IJETST
  • Register
  • Login
##common.pageHeaderLogo.altText##
  • Home
  • About
    • Editorial Team
    • About the Journal
  • Current
  • Archives
  • Submissions
  • Contact
Advanced Search
  1. Home
  2. Archives
  3. Vol. 1 No. 07 (2014): September 2014 Issue
  4. Articles

Vol. 1 No. 07 (2014)

September 2014

Performance Analysis and Comparison of MANET Routing Protocols under Black Hole Attack

  • Mrs. Amninder Kaur Gill
  • Yog Kunwar

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 07 (2014), 2 September 2014
Published 4 September 2014

  • View Article
  • Download
  • Cite
  • Reference
  • Statastics
  • Share

Abstract

A Mobile Ad-Hoc Network (MANET) consists of portable wireless nodes. The communication between these mobile nodes is dispensed with non-centralized management. There are still many open problems concerning MANETs like security problem. Black Hole Attack is one amongst the security threats that is applicable in the network. The aim of this work is to analyze the effect of Black Hole Attack in MANET routing protocol i.e. Ad-Hoc On-Demand Distance Vector (AODV) and Temporarily Ordered Routing Algorithm (TORA). Comparative analysis of both protocols with Black Hole Attack is taken into account. The simulation is done using NS2 simulator.

Keywords: AODV, MANET, NS2, TORA.

    PDF

How to Cite

Gill, M. A. K., & Kunwar, Y. (2014). Performance Analysis and Comparison of MANET Routing Protocols under Black Hole Attack. International Journal of Emerging Trends in Science and Technology, 1(07). Retrieved from https://mail.ijetst.in/index.php/ijetst/article/view/312
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

  • Download Citation

    • Endnote/Zotero/Mendeley (RIS)
    • BibTeX

    References

    [1] Aarti & Tyagi S. S., "Study of MANET: Characteristics, Challenges, Application and Security Attacks", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 252-257, May 2013.
    [2] Abusalah L., Khokhar A. & Guizani M., "A Survey of Secure Mobile Ad-Hoc Routing Protocols", IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 78–93, 2008.
    [3] Badiwal S. & Verma V., "Survey of IDS in MANET against Black Hole Attack", International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 5, pp. 401–406, May

    2013.
    [4] Chamoli S., Kumar S. & Rana D., " Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Int.J.Computer Technology & Applications,vol. 3, no. 4, pp. 1395–1399, August 2012.
    [5] Hilal A. R., Nahas A.E. & Bashandy A., "RT-TORA: A TORA Modification for Real-Time Interactive Applications", IEEE/Canadian Conference on Electrical and Computer Engineering, pp. 1403-1406, May 2008.
    [6] Ivan S., Handbook of Wireless Networks and Mobile Computing, Wiley Publications, India, 2002.
    [7] Kuppusamy P. & Thirunavukkarasu K., "A Study and Comparison of OLSR, AODV and TORA Routing Protocols in Ad Hoc Networks", in proceedings of IEEE 3rd International Conference on Electronics Computer Technology (ICECT), 2011.
    [8] Ramanathan R. & Redi J., "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Communcation Magazine, vol. 40, no.5, pp. 20-22, August 2002.
    [9] Royer E. M. & Toh C. K., " A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, April 1999.
    [10] Selvavinayaki K., Shankar K. K. S. & Karthikeyan E., "Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs", International Journal of Computer Applications, vol. 7, no. 11, pp. 15–19, October 2010.
    [11] Song J., Wong V. W. S. & Leung V. C. M., "Efficient On-Demand Routing for Mobile Ad Hoc Wireless Access Networks", IEEE Journal on Selected Areas in Communications, vol. 22, no. 7, pp. 1374–1383, September 2004.
    [12] Ullah I. & Rehman S. U. R., Analysis of Black Hole Attack on MANETS Using Different MANET Routing Protocols, School of Computing/ Blekinge Institute of Technology, June 2010, available: http://www.bth.se/[accessed on18/1/2014,1:30 p.m].
    • Article Viewed: 51 Total Download

    Downloads

    Download data is not yet available.

    ##plugins.themes.ojsPlusA.frontend.article.downloadstatastics##

    • Linkedin
    • Twitter
    • Facebook
    • Telegram

    Make a Submission

    Make a Submission

    Current Issue

    • Atom logo
    • RSS2 logo
    • RSS1 logo

    Information

    • For Readers
    • For Authors
    • For Librarians
    Keywords
    • Home
    • Archives
    • Submissions
    • About the Journal
    • Editorial Team
    • Contact
     Open Access Policy || Publication & Peer Review Policy || Publication Ethics
    The publication is licensed under a Creative Commons License (CC BY). View Legal Code
    Copyright © 2018 All Rights Reserved, International journal of Emerging Trends in Science and Technology | Powered By IJETST
    International journal of Emerging Trends in Science and Technology