Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols

نویسندگان

  • Sonia Padmavati
  • Fan-Hsun Tseng
  • Li-Der Chou
  • Han-Chieh Chao
  • Vimal Bibhu
  • Ajay Rawat
  • Santosh Sharma
  • Arti Sharma
  • Satendra Jain
  • Anuj K. Gupta
  • Anil K. Verma
  • David B. Johnson
  • Rajeev K. Shakya
  • Mahesh K. Marina
چکیده

Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how much is the impact of attack on these three protocols. The main parameters considered are throughput, end-to-end delay and scalability. These parameters are compared for each routing protocol both using with black hole attack and without black hole attack. Simulation shows that DSR has high performance in terms of throughput, delay and scalability. The simulation setup comprises of 20 Vehicular nodes moving with constant speed of 10 meter per second. Simulation is carried using Network Simulator (NS2) 2. 35.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols

Wireless networks are gaining popularity to its peak in the present era and therefore appealing the users for wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network....

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack

A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has bee...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016