Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet

被引:9
作者
Kaur, Parvinder [1 ]
Kaur, Dalveer [2 ]
Mahajan, Rajiv [3 ]
机构
[1] Punjab Tech Univ, Dept Res Innovat & Consultancy, Jalandhar Kapurthala Highway, Kapurthala, Punjab, India
[2] Punjab Tech Univ, Dept Elect & Commun Engn, PIT Univ Campus Jalandhar Kapurthala Highway, Kapurthala, Punjab, India
[3] Golden Coll Engn & Technol, Dept Comp Sci & Engn, Gurdaspur, Punjab, India
关键词
Mobile Ad hoc network (Manet); Routing protocols; Wormhole; Metrics; Network simulator; Throughput; Packet loss; Packet delivery ratio; Jitter; Random mobility model; PERFORMANCE EVALUATION; NETWORKS; AODV;
D O I
10.1007/s11277-017-4150-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a part of any network at any time that's why it is susceptible to different types of attacks. Wormhole attack is most threatening security attack in ad hoc network where an attacker node receives packet at one location and replay them at other location which is remotely located far. In this paper, we study and compare the performance of AODV, DSR and ZRP under the impact of multiple wormhole attacker nodes. Diverse scenarios are characterized as like average of 50 runs and mobility. By statistical placement of multiple wormhole nodes across the network, we evaluate the performance in terms of throughput, packet delivery ratio, packet loss, average end to end delay and jitter. Finally based on the simulation we investigated the most affected routing protocol in terms of network metrics.
引用
收藏
页码:47 / 63
页数:17
相关论文
共 42 条
  • [1] Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
  • [2] A Survey of Secure Mobile Ad Hoc Routing Protocols
    Abusalah, Loay
    Khokhar, Ashfaq
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04): : 78 - 93
  • [3] [Anonymous], IETF MANET IN PRESS
  • [4] Arora Mani, 2010, Proceedings of the 2010 Second International Conference on Computer and Network Technology (ICCNT 2010), P102, DOI 10.1109/ICCNT.2010.34
  • [5] Awerbuch B, 2004, MITIGATING BYZANTINE, P16
  • [6] Bansal M., 1999, THE ITERNET SOC
  • [7] Beijar N., 2002, ZONE ROUTING PROTOCO, P1
  • [8] Bettstetter C., 2002, P 5 ACM INT WORKSH M
  • [9] Performance evaluation of routing protocols for ad hoc wireless networks
    Boukerche, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2004, 9 (04) : 333 - 342
  • [10] Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
    Chang, Jian-Ming
    Tsou, Po-Chun
    Woungang, Isaac
    Chao, Han-Chieh
    Lai, Chin-Feng
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (01): : 65 - 75