##plugins.themes.academic_pro.article.main##
Abstract
Mobile ad hoc network (MANET) is a Wireless, self-configuring network that consists of many movable mobile nodes. These mobile nodes contact with one another with none infrastructure. Because wireless Ad-hoc networks lack associate degree infrastructure, they're exposed to plenty of attacks. One in all these attacks is the Black Hole attack. In Black Hole attack, a malicious node incorrectly advertises shortest path to the destination node and absorbs all information packets in it instead of forwarding information packet.
##plugins.themes.academic_pro.article.details##
How to Cite
Kunwar, Y. (2014). Performance analysis and comparison of MANET routing protocols under blackhole attack. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/77
References
References
[1] Aarti & Tyagi S. S., “ Study of MANET: Characteristics, Challenges, Application and Security Attacksâ€, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, May 2013, ISSN: 2277 128X.
[2] Agarwal T. & Jain N., Simulate Your Network with NS2, June 2013, Available: http://tejaswiagarwal.com/research.html.
[3] Al-ani R.,"Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols", International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 1-12, February 2011.
[4] Chamoli S., Kumar S. & Rana D., " Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Int.J.Computer Technology & Applications, vol. 3, no. 4, pp. 1395–1399, August 2012.
[5] Ehsan H. & Khan F.A., "Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs", in proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
[6] Nayyer M. Z., “Analysis of AODV over increased density and mobility in Intelligent Transportation Systemâ€, IJCSI International Journal of Computer Science Issues, vol. 9,issue 5, no. 1, 2012.
[7] Singh N., Rajeshwa P., Dua L. & Mathur V., " Network Simulator NS2-2 . 35", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 5, pp. 224–228, May 2012, ISSN: 2277 128X.
[8] Ullah I. & Rehman S. U. R., Analysis of Black Hole Attack on MANETS Using Different MANET Routing Protocols, School of Computing/ Blekinge Institute of Technology, June 2010, Available: http://www.bth.se/fou/cuppsats.nsf/all/448194ba63f382fdc1257751006226b8/$file/Final_Thesis_Report_irua08_resa08%20Analysis%20of%20Blackhole%20Attack.pdf.
[9] Vishesh K. & Verma A., " Formal Verification of Authenticated AODV Protocol using AVISPA", International Journal of Computer Applications , vol. 50, no. 19, pp. 38–43, July 2012.
[10] Yadav H. & Kuma R., "Identification and Removal of Black Hole Attack for Secure Communication in MANETS", International Journal of Computer Science and Telecommunications, vol. 3, no. 9, pp. 60-67, September 2012.
[1] Aarti & Tyagi S. S., “ Study of MANET: Characteristics, Challenges, Application and Security Attacksâ€, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, May 2013, ISSN: 2277 128X.
[2] Agarwal T. & Jain N., Simulate Your Network with NS2, June 2013, Available: http://tejaswiagarwal.com/research.html.
[3] Al-ani R.,"Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols", International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 1-12, February 2011.
[4] Chamoli S., Kumar S. & Rana D., " Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Int.J.Computer Technology & Applications, vol. 3, no. 4, pp. 1395–1399, August 2012.
[5] Ehsan H. & Khan F.A., "Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs", in proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
[6] Nayyer M. Z., “Analysis of AODV over increased density and mobility in Intelligent Transportation Systemâ€, IJCSI International Journal of Computer Science Issues, vol. 9,issue 5, no. 1, 2012.
[7] Singh N., Rajeshwa P., Dua L. & Mathur V., " Network Simulator NS2-2 . 35", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 5, pp. 224–228, May 2012, ISSN: 2277 128X.
[8] Ullah I. & Rehman S. U. R., Analysis of Black Hole Attack on MANETS Using Different MANET Routing Protocols, School of Computing/ Blekinge Institute of Technology, June 2010, Available: http://www.bth.se/fou/cuppsats.nsf/all/448194ba63f382fdc1257751006226b8/$file/Final_Thesis_Report_irua08_resa08%20Analysis%20of%20Blackhole%20Attack.pdf.
[9] Vishesh K. & Verma A., " Formal Verification of Authenticated AODV Protocol using AVISPA", International Journal of Computer Applications , vol. 50, no. 19, pp. 38–43, July 2012.
[10] Yadav H. & Kuma R., "Identification and Removal of Black Hole Attack for Secure Communication in MANETS", International Journal of Computer Science and Telecommunications, vol. 3, no. 9, pp. 60-67, September 2012.