CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV Routing Protocol in MANET

by Abhinav Mehta, Rohit Jain, Vinay Somani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 1
Year of Publication: 2013
Authors: Abhinav Mehta, Rohit Jain, Vinay Somani
10.5120/9892-4459

Abhinav Mehta, Rohit Jain, Vinay Somani . Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV Routing Protocol in MANET. International Journal of Computer Applications. 61, 1 ( January 2013), 20-24. DOI=10.5120/9892-4459

@article{ 10.5120/9892-4459,
author = { Abhinav Mehta, Rohit Jain, Vinay Somani },
title = { Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV Routing Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 1 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number1/9892-4459/ },
doi = { 10.5120/9892-4459 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:53.996234+05:30
%A Abhinav Mehta
%A Rohit Jain
%A Vinay Somani
%T Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV Routing Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 1
%P 20-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile ad-hoc network (MANET) is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. In this paper the AODV routing protocol in MANET will be discussed. Also various security threats on MANET will be discussed with our major concern on the Black Hole attack . In the later part of this paper there is a description of different radio propagation models and then compare their performance on AODV, with and without Black Hole attack.

References
  1. A. Vani ECE Department CBIT-Hyderabad D. Sreenivasa Rao Professor ECE. Department, JNTU Hyderabad, Andhra Pradesh, India "Removal of Black Hole Attack in Ad Hoc Wireless Networks to provide confidentiality security service".
  2. C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps. , Feb. 1999, pp. 90–100.
  3. Akanksha Saini, Harish Kumar Department of Computer Science & Engineering, UIET, Punjab University Chandigarh, "Effect Of Black Hole Attack On AODV Routing Protocol In MANET".
  4. Ingo Gruber, Oliver Knauf and Hui Li," Performance of Ad Hoc Routing Protocols in Urban Environments", In Proceedings of European Wireless 2004 (EW'2004, Barcelona, Spain, February 24 - 27, 2004, Barcelona, Spain
  5. http://www. cubinlab. ee. unimelb. edu. au/~jrid/Docs/ Manuel-NS2/node196. html.
  6. www. isi. edu/~weiye/pub/propagation_ns. pdf.
  7. Arne Schmitz, Martin Wenig ,"The Effect of the Radio Wave Propagation Model in Mobile Ad Hoc Networks",Torremolinos,Malga,Spain,MSWiM'06,October 2-6,2006
  8. www. isi. edu/nsnam/ns/tutorial Marc Greis tutorial on ns2.
  9. Ahmed Said AL Riyami "The Impact of Radio Propagation Models On Mobile Ad Hoc Networks (MANET) Performance"
  10. Y. C. Hu, A. Perring, D. B. Johnson, ?Wormhole Attacks in Wireless Networks,? Ieee Journal On Selected Areas In Communications, Vol. 24, No. 2, Feb. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

AODV MANET Black Hole