BibTex RIS Kaynak Göster

Analysis of Current Routing Attacks in Mobile Ad Hoc Networks

Yıl 2015, , 127 - 132, 30.03.2015
https://doi.org/10.18100/ijamec.61094

Öz

Mobile ad hoc networks (MANET) has no fixed infrastructure and depends on nodes to perform routing of data packets. MANET nodes are highly self organized even with a collection of few mobile nodes. Security is an important issue for mobile ad hoc networks. Even though mobile ad hoc networks have many advantages over the traditional wired network, when it comes to security it poses an immense set of threats. The scope of this project is to study about Misbehavior Node attack, Byzantine attack and Pulse Jammer attack on Reactive Routing Protocol i.e. Ad Hoc On Demand Distance Vector (AODV) on MANET simulation environment. To perform the simulations we used OPNET modeller 14.5 as the network simulator for our proposed work. The results showed that MANET posed a high security risk attack either from internal or from external attack.

Kaynakça

  • REFERENCES
  • Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
  • Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
  • Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
  • Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
  • Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
  • Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
  • A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
  • David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.

Original Research Paper

Yıl 2015, , 127 - 132, 30.03.2015
https://doi.org/10.18100/ijamec.61094

Öz

Kaynakça

  • REFERENCES
  • Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
  • Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
  • Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
  • Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
  • Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
  • Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
  • A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
  • David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.
Toplam 9 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Research Article
Yazarlar

Hande Bakiler Bu kişi benim

Aysel Şafak Bu kişi benim

Yayımlanma Tarihi 30 Mart 2015
Yayımlandığı Sayı Yıl 2015

Kaynak Göster

APA Bakiler, H., & Şafak, A. (2015). Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers, 3(2), 127-132. https://doi.org/10.18100/ijamec.61094
AMA Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. Mart 2015;3(2):127-132. doi:10.18100/ijamec.61094
Chicago Bakiler, Hande, ve Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3, sy. 2 (Mart 2015): 127-32. https://doi.org/10.18100/ijamec.61094.
EndNote Bakiler H, Şafak A (01 Mart 2015) Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers 3 2 127–132.
IEEE H. Bakiler ve A. Şafak, “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Applied Mathematics Electronics and Computers, c. 3, sy. 2, ss. 127–132, 2015, doi: 10.18100/ijamec.61094.
ISNAD Bakiler, Hande - Şafak, Aysel. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3/2 (Mart 2015), 127-132. https://doi.org/10.18100/ijamec.61094.
JAMA Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3:127–132.
MLA Bakiler, Hande ve Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers, c. 3, sy. 2, 2015, ss. 127-32, doi:10.18100/ijamec.61094.
Vancouver Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3(2):127-32.