CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

The Study and Comparison between AODV, OLSR and DSR Routing Protocols and Attacks in Mobile Ad-Hoc Network

by Nirmaljit Kaur, Parveen Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 2
Year of Publication: 2016
Authors: Nirmaljit Kaur, Parveen Sharma
10.5120/ijca2016912039

Nirmaljit Kaur, Parveen Sharma . The Study and Comparison between AODV, OLSR and DSR Routing Protocols and Attacks in Mobile Ad-Hoc Network. International Journal of Computer Applications. 154, 2 ( Nov 2016), 28-31. DOI=10.5120/ijca2016912039

@article{ 10.5120/ijca2016912039,
author = { Nirmaljit Kaur, Parveen Sharma },
title = { The Study and Comparison between AODV, OLSR and DSR Routing Protocols and Attacks in Mobile Ad-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 2 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number2/26466-2016912039/ },
doi = { 10.5120/ijca2016912039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:10.518786+05:30
%A Nirmaljit Kaur
%A Parveen Sharma
%T The Study and Comparison between AODV, OLSR and DSR Routing Protocols and Attacks in Mobile Ad-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 2
%P 28-31
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless network consist of wireless node lacking any direction. Due to current of mobility of nodes, the network is easily personated by numerous attacks. In 1980’s Movable ad hoc network s have been extensively research ` for many years. Ad hoc network is a compilation of nodes that is associated throughout a wireless medium forming speedily changing topologies. Mobile ad hoc networks are an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that converse with each other with no the use of any centralized authority. Due to its original characteristics, such as wireless standard, self-motivated topology, dispersed collaboration, MANETs is susceptible to different kinds of safety attacks like worm whole, black hole, hastening attack etc. The communications less & active nature of these system demands new set of networking strategy to be implement in order to offer capable end to end announcement.. The study various routing protocols used in networking, performance comparison of DSR, OLSR and AODV is done. Various performance parameters measured are Throughput, End to End Delay and Packet Delivery Fraction for CBR traffic over UDP connection.

References
  1. Aarti, Dr SS. "Tyagi,“Study Of Manet: Characteristics, challenges, application and security attacks”." International Journal of Advanced Research in Computer Science and Software Engineering 3, no. 5 (2013): 252-257.
  2. Yadav, Meenakshi. "Survey on MANET: Routing Protocols, Advantages, Problems and Security." (2014).
  3. Helen, D., and D. Arivazhagan. "Applications, advantages and challenges of ad hoc networks." JAIR 2.8 (2014): 453-7.
  4. Kariya, Disha G., Atul B. Kathole, and Sapna R. Heda. "Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method."international journal of emerging technology and advanced engineering 2, no. 1 (2012).
  5. Medadian, Mehdi, Ahmad Mebadi, and Elham Shahri. "Combat with Black Hole attack in AODV routing protocol." Communications (MICC), 2009 IEEE 9th Malaysia International Conference on. IEEE, 2009.
  6. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Rushing attacks and defense in wireless ad hoc network routing protocols." Proceedings of the 2nd ACM workshop on Wireless security. ACM, 2003.
  7. Xu, Kuai, Feng Wang, and Lin Gu. "Network-aware behavior clustering of Internet end hosts." In INFOCOM, 2011 Proceedings IEEE, pp. 2078-2086. IEEE, 2011.
  8. Banerjee, Subhashis, and Koushik Majumder. "ANovel CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD-HOC NETWORKS." ICCSEA, SPPR, CSIA, WimoA–2013..
  9. Shrivastava, Satyam, and Sonali Jain. "A brief introduction of different type of security attacks found in mobile Ad-hoc network." ACM/Kluwer Wireless Networks Journal (ACM WINET) 9, no. 5 (2003).
  10. Wu, Bing, et al. "A survey of attacks and countermeasures in mobile ad hoc networks." Wireless Network Security. Springer US, 2007. 103-135.
  11. Holter, Kenneth. "Comparing AODV and OLSR." folk. uio. no/kenneho/studies/essay/essay. html (2005): 1-19.
  12. Macker, Joseph, and Scott Corson. "Mobile ad hoc networks (MANET)." (1997): 35-42.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Mobile ad hoc network black hole attack wormhole attack and features