Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
نویسندگان
چکیده
A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has been a major issue over the recent years. One of the prominent mesh base reactive multicast routing protocols used in ad-hoc networks is On Demand Multicast Routing protocol (ODMRP). The security of ODMRP is compromised by a primary routing attack called black hole attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. This paper discusses the impact of black hole attack on ODMRP under various scenarios. The performance is evaluated using metrics such as packet delivery ratio and end to end delay for various numbers of senders and receivers via simulation. Simulations are carried out using network simulator ns-2. The results enable us to propose solutions to counter the effect of black hole attack. Keywords-MANET; Black hole; ODMRP
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملBlack Hole Attack on Multicast Routing Protocols
A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile adhoc networks has been a major issue over t...
متن کاملPerformance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack
There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive ...
متن کاملPerformance Comparison of Routing Attacks in Manet and Wsn
Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0908.0222 شماره
صفحات -
تاریخ انتشار 2009