##plugins.themes.academic_pro.article.main##

Abstract

Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The clients of mobile ad hoc networks are so susceptible to compromise. The nets are specially vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this report, we investigated the effects of location attacks in Network Simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different Location frequency and different routine of attack modes. Simulation results indicate that with the increase the location, frequency and the number of attack modes, network performance drops. Meanwhile the packet delay firstly increases and then pass up to a value of constancy in the terminal. Simulate in NS-2 Existing statements are primarily focused on finding the malicious node, but they are hardware specific like directional antennas and synchronized clocks. Only the suggested algorithm is both software and hardware specific. An linux based RToS is included to create the ad hoc network a real time application.

 

##plugins.themes.academic_pro.article.details##

Author Biographies

M.Rajaram Kannammal*, Annauniversity chennai

*PARK college of Engineering & Technology, Kaniyur as Assistant Professor in Electronics & Communication department.

Dr. V. Sumathy**

**Govt college of Technology, Coimbatore as Associate Professor in Electronics & Communication department.

V. Ramasamy***

***PARK college of Engineering & Technology, Kaniyur as Assistant Professor in Computer Science& Engineering department
How to Cite
Kannammal*, M., Sumathy**, D. V., & Ramasamy***, V. (2014). Experimental Evaluation of Location attacks in Mobile ad hoc Networks Implementation with Linux based Real time Systems. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/68

References

1. S. Corson, J. Macker ‘Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations” RFC 501 January 1999

2. Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, Resisting Location Attacks in ad hoc Networks, International Conference on Information Technology: Coding and Computing (ITCC2005), IEEEPress, Las Vegas, USA, April 4-6, 2005.

3. S. Desilva and R. V. Boppana, Mitigating malicious control packet floods in ad hoc networks, in Proceedings of 2007 IEEE Wireless Communications and Networking Conference(WCNC2005), March 2007

4. Yinghua Guo, Sylvie Perreau, Trace Location Attack in Mobile Ad Hoc Networks, in Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP 2007), Dec. 2009

5. Yinghua Guo, Gordon, S., Perreau, S., A Flow Based Detection Mechanism against Location Attacks in Mobile Ad Hoc Networks, in Proceedings of 2010 IEEE Wireless Communications and Networking Conference(WCNC2007), March 2010

6. David B. Johnson, David A. Maltz, Yih-Chun Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), Internet-Draft, draft-ietf-manet-dsr-09.txt, 15 April 2003, http:/ /www. ietf.org/internetdrafts/ draft-ietf-manet-dsr-09.txt

7. xes.2012/ rejaer