CFP last date
20 May 2024
Reseach Article

Performance Comparison of AODV and DYMO MANET Protocols under Wormhole Attack Environment

by Richa Agrawal, Rajeev Tripathi, Sudarshan Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 9
Year of Publication: 2012
Authors: Richa Agrawal, Rajeev Tripathi, Sudarshan Tiwari
10.5120/6290-8482

Richa Agrawal, Rajeev Tripathi, Sudarshan Tiwari . Performance Comparison of AODV and DYMO MANET Protocols under Wormhole Attack Environment. International Journal of Computer Applications. 44, 9 ( April 2012), 9-16. DOI=10.5120/6290-8482

@article{ 10.5120/6290-8482,
author = { Richa Agrawal, Rajeev Tripathi, Sudarshan Tiwari },
title = { Performance Comparison of AODV and DYMO MANET Protocols under Wormhole Attack Environment },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 9 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number9/6290-8482/ },
doi = { 10.5120/6290-8482 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:05.343440+05:30
%A Richa Agrawal
%A Rajeev Tripathi
%A Sudarshan Tiwari
%T Performance Comparison of AODV and DYMO MANET Protocols under Wormhole Attack Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 9
%P 9-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-Hoc network, or MANET, is an infrastructure less, self-configuring network. All wireless devices in MANETs are connected through wireless links. Mobile wireless networks are more vulnerable to information and physical security threats than fixed wireless networks. Due to the use of open and shared broadcast wireless channel and due to insufficient physical protection, these networks are prone to security threats. These threats can endanger the overall functionality of mobile ad- hoc network. Various security threats show their impact at different layers. In this paper we have discussed some basic routing protocols. Different security attacks have also been discussed. We consider the wormhole attack as routing attack and based on simulation study we compare the impact of wormhole attack on AODV and DYMO MANET routing protocols.

References
  1. Basangi, S. , Conti, M. , Giordano, S. and Stojmenovic, I. 2004. Mobile ad hoc networking. IEEE Press. Wiley-Interscience. P-282.
  2. Komninos, N. , Vergados, D. and Dougligeris, C. 2006. Layered Security Design for mobile ad hoc networks. Computers & Security. Elsevier.
  3. Perkins, C. E. , Royer, E. M. 1999. Ad-hoc on-demand distance vector routing. Mobile Computing Systems and Applications. Proceedings. pp. 90–100.
  4. Perkins, C. E. , Royer, M. , and Das, S. 2003. Ad-hoc on-demand distance vector routing. IETF. RFC 3561.
  5. Adjih, C. , Laouiti, A. , Minet, P. , Muhlethaler, P. , Qayyum, A. and Viennot, L. 2003. The optimised routing protocol for mobile ad-hoc networks: protocol specification. Hipercom, INRIA. October.
  6. Chakeres, I. D. and Perkins, C. E. 2006. Dynamic MANET on-demand (DYMO) routing protocol. IETF. Internet-Draft Version 6. October.
  7. DjeNouri, D. and Khelladi, L. 2005. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communication Surveys and Tutorials. Fourth Quarter. Volume 7, No. 4.
  8. Kannhavong, B. , Nakayama, H. , Nemoto, Y. , Kato, N. and Jamalipour, A. 2007. A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications. October.
  9. Hu, Y-C. Perrig, A. and Johnson, D. 2006. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications. Volume 24. No. 2. February.
  10. Scalable Network Technologies. QualNet simulator-version 5. 02. Software package. Available online: http://www. qualnet. com.
  11. Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Published by ACM 1994 Article.
  12. Espensen, K. L. , Kjeldsen, M. K. and Kristensen, L. M. 2007. Towards modelling and validation of the dymo routing protocol for mobile ad-hoc networks. Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools. Eighth Workshop. Aarhus, Denmark, October 22-24.
  13. Argyrouds, P. G. and O'Mahony, D. 2005. Secure routing for mobile ad hoc networks. IEEE Communications, Third Quarter, Volume 7, No. 3.
  14. Khan, S. , Mast, N. Loo, K-K. 2009. Denial of service attacks and mitigating techniques in IEEE 802. 11 Wireless Mesh networks. Information: An International Interdisciplinary Journal. Volume 12. No. 1. January.
  15. Hu, Y. , Perrig, A. and Johonson, D. B. 2003. Rushing attacks and defence in wireless ad hoc network routing protocols. Proceedings ACM Workshop. Wireless Security. September pp. 30–40.
  16. Buchegger, S. and Boudec, J. Y. 2002. Nodes bearing grudges: toward routing security, fairness and robustness in mobile ad hoc networks. 10th Euromicro Workshop. Parallel, Distributed and Network-based Proceedings.
  17. Baras, J. S. , Radosavac,S. and Theodorakopoulos, G. 2007. Intrusion detection system resiliency to byzantine attacks: the case study of wormholes in olsr. Military Communications Conference (MILCOM). Orlando, Florida.
  18. Mahajan, V. , Natu, M. , and Sethi, A. 2008. Analysis of wormhole intrusion attacks in MANETS. Military Communications Conference. San Diego. IEEE, pp. 1-7 .
Index Terms

Computer Science
Information Sciences

Keywords

Manet Aodv Dymo Dsr Wormhole