BibTex RIS Cite

Analysis of Current Routing Attacks in Mobile Ad Hoc Networks

Year 2015, Volume: 3 Issue: 2, 127 - 132, 30.03.2015
https://doi.org/10.18100/ijamec.61094

Abstract

Mobile ad hoc networks (MANET) has no fixed infrastructure and depends on nodes to perform routing of data packets. MANET nodes are highly self organized even with a collection of few mobile nodes. Security is an important issue for mobile ad hoc networks. Even though mobile ad hoc networks have many advantages over the traditional wired network, when it comes to security it poses an immense set of threats. The scope of this project is to study about Misbehavior Node attack, Byzantine attack and Pulse Jammer attack on Reactive Routing Protocol i.e. Ad Hoc On Demand Distance Vector (AODV) on MANET simulation environment. To perform the simulations we used OPNET modeller 14.5 as the network simulator for our proposed work. The results showed that MANET posed a high security risk attack either from internal or from external attack.

References

  • REFERENCES
  • Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
  • Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
  • Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
  • Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
  • Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
  • Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
  • A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
  • David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.

Original Research Paper

Year 2015, Volume: 3 Issue: 2, 127 - 132, 30.03.2015
https://doi.org/10.18100/ijamec.61094

Abstract

References

  • REFERENCES
  • Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
  • Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
  • Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
  • Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
  • Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
  • Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
  • A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
  • David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.
There are 9 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Hande Bakiler This is me

Aysel Şafak This is me

Publication Date March 30, 2015
Published in Issue Year 2015 Volume: 3 Issue: 2

Cite

APA Bakiler, H., & Şafak, A. (2015). Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers, 3(2), 127-132. https://doi.org/10.18100/ijamec.61094
AMA Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. March 2015;3(2):127-132. doi:10.18100/ijamec.61094
Chicago Bakiler, Hande, and Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3, no. 2 (March 2015): 127-32. https://doi.org/10.18100/ijamec.61094.
EndNote Bakiler H, Şafak A (March 1, 2015) Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers 3 2 127–132.
IEEE H. Bakiler and A. Şafak, “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 2, pp. 127–132, 2015, doi: 10.18100/ijamec.61094.
ISNAD Bakiler, Hande - Şafak, Aysel. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3/2 (March 2015), 127-132. https://doi.org/10.18100/ijamec.61094.
JAMA Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3:127–132.
MLA Bakiler, Hande and Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 2, 2015, pp. 127-32, doi:10.18100/ijamec.61094.
Vancouver Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3(2):127-32.

Creative Commons License

Address: Selcuk University, Faculty of Technology 42031 Selcuklu, Konya/TURKEY.