Comparison of AODV Protocol with the Revised AODV Protocol against Malicious Attacks
نویسندگان
چکیده
Mobile ad hoc networks (MANETs) are infrastructure less networks which consist of dynamic collection of nodes with rapidly changing topologies of wireless links. MANETS are mobile and therefore, they use wireless connections to connect to various networks. Devices in range can communicate in a point-to-point fashion. MANETs are liable to different types of DoS attacks in which packets are dropped. Black hole attack is an event that degrades the performance of the network. This paper discusses the effects of the malicious attacks and the comparison of AODV Routing Protocol with the Revised AODV Routing Protocol in the presence of the Black hole attack based on performance metrics.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملSecurity Enhancement over Ad-hoc Aodv Routing Protocol
For most existing routing protocols of mobile ad hoc network (MANET), more efficient security mechanisms against the attacks from malicious, compromised and selfish nodes are highly demanded. This paper proposes a series of security mechanisms for the Ad-hoc On-demand Distance Vector (AODV) Routing protocol. Three techniques, including digital signature, one-way hash function and double one-way...
متن کاملPerformance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks
This paper reviews security issues on Adhoc network and Ad hoc On-Demand Distance Vector (AODV) protocol. In Adhoc network, active attack i.e DDOS, blackhole and malicious nodes attack can easily occur. These attacks can decrease the performance of the communications protocol. In this paper, AODV was chosen as the basic protocol to perform simulations due to the fact that the AODV protocol can ...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کامل