##plugins.themes.academic_pro.article.main##

Abstract

A Mobile Ad-Hoc Network (MANET) consists of portable wireless nodes. The communication between these mobile nodes is dispensed with non-centralized management. There are still many open problems concerning MANETs like security problem. Black Hole Attack is one amongst the security threats that is applicable in the network. The aim of this work is to analyze the effect of Black Hole Attack in MANET routing protocol i.e. Ad-Hoc On-Demand Distance Vector (AODV) and Temporarily Ordered Routing Algorithm (TORA). Comparative analysis of both protocols with Black Hole Attack is taken into account. The simulation is done using NS2 simulator.

Keywords: AODV, MANET, NS2, TORA.

##plugins.themes.academic_pro.article.details##

Author Biographies

Mrs. Amninder Kaur Gill, Punjabi University Regional Center for IT and Management, Mohali, India

Assistant Professor (CS)

 

Yog Kunwar, Punjabi University Regional Center for IT and Management, Mohali, India

Student of Computer Science and Engineering
How to Cite
Gill, M. A. K., & Kunwar, Y. (2014). Performance Analysis and Comparison of MANET Routing Protocols under Black Hole Attack. International Journal of Emerging Trends in Science and Technology, 1(07). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/312

References

[1] Aarti & Tyagi S. S., "Study of MANET: Characteristics, Challenges, Application and Security Attacks", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 252-257, May 2013.
[2] Abusalah L., Khokhar A. & Guizani M., "A Survey of Secure Mobile Ad-Hoc Routing Protocols", IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 78–93, 2008.
[3] Badiwal S. & Verma V., "Survey of IDS in MANET against Black Hole Attack", International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 5, pp. 401–406, May

2013.
[4] Chamoli S., Kumar S. & Rana D., " Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Int.J.Computer Technology & Applications,vol. 3, no. 4, pp. 1395–1399, August 2012.
[5] Hilal A. R., Nahas A.E. & Bashandy A., "RT-TORA: A TORA Modification for Real-Time Interactive Applications", IEEE/Canadian Conference on Electrical and Computer Engineering, pp. 1403-1406, May 2008.
[6] Ivan S., Handbook of Wireless Networks and Mobile Computing, Wiley Publications, India, 2002.
[7] Kuppusamy P. & Thirunavukkarasu K., "A Study and Comparison of OLSR, AODV and TORA Routing Protocols in Ad Hoc Networks", in proceedings of IEEE 3rd International Conference on Electronics Computer Technology (ICECT), 2011.
[8] Ramanathan R. & Redi J., "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Communcation Magazine, vol. 40, no.5, pp. 20-22, August 2002.
[9] Royer E. M. & Toh C. K., " A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, April 1999.
[10] Selvavinayaki K., Shankar K. K. S. & Karthikeyan E., "Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs", International Journal of Computer Applications, vol. 7, no. 11, pp. 15–19, October 2010.
[11] Song J., Wong V. W. S. & Leung V. C. M., "Efficient On-Demand Routing for Mobile Ad Hoc Wireless Access Networks", IEEE Journal on Selected Areas in Communications, vol. 22, no. 7, pp. 1374–1383, September 2004.
[12] Ullah I. & Rehman S. U. R., Analysis of Black Hole Attack on MANETS Using Different MANET Routing Protocols, School of Computing/ Blekinge Institute of Technology, June 2010, available: http://www.bth.se/[accessed on18/1/2014,1:30 p.m].