Buradasınız

The Effects of Black Hole Attack in Mobile Ad-Hoc Network using OLSR and AODV

Journal Name:

Publication Year:

Abstract (2. Language): 
Mobile Ad-Hoc network is an autonomous system, where nodes or stations are connected with each other through wireless links. To forward the data to the neighbors’ nodes, a node can serve as a router. This kind of network is also known as infrastructure less networks. These networks have no centralized administration. MANETs are applied is emergency services such as disaster recovery and relief activities, where traditional wired network is already destroyed. The scope of this research is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc on Demand Distance Vector (AODV). For both protocols Comparative analysis of Black Hole attack is taken into account. On the performance of MANET the impact of Black Hole attack is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. In the light of throughput, end-to-end delay and network load the measurements were taken. Simulation is done in Optimized Network Engineering Tool (OPNET). The study focuses on analyzing the effects of black hole attack in the light of Network load, throughput and end-to-end delay in MANET. We simulate the black hole attack using Proactive and Reactive routing protocols and compare the results of both Proactive and Reactive protocols to analyze which of these two types of protocols are more vulnerable to Black Hole attack.
FULL TEXT (PDF): 
97-102

REFERENCES

References: 

[1] David B.Johnson and Dravid A. Maltz, “Dynamic Source routing in ad hoc wireless networks”, Technical report, Carneigie Mellon University, 1996.
Fig. 3.3 Network loads 16 nodes AODV vs. OLSR with attack.
Fig. 3.4 Network loads 30 nodes AODV vs. OLSR with attack.
International Journal of Science and Engineering Investigations, Volume 2, Issue 15, April 2013 102
www.IJSEI.com Paper ISSN: 2251-8843 ID: 215-13-18
[2] Harris Simaremare and Riri Fitri Sari, “Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks”, International Journal of Computer Science and Network Security, VOL-11, June 2011, Page Number-6.
[3] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks”, University of Cincinnati, IEEE Communication magazine, October 2002.
[4] Imrich Chlamtac, Marco Conti, Jennifer J. - N. Liu “ Mobile ad hoc networking: imperatives and challenges ”, School of Engineering, University of Texas at Dallas, Dallas, TX, USA, 2003.
[5] Lidong Zhou, Zygmunt J. Hass, “Securing Ad Hoc Networks”, IEEE Special Issue on Network Security, Vol-13, Nov-Dec 1999, Page Number - 24-30L.
[6] P. Ning and K. Sum, “How to misuse AODV: A case study of insider attack against mobile ad hoc routing protocol”, Tech Rep, TR- 2003-07, CS Department, NC University, April 2003
[7] Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks”, Department of Computer Science and Electrical Engineering, University of Maryland.
[8] Z.J.Hass, M.R.Pearlman, P.Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, 55th Proceeding of International task force, July, 2002.
[9] P.V.Jani, “Security within Ad-Hoc Networks”, Position Paper, PAMPAS Workshop, Sept. 2002.
[10] M.Parsons, P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks”, [Online]. Available: www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].
[11] D.B.Roy, R.Chaki and N.Chaki, “A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks”, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1, April, 2009.
[12] H.L.Nguyen, U.T.Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks”, International Conference on System and Networks and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL 2006), pp.149-149, April, 2006.
[13] C.Wei, L.Xiang, B.yuebin and G.Xiaopeng, “A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks”, Second International Conference on Communications and Networking in china, pp.366-370, Aug, 2007.
[14] S.Marti, T.J.Giuli, K.Lai, M.Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”, Proceedings of the 6th annual international conference on Mobile computing and networking, united states, pp. 255-265.

Thank you for copying data from http://www.arastirmax.com