Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size

被引:9
|
作者
Chaubey, Nirbhay [1 ]
Aggarwal, Akshai [2 ]
Gandhi, Savita [3 ]
Jani, Keyurbhai A. [4 ]
机构
[1] Inst Sci & Technol Adv Studies & Res ISTAR, Dept Comp Sci, Vallabh Vidyanagar, Gujarat, India
[2] Gujarat Technol Univ, Ahmadabad 380009, Gujarat, India
[3] Gujarat Univ, Dept Comp Sci, Ahmadabad 380009, Gujarat, India
[4] Ganpat Univ, Dept Informat Technol, Kherva, Gujarat, India
关键词
MANETs; AODV; Routing Protocol; blackhole; PDF; AED; AT; NRL;
D O I
10.1109/ACCT.2015.62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types of attacks. Black hole attack at network layer is the most attention seeking attack in AODV routing protocol. This paper study the impact of network size of our propose Trust Based Secure On Demand Routing Protocol called "TSDRP" and AODV routing protocol for making it secure to thwart Blackhole attack. To evaluate the performances, we have considered Packet Delivery Fraction (PDF), Average End-to-End Delay (AED), Average Throughput (AT) and Normalized Routing Load (NRL).
引用
收藏
页码:320 / 324
页数:5
相关论文
共 50 条
  • [1] Effect of Pause Time on AODV and TSDRP Routing Protocols Under Black Hole Attack and DoS Attacks in MANETs
    Chaubey, Nirbhay
    Aggarwal, Akshai
    Gandhi, Savita
    Jani, Keyurbhai A.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1807 - 1812
  • [2] Performance Evaluation of AODV routing Protocol under Black Hole attack with varying Black hole nodes
    [J]. 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [3] Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs
    Afdhal, Afdhal
    Muchallil, Sayed
    Walidainy, Hubbul
    Yuhardian, Qodri
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICELTICS), 2017, : 29 - 34
  • [4] Performance Analysis of AODV Routing Protocol in MANET under the Influence of Routing Attacks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT), 2016, : 536 - 542
  • [5] A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs
    Padmanabhan, Jayashree
    Subramaniam, Tamil Selvan Raman
    Prakasam, Kumaresh
    Ponpandiyan, Vigneswaran
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 541 - 548
  • [6] Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack
    Chavan, A. A.
    Kurule, D. S.
    Dere, P. U.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 835 - 844
  • [7] Performance of Dominating Sets in AODV Routing protocol for MANETs
    Nagaraju, A.
    Eswar, B.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 166 - +
  • [8] Improvising the Performance with Security of AODV Routing Protocol in MANETs
    Pandya, Morli
    Shrivastava, Ashish Kr.
    [J]. 2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [9] Combat with Black Hole Attack in AODV Routing Protocol
    Medadian, Mehdi
    Mebadi, Ahmad
    Shahri, Elham
    [J]. 2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 530 - 535
  • [10] Mitigating the Effects of Black hole Attacks on AODV Routing Protocol in Mobile Ad Hoc Networks
    Jain, Ashish Kumar
    Tokekar, Vrinda
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,