Open Access Open Access  Restricted Access Subscription Access

Comparative Analysis of Routing Attacks in Ad Hoc Network


Affiliations
1 Department of Computer Science, Assam University, Silchar-788011, India
 

In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

Keywords

MANET, Blackhole, Flooding, DSR, NS-2.
User
Notifications
Font Size

Abstract Views: 174

PDF Views: 0




  • Comparative Analysis of Routing Attacks in Ad Hoc Network

Abstract Views: 174  |  PDF Views: 0

Authors

Bipul Syam Purkayastha
Department of Computer Science, Assam University, Silchar-788011, India
Rajib Das
Department of Computer Science, Assam University, Silchar-788011, India

Abstract


In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

Keywords


MANET, Blackhole, Flooding, DSR, NS-2.