##plugins.themes.academic_pro.article.main##

Abstract

Mobile ad hoc network (MANET) is a Wireless, self-configuring network that consists of many movable mobile nodes. These mobile nodes contact with one another with none infrastructure. Because wireless Ad-hoc networks lack associate degree infrastructure, they're exposed to plenty of attacks. One in all these attacks is the Black Hole attack. In Black Hole attack, a malicious node incorrectly advertises shortest path to the destination node and absorbs all information packets in it instead of forwarding information packet.

##plugins.themes.academic_pro.article.details##

Author Biography

Yog Kunwar, Punjabi University Regional Center for IT and Management, Mohali, India

student of computer science and engineering
How to Cite
Kunwar, Y. (2014). Performance analysis and comparison of MANET routing protocols under blackhole attack. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/77

References

References
[1] Aarti & Tyagi S. S., “ Study of MANET: Characteristics, Challenges, Application and Security Attacks”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, May 2013, ISSN: 2277 128X.
[2] Agarwal T. & Jain N., Simulate Your Network with NS2, June 2013, Available: http://tejaswiagarwal.com/research.html.
[3] Al-ani R.,"Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols", International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 1-12, February 2011.
[4] Chamoli S., Kumar S. & Rana D., " Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Int.J.Computer Technology & Applications, vol. 3, no. 4, pp. 1395–1399, August 2012.
[5] Ehsan H. & Khan F.A., "Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs", in proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
[6] Nayyer M. Z., “Analysis of AODV over increased density and mobility in Intelligent Transportation System”, IJCSI International Journal of Computer Science Issues, vol. 9,issue 5, no. 1, 2012.
[7] Singh N., Rajeshwa P., Dua L. & Mathur V., " Network Simulator NS2-2 . 35", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 5, pp. 224–228, May 2012, ISSN: 2277 128X.
[8] Ullah I. & Rehman S. U. R., Analysis of Black Hole Attack on MANETS Using Different MANET Routing Protocols, School of Computing/ Blekinge Institute of Technology, June 2010, Available: http://www.bth.se/fou/cuppsats.nsf/all/448194ba63f382fdc1257751006226b8/$file/Final_Thesis_Report_irua08_resa08%20Analysis%20of%20Blackhole%20Attack.pdf.
[9] Vishesh K. & Verma A., " Formal Verification of Authenticated AODV Protocol using AVISPA", International Journal of Computer Applications , vol. 50, no. 19, pp. 38–43, July 2012.
[10] Yadav H. & Kuma R., "Identification and Removal of Black Hole Attack for Secure Communication in MANETS", International Journal of Computer Science and Telecommunications, vol. 3, no. 9, pp. 60-67, September 2012.