Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Performance Analysis of Routing Protocols under Security Issues through Use of NS2 Simulator

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Akanksha Bali, Malvika Ashok, Megha Mahajan

Akanksha Bali, Malvika Ashok and Megha Mahajan. Performance Analysis of Routing Protocols under Security Issues through Use of NS2 Simulator. International Journal of Computer Applications 180(20):38-44, February 2018. BibTeX

	author = {Akanksha Bali and Malvika Ashok and Megha Mahajan},
	title = {Performance Analysis of Routing Protocols under Security Issues through Use of NS2 Simulator},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2018},
	volume = {180},
	number = {20},
	month = {Feb},
	year = {2018},
	issn = {0975-8887},
	pages = {38-44},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2018916478},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wired networks, the unique characteristics of MANET pose a number of non-trivial challenges to security design. In MANETs, routing protocols are necessary to find specific paths between the source and the destination. MANET routing protocols are categorized into three types named as proactive, reactive, hybrid. To Provide Connectivity, Wireless MANETs take the help of multi-hop peer to peer routing. The MANETs topology change with time. MANETs have applications in several military and civilian areas. This paper contains comparison related to five different types of routing protocols named as AODV, DSDV, DSR, ZRP and OLSR. In MANET, these protocols are used for active routing under the several scenarios which plays a complex role in places where wired networks neither present nor economical to play. My objective was to implement Five routing protocols named above by using NS2 and compared their performances under different Parameters and metrics by using Attack and without attack.


  1. T. Santhamurthy, “A Comparative Study of Multi-hop Wireless Ad-hoc Network Routing Protocols in MANETs”, International Journal of Computer Science, pp. 176-184, 2011.
  2. G. S. Tomar, M. Dixit and S. Verma, “AODV Routing Protocol with Selective Flooding”, IEEE Internatonal Conference of Soft Computing and Pattern Recognition, pp. 82-686, 2009.
  3. A. Kumar, P. Singh, V. Kumar, Dr. N. Tyagi, “Performance Analysis of AODV, CBRP, DSDV and DSR MANET routing Protocol using NS2 Simulation”, International Journal on Computer Network and Information Security, vol. 5, no. 9, pp. 45-50, 2013.
  4. K. U. Rahman, R. Khan and A. V. Reddy, “Performance Comparison of On-Demand and Table Driven Ad-hoc Routing Protocols using NCTU ns”, IEEE International Conference on Computer Modeling and Simulation, pp. 336-341, 2008.
  5. S. Dalal, S. Singh, “ Comparative Study of Reactive On Demand Routing Protocols for Mobile Ad-hoc Network”, International Journal of Computer Science and Engineering Technology, vol. 3, no. 7, pp. 243-250, 2012.
  6. I. Vijaya, P. B. Mishra and A. R. Dash, “Influence of Routing Protocols in Performance of Wireless Mobile Ad-hoc Network”, IEEE Second International Conference on Emerging Applications of Information Technology, pp. 340-344, 2011.
  7. S. S. Khushwah and G. S. Tomar, “Investigation of Effects of Mobility on Routing Protocols in MANET”, International Journal of Computer Science Issues, vol. 8, no. 5, pp. 176-184, 2011.
  8. D. Dembla and Y. Chaba, “Performance Analysis of on Demand Routing Protocols of Mobile Ad-hoc Networks and Comparative Study”, The Journal of Computer Science and Information Technology, vol. 3, pp. 30-34, 2006.
  9. C. Putta, K.B. Prasad, D. Ravilla and M. Chandra, “Performance of Ad-hoc Network Routing Protocols in IEEE 802.11”, IEEE International Conference on Computer and Communication Technology, pp. 371-376, 2010.
  10. A.Bali, S.N. Singh,” Comparing Performance of AODV, DSR, DSDV, ZRP with Black Hole Attack and without Attack through Use of NS2 Simulator”, International Journal of Applied.
  11. Engineering Research ISSN 0973-4562 Volume 10, Number 12 (2015) pp. 32741-32755.


MANETs, DSR, DSDV, ZRP, AODV, OLSR, NS2, Routing Protocols, Black Hole Attack, AODV-BH, DSDV-BH, DSR-BH, ZRP-BH, OLSR-BH