Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks

نویسندگان

  • Harris Simaremare
  • Riri Fitri Sari
چکیده

This paper reviews security issues on Adhoc network and Ad hoc On-Demand Distance Vector (AODV) protocol. In Adhoc network, active attack i.e DDOS, blackhole and malicious nodes attack can easily occur. These attacks can decrease the performance of the communications protocol. In this paper, AODV was chosen as the basic protocol to perform simulations due to the fact that the AODV protocol can run well in high mobility and high traffic communication. Many AODV protocol variants have been developed. Currently, AODV protocol has been developed to improve the performance in terms of efficiency and security. To improve the performance of the AODV protocol, we proposed AODV-UI. AODV-UI has been developed by adopting a reverse request method introduced by R-AODV protocol, and it can run on the gateway modes. To improve the security in AODV, Path Hopping based on Reverse AODV (PHR-AODV) have been developed. In this paper we will evaluate the performance of AODV-UI protocol and PHRAODV protocol under DDOS, blackhole and malicious nodes attacks using NS-2 simulator. The topology is fixed, and the attacks come from inside the network. The performance evaluation performed includes the packet delivery ratio, packet lost and end to end delay. The result of the simulation shows that the performance of AODV-UI protocol is better than PHRAODV in terms of packet delivery ratio, packet lost and end to end delay under malicious and DDOS attack. The simulation shows that under blackhole attack, PHR-AODV gives a better performance than AODV-UI.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Performance analysis of AODV under Blackhole Attack in MANET

Ad-hoc network is an autonomous mobile node. It is a set of temporary based networks, which has not fixed infrastructure. The Ad-hoc networks are very much positive towards attack by malicious node due to its vulnerabilities nature of routing protocols. There are large numbers of attacks affect the Ad-hoc networks. In between these attacks one is very much known as Black Hole Attack. In this pa...

متن کامل

Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet

Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs ar...

متن کامل

Securing Manet from Blackhole and Wormhole Attacks

Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol). Blackhole and Wormhole nodes are malicious nodes which degr...

متن کامل

Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks

The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and thus, attract traffic, which they subsequently capture and drop. However, the first part of the attack is often neglected in present literature, while the majority of attempts in detection focus only on the second part o...

متن کامل

AODV & SAODV under Attack: Performance Comparison

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the perform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011