Performance Evaluation of A Reverse Aodv And Aodv Routing Protocol Under Jellyfish Attacks in Mobile Ad Hoc Network
Keywords:
RAODV, AODV, Jellyfish Attack, manet, protocolAbstract
Mobile Ad hoc network (MANET) is an example of mobile wireless network characterized by dynamic topology, self-organization, auto-configuration, lack of infrastructure and decentralize administrator that made it more useful in military battlefield, smart building and emergency rescue. The nodes vulnerability in MANET security becomes the center of creative research efforts. Many security schemes were proposed, rather than trying to encompass the entire field of MANET security. In this paper the same security issue was addressed by evaluating the performance of two reactive protocols Ad-hoc On-demand Distance Vector (AODV) protocol and Reverse Ad-hoc On-demand Distance Vector under jellyfish attacks. This research adopts the use of Network simulator 2.35 to test the two reactive protocols vulnerability in the presence of jellyfish attacks. The results of the performance metrics shown that the two protocols average throughputs were affected in the presence of the attacks and increase tremendously as the number of node increases, while packet delivery ratio decrease with increase in number of malicious nodes. The jellyfish attacks have great effect in number of packet drop in the protocols. Less packet drop in the presence of single jellyfish but greatly increase as more threats were introduced and maintain the increase rate as the number of attacks increase. The experimental results for all scenarios shown that the higher the jellyfish attacks on AODV and RAODV the lower the performance of the two protocols.
References
Chetana K. (2013) “Black Hole Node Detection in AODV†International Journal of Computational Engineering Research. Vol, 03, Issue, 6, pg 79.
Esmaili et al (2011) “Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulatorâ€. Computer Science and Information Technology Journal Vol.1, No.2, pg49-52.
Hetal P., Minubhai. B. (2010) "Survey: Impact of Jellyfish On Wireless Ad-Hoc Network", in proceeding of INJCR'10, Volume.10, issue.5, no.2 pg. 5-9.
Kamanshis B. and Liakat A. (2007) “Security Threats in Mobile Ad Hoc Networkâ€. Interaction and System Design, School of Engineering, Blekinge Institute of Technology.
Pratibha Kaswan and Deepika Gupta (2013) “Impact Analysis of Wormhole and Black hole attacks over Mobile Ad Hoc Networksâ€. Computer Science and Information Technology Journal. Volume: 1 Issue: 12, pg
Rehman, I. (2010) “Analysis of Black Hole Attack on MANETs, Using Different MANET Routing Protocolsâ€, School of Computing, Bleking Institute of Technology.
Sanabani M. et al (2014) “A Reverse and Enhanced AODV routing protocol for MANETSâ€. ARPN Journal of Engineering and Applied Sciences. Vol 9, No 2, pg 11.
Tanwar S., Prema K.V. (2013) “Threats & Security Issues in Ad hoc network: A Survey Reportâ€. International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue 6, pg 1-6.
Published
Issue
Section
License
Copyright
With the submission of a manuscript, the corresponding author confirms that the manuscript is not under consideration by another journal. With the acceptance of a manuscript, the Journal reserves the exclusive right of publication and dissemination of the information contained in the article. The veracity of the paper and all the claims therein is solely the opinion of the authors not the journal.