Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size

被引:10
作者
Chaubey, Nirbhay [1 ]
Aggarwal, Akshai [2 ]
Gandhi, Savita [3 ]
Jani, Keyurbhai A. [4 ]
机构
[1] Inst Sci & Technol Adv Studies & Res ISTAR, Dept Comp Sci, Vallabh Vidyanagar, Gujarat, India
[2] Gujarat Technol Univ, Ahmadabad 380009, Gujarat, India
[3] Gujarat Univ, Dept Comp Sci, Ahmadabad 380009, Gujarat, India
[4] Ganpat Univ, Dept Informat Technol, Kherva, Gujarat, India
来源
2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015 | 2015年
关键词
MANETs; AODV; Routing Protocol; blackhole; PDF; AED; AT; NRL;
D O I
10.1109/ACCT.2015.62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types of attacks. Black hole attack at network layer is the most attention seeking attack in AODV routing protocol. This paper study the impact of network size of our propose Trust Based Secure On Demand Routing Protocol called "TSDRP" and AODV routing protocol for making it secure to thwart Blackhole attack. To evaluate the performances, we have considered Packet Delivery Fraction (PDF), Average End-to-End Delay (AED), Average Throughput (AT) and Normalized Routing Load (NRL).
引用
收藏
页码:320 / 324
页数:5
相关论文
共 19 条
[1]  
Abu Obaida M, 2011, INT J ADV COMPUT SC, V2, P97
[2]  
Aggarwal A., 2011, INT J DISTRIBUTED PA, V2, P167
[3]   Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs [J].
Aggarwal, Akshai ;
Gandhi, Savita ;
Chaubey, Nirbhay ;
Jani, Keyurbhai A. .
2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, :432-+
[4]  
[Anonymous], OPTIMIZED L IN PRESS
[5]  
Esmaili H. A., 2011, WORLD COMPUTER SCI I, V1, P49
[6]   A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks [J].
Feng, Renjian ;
Che, Shenyun ;
Wang, Xiao ;
Yu, Ning .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[7]  
Gandhi S., 2012, IEEE INT C COMP COMM, DOI [10.1109/iccci.2012.6158842, DOI 10.1109/ICCCI.2012.6158842]
[8]  
Gandhi S., 2012, COMPUT COMMUN, P1
[9]  
Nisha, 2013, INT J ENG RES TECHNO, V2
[10]  
Perkins C., 2003, Internet RFCs