skip to main content
10.1145/3377049.3377119acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
research-article

Performance Analysis of AODV, OLSR, DSDV Routing Protocols in MANET Under Black Hole Attack

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

Presently Mobile ad hoc network (MANET) is going more exoteric for its wireless structure, and its demand is increasing day by day. MANET is basically used in such type of application where the infrastructure of a cable connection is limited and restricted. There are different types of routing protocols are used in MANET for sending and receiving packets among the nodes. Because of its self-configuration nature, malicious nodes may join the network to breach the security. One of the common threats is Black Hole attack.

In this paper, three major routing protocols, Destination-Demand Distance Vector (AODV), Sequenced Distance Vector (DSDV) and Optimized Link State Routing protocols (OLSR), are analyzed with and without Black hole attack, to check the performance by using different parameter matrices, such as - throughput, delay, packet drop ratio by using Network Simulator (NS2).

References

  1. GeeksforGeeks", GeeksforGeeks, 2019. [Online]. Available: https://www.geeksforgeeks.org/manet-mobile-ad-hoc-network/.Google ScholarGoogle Scholar
  2. Luo, H. (2012). Best effort QoS support routing in mobile ad hoc networks. The University of Edinburgh, p.19.Google ScholarGoogle Scholar
  3. Praveen K S, Gururaj H L, and Ramesh B, "Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols," International Conference on Computational Modeling and Security (CMS 2016), 2016.Google ScholarGoogle Scholar
  4. Oussama Sbai, Mohamed Elboukhari, "Simulation of MANETs single and multiple black hole attack with NS-3" 978-1-5386-4385-3/18/$31.00 ©2018 IEEE.Google ScholarGoogle Scholar
  5. L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks, Princeton Univ. Press, 1962. Rashid Hafeez Khokhar, Md Asri Ngadi & Satria MandalaGoogle ScholarGoogle ScholarCross RefCross Ref
  6. Irshad Ullah and Shahzad Anwar, "Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols," IJCSI Int. J. Comput. Sci. Issues, vol. 10, no. 1, May 2013.Google ScholarGoogle Scholar
  7. Fan-Hsun Tseng, Li-Der Chou, and Han-Chieh Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Tseng Al Hum.-Centric Comput. Inf. Sci., 2011.Google ScholarGoogle Scholar
  8. D. C. Sanjay Singh, "AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack," Int. J. Comput. Appl. 0975 -- 8887, vol. 172, no. 9, Aug. 2017.Google ScholarGoogle Scholar
  9. A. A. Chavana, Prof. D. S. Kuruleb, Prof. P. U. Derec, "Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack," 7th International Conference on Communication, Computing and Virtualization 2016.Google ScholarGoogle Scholar
  10. Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif, "Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3" 978-1-5386-7330-0/18/$31.00 ©2018 IEEEGoogle ScholarGoogle Scholar
  11. Neeraj Arora, Dr. N. C. Barwar, "Performance Analysis of DSDV, AODV and ZRP under Blackhole attack," International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 3 Issue 4, April-2014.Google ScholarGoogle Scholar
  12. K. Praveen, H. Gururaj and B. Ramesh, "Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols", Procedia Computer Science, vol. 85, pp. 325--330, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  13. https://www.linuxjournal.com/article/5929Google ScholarGoogle Scholar
  14. C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Comp. Com- mun. Rev., Oct. 1994, pp. 234--44.Google ScholarGoogle Scholar

Index Terms

  1. Performance Analysis of AODV, OLSR, DSDV Routing Protocols in MANET Under Black Hole Attack

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCA 2020: Proceedings of the International Conference on Computing Advancements
      January 2020
      517 pages
      ISBN:9781450377782
      DOI:10.1145/3377049

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 March 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader