IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 8    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 8, August 2011
Performance Analysis of Aodv Protocol Under Black Hole Attack
Full Text(PDF, 3000)  PP.  
Monika Roopak, Dr. BVR Reddy
Ad hoc network, black hole , AODV, MANET, PDR, RREQ, RREP
Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper are doing simulation study of network under black hole attack and do comparison with the network without attack working on AODV protocol using various performance metrics such as throughput, PDF and End to End delay in three different scenarios.
[1] Tamilselvan, L.; and Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. AusWireless, 21-21.

[2] C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On- Demand Distance Vector (AODV) Routing. RFC 3561, July 2003.

[3] C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distan ce Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, pages 173– 219. Addison-Wesley, 2000.

[4].E. A. Mary Anita and V. Vasudevan, Black Hole attack on multicast routing protocols, JCIT, Vol.4, No.2, pp. 64–68, 2009

[5] F. J. Ros and P. M. Ruiz, “Implementing a New Manet Unicast Routing Protocol in NS2”, December, 2004, http://masimum.dif.um.es/nsrt-howto/pdf/nsrthowto. pdf, 25 July 2005.

Untitled Page