High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Performance Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET)

Author(s):

Abhishek Kumar , Galgotias University; Shweta Kumari, Galgotias University; Prabhat Kumar, Amity University

Keywords:

AODV, DSR, NS2

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a provisional network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole” attack. In this attack, a malicious node advertises itself as having the shortest path with highest sequence number to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. AODV protocol provides better performance than the DSR in the presence of Black holes with minimal additional delay and Overhead. Computer simulation using NS2 simulator on Linux operating system shows the behavior of malicious node. In this paper, we simulate and analyzed which routing method is best or suitable in different malicious behaviors

Other Details

Paper ID: IJSRDV2I7092
Published in: Volume : 2, Issue : 7
Publication Date: 01/10/2014
Page(s): 181-185

Article Preview

Download Article