Sinkhole Attack detection and prevention in MANET and Improving the performance of AODV Protocol
Keywords:
NS2, MANET, Vulnerabilty, Active, Passive, SinkholeAbstract
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive & active attacks. Sinkhole is one of severe kind of attack which attempts to attract most of network traffic towards it & degrade the performance of network. this paper, shows performance metrics as throughput, PDR, End to end delay & Packet loss. Simulation is carried out using widely used simulator NS2.
References
Laxmi Shrivastava, Sarita S.Bhadauria, G.S.Tomar,”Performance Evaluation of Routing Protocols in MANET with different traffic loads”, International Conference on Communication System Network Technologies IEEE 2011.
Asma Tuteja, & Rajneesh Gujral, “Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET using NS2”, International Conference on Advances in Computer Engineering IEEE 2010.
Sudhir Agrawal, Sanjeev Jain & Sanjeev Sharma,”Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior”, International Journal of Computer Applications (0975 – 8887) Volume 30– No.7, September 2011.
Subramanya Bhat.M & Shwetha.D,”A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator” International Journal of Computer Applications (0975 – 8887)Volume 28– No.5, August 2011.
Vijayalakshmi M. & Avinash Patel ,”Qos Parameter Analysis On Aodv And Dsdv Protocols In A Wireless Network”, Vijayalakshmi M.Indian Journal of Computer Science and Engineering Vol. 1 No. 4 283-294.
Kisung Kim and Sehun Kim,“ A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks”, Korea Advanced Institute of Science & Technology Korea.
Benjamin J. Culpepper, H.Chris Tseng,” Sinkhole Intrusion Indicators in DSR MANET”, First International Conferenc on broadband networks IEEE 2004.
Thanachai Thumthawatworn†, Tapanan Yeophantong and Punthep Sirikriengkrai,” Adaptive Sinkhole Detection on Wireless Ad Hoc Networks”, Assumption University, Thailand. IEEE 2006.
Marchang N, Datta R., “Collaborative techniques for intrusion detection in mobile ad-hoc networks”, Ad Hoc Networks 2008;6:508–23.
Ian D Chakeres & Elizabeth M Belding Royer,” AODV Routing Protocol Implementation Design”.
Harris Simaremare & Riri Fitri Sari,” Performance Evaluation of AODV variants on DDOS, Blackhole & Malicious Attacks”,International Journal of Computer Science & Network Security,Vol 11 No 6,june 2011.
Preeti Bhati, Rinki Chauhan, & R K Rathy,”An efficient Agent based AODV Routing Protocol in MANET”, International Journal on Computer Science & Engineering Vol No 7 july 2011.
Rajan Bansal, & Himani Goyal,” Analytical Study the performance Evaluation of Mobile Adhoc Network using AODV Protocol”, International Journal of Computer Application Jan 2011.
H A Esmailli, M R Khalil Shoja,”Performance Analysis of AODV under BlackHole Attack through use of OPNET Simulator”, World of Computer Science & Information Technology journal 2011.
Luke Klein-Berndt ,”A Quick Guide to AODV Routing”,Wireless Communication technology group National Institute of standard & Technology.
Mouhamad IBRAHIM and Giovanni NEGLIA,” Introduction to Network Simulator”.
NS-2, The ns Manual (formally known as NS Documentation) available at http: //www. isi.edu/nsnam/ ns/doc
Analysis of the Effect of Sinkhole Attack on AODV Protocol In Mobile Adhoc Network by Nisarg Gandhewar
Review on Sinkhole Detection Techniques in Mobile Adhoc Network by Nisarg Gandhewar
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.