Performance Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET) |
Author(s): |
Abhishek Kumar , Galgotias University; Shweta Kumari, Galgotias University; Prabhat Kumar, Amity University |
Keywords: |
AODV, DSR, NS2 |
Abstract |
An ad hoc network is a collection of mobile nodes that dynamically form a provisional network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole†attack. In this attack, a malicious node advertises itself as having the shortest path with highest sequence number to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. AODV protocol provides better performance than the DSR in the presence of Black holes with minimal additional delay and Overhead. Computer simulation using NS2 simulator on Linux operating system shows the behavior of malicious node. In this paper, we simulate and analyzed which routing method is best or suitable in different malicious behaviors |
Other Details |
Paper ID: IJSRDV2I7092 Published in: Volume : 2, Issue : 7 Publication Date: 01/10/2014 Page(s): 181-185 |
Article Preview |
|
|