Analysis and Parameterized Evaluation of Impact of Wormhole Attack Using AODV Protocol in MANET
نویسنده
چکیده
In recent years, ubiquitous computing using Mobile Ad Hoc Networks (MANET) created many researches in all the application areas. Since the nodes in MANET are small with limited resources, highly mobile and has no centralized administrative control, it is used for tracking and monitoring in unattended environments. Dynamic topological changes due to the high mobility of the nodes make challenges in routing and making secure communication. In this paper, the impact of wormhole attack is analysed with Ad Hoc on demand Distance Vector Routing protocol in the presence of wormhole attacks. The parameters such as throughput, end to end delay and the number of cache replies were used to evaluate the performance. Result shows that throughput and the number of cache replies are increased up to 50% in the presence of malicious nodes and the end to end delay is increased
منابع مشابه
Evaluation Performance of Worm-Hole Attack Using Proposed AODV In MANET
A Mobile Ad hoc Network (MANET) is a collection of selfconfiguring nodes which uses the wireless link between communicating devices (mobile devices) to form an arbitrary topology without infrastructure. Dynamic topological changes caused by high node mobility make routing and securing communication challenging. Thus, the MANET is vulnerable to attacks due to their dynamic, lack of both distribu...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کامل