CFP last date
20 May 2024
Reseach Article

Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack

by Harmandeep Singh, Gurpreet Singh, Manpreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 18
Year of Publication: 2012
Authors: Harmandeep Singh, Gurpreet Singh, Manpreet Singh
10.5120/5790-7992

Harmandeep Singh, Gurpreet Singh, Manpreet Singh . Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack. International Journal of Computer Applications. 42, 18 ( March 2012), 1-6. DOI=10.5120/5790-7992

@article{ 10.5120/5790-7992,
author = { Harmandeep Singh, Gurpreet Singh, Manpreet Singh },
title = { Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 18 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number18/5790-7992/ },
doi = { 10.5120/5790-7992 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:31:36.929655+05:30
%A Harmandeep Singh
%A Gurpreet Singh
%A Manpreet Singh
%T Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 18
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under Black-Hole Attack. The performance evaluations of metrics chosen are end to end delay, retransmission attempts, network load and throughput, when a percentage of nodes misbehave. It is evaluated that it is difficult to detect Black Hole attack, on the basis of the performance of the network.

References
  1. Alfawar, M. Z. , Alzoubi, S. 2009. A Proposed Security Subsystem for Ad Hoc Wireless Networks. In: International forum on Computer Science technology and Applications. (2009), 1-4.
  2. Ali, F. , Khaldown A. A. 2008. A Shared Secret based Algorithm for securing the OLSR Routing Protocol. In: IJCSNS International Journal of Computer Science and Network Security, Vol. 8 No. 6, (2008), 337-343.
  3. Bo, M. S. , Xiao, H. , Adereti, A. , Malcolm, A. J. , Christianson, B. 2007. A Performance Comparison of Wireless Ad hoc Network Routing Protocols under Security Attack. In: Third International Symposium on Information Assurance and Security. UK (2007), 50-55.
  4. Candolin, C. , Kari, H. H. 2002. A Security Architecture for Wireless Ad Hoc Networks. (2002), 1095-1100.
  5. Deng, H. , Li, W. , Aggarwal, P. D. 2002. Routing Security in Wireless Ad Hoc Networks. In: IEEE Communication Magazine. (2002), 70-75.
  6. Hu, C. Y. , Perrig, A. , Johnson, B. D. Aridane. 2002. A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceeding of the 8th Annual International Conference on Mobile Computing and Networking. Atlanta, Georgia, USA (2002)
  7. Hu, C. Y. , Perrig, A. , Johnson, B. D. 2002. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: IEEE Workshop on Mobile Computing Systems and Applications. (2002), 3-13.
  8. Li, H. , Singhal, M. 2006. A Secure Routing Protocol for Wireless Ad Hoc Networks. In: HICSS' 06: Proceedings of the 39th Annual Hawai International Conference on System Sciences. (2006) , 1-10
  9. Padilla, G. E. , Aschenbruck, N. , Martini, P. , Jahnke, M. , Tolle, J. 2009. Detectine Black Hole Attacks in Tactical MANETs using Topology Graphs. In: 32nd IEEE Conference on Local Computer Networks. (2009), 1043—1050.
  10. Papadimitratos, P. , Haas, J. Z. 2003. Secure Link State Routing for Mobile Ad Hoc Networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad Hoc Networks in Conjunction with the 2003 International Symposium on Applications and the Internet. . Orlando, FL (2003), 1-7.
  11. Papadimitratos, P. , Haas, J. Z. 2002. Secure Routing for Mobile Ad Hoc Networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference. San Antonio, TX (2002)
  12. Tseng, Y. C. , Balasubramanyam, P. , Ko, C. , Limprasittiporn, R. , Rowe, J. , Levitt, K. 2009. A Specification based Intrusion Detection System for AODV. (2009), 1-10.
  13. T. P. Singh, Neha and V. Das, 2012. Multicast Routing Protocols in MANETs. In: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 2, and (JAN. 2012).
  14. Westhoff, D. , Paul, K. 2002. Context Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks. In: IEEE GLOBECOM. Taipei, Taiwan (2002), 178-182.
  15. W. R. Salem Jeyaseelan and Shanmugasundaram Hariharan. 2011. Investigation on Routing Protocols in MANET" In : International Journal of Research and Reviews in Information Sciences (IJRRIS), Vol. 1, No. 2, (2011), 80-84.
  16. Y. Sharma and J. Sengupta. 2010. Performance Evaluation of MANET routing protocols under various security attacks. In the proceedings of International Conference Methods and Modeling in Computer Science, new delhi. (2010), 117-124.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Black Hole Attack