETs) are an interconnected system of wireless nodes without any central administration, making them more vulnerable to attacks than their wired counterparts. One such attack is the "gray hole" attack, which affects the integrity of the MANET. In this paper we analyse the effectiveness of three MANET protocols: CGSR, TORA, and ZHLS under a gray-hole attack. Using the NS2.35 simulator, we study the impact of gray-hole attacks on the aforementioned protocols in terms of performance metrics such as packet delivery ratio, jitter and throughput. The results showed that ZHLS is more robust under a gray hole attack than its counterparts CGSR and TORA.
引用
收藏
页码:59 / 72
页数:14
相关论文
共 50 条
  • [41] Routing protocols in wireless mobile ad hoc network - A review
    Latiff, LA
    Fisal, N
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 600 - 604
  • [42] Research on Multipath Routing Protocols in Mobile Ad Hoc Networks
    Zheng Sihai
    Li Layuan
    [J]. ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 2: EDUCATION, PSYCHOLOGY AND COMPUTER SCIENCE, 2012, 117 : 515 - 521
  • [43] Studies on the Secure Routing Protocols of Mobile AD hoc Networks
    Cai Zhengce
    [J]. RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-4, 2013, 734-737 : 3203 - 3206
  • [44] Anonymous Routing Protocols for Mobile Ad-Hoc Networks
    Lu, Tianbo
    Chen, Hao
    Zhao, Lingling
    Li, Yang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 229 - 239
  • [45] Performance Evaluation of Switching between Routing Protocols in Mobile Ad Hoc Networks Performance Evaluation of Switching between Routing Protocols in Mobile Ad Hoc Networks
    Patil, Annapurna P.
    Kanth, K. Rajani
    Neel, Desai
    Ganesh, N.
    Amala, P.
    [J]. INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV, 2011, 254 : 213 - 222
  • [46] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    Poongodi, T.
    Karthikeyan, M.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1039 - 1050
  • [47] Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks
    Kamatchi, V.
    Mukesh, Rajeswari
    Rajakumar
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 365 - 373
  • [48] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    T. Poongodi
    M. Karthikeyan
    [J]. Wireless Personal Communications, 2016, 90 : 1039 - 1050
  • [49] PERFORMANCE OF MOBILE AD HOC NETWORKS UNDER ATTACK
    Harb, Lamyaa M. T.
    Tantawy, M.
    Elsoudani, M.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [50] AN IMPROVED MAINTENANCE STRATEGY IN AD HOC ON-DEMAND ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
    Al-Nahari, Abdulaziz
    Mohamad, Mohd. Murtadha
    Zahilah, Raja
    [J]. JURNAL TEKNOLOGI, 2016, 78 (6-11): : 59 - 65