Home   >   CSC-OpenAccess Library   >    Manuscript Information
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing Protocols under Black Hole Attack in MANET
Mary Anita. E.A., V. Vasudevan
Pages - 75 - 84     |    Revised - 30-09-2009     |    Published - 21-10-2009
Volume - 3   Issue - 4    |    Publication Date - August 2009  Table of Contents
MORE INFORMATION
KEYWORDS
Black Hole attack, MAODV, ODMRP
ABSTRACT
One main challenge in the design of routing protocols is their vulnerability to security attacks. This is mainly due to the wireless and dynamic nature of ad hoc networks. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept thereby exploiting the proper functioning of the protocol. In this paper the performance of multicast on demand routing protocols such as Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol and On Demand Multicast Routing Protocol (ODMRP) are evaluated and analyzed under black hole attack under different scenarios in terms of the performance metrics such as packet delivery ratio and end to end delay. The evaluation is done with network simulator NS-2. Simulation results indicate that both the protocols suffer a significant reduction in packet delivery ratio in the presence of black hole attackers but the impact is more in ODMRP when compared to MAODV.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
A. Vasiliou and A. A. Economides, Evaluation of Multicasting Algorithms in Manets, PWASET, vol. 5, April 2005, pp. 94-97.
A.Patcha and A.Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, Radio and Wireless Conference, 2003. RAWCON ’03, Proceedings, pp. 75-78, 10-13 Aug. 2003.
Al-Shurman, M. Yoo, S. Park, Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference, 2004, pp. 96-97.
B. Sun, Y. Guan, J. Chen and U. Pooch, Detecting black hole attack in mobile ad hoc networks, Personal Mobile Communications Conference. 2003.5th European (Conf. Publ. No. 492), pp. 490 – 495, April 2003.
C. Siva Ram Murthy and B. S. Manoj, Ad hoc Wireless Networks- Architectures and Protocols, Pearson Education, 2007
D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.
E. A. Mary Anita and V. Vasudevan, Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack, IJCSIS, Vol. 3, No.1, 2009.
H. Deng, W. Li, and Dharma P. Agrawal, Routing Security in Ad Hoc Networks, IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, October 2002, pp. 70-75.
L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Vol. 13, No. 6, Nov./Dec. 1999, pp. 24–30.
P. Ning and K. Sun, How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad Hoc Routing Protocols, Information Assurance workshop, IEEE Systems, Man and Cybernetics Society, June 2003, pp. 60–67.
P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, Proceedings of Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS’02), San Antonio, Texas, Jan. 2002, pp. 27–31.
S.Lee, M.Gerla and C.Chain, On Demand Multicast Routing protocol-(ODMRP), Proc. of the IEEE Wireless Communication and Networking Conference (WCNC), September 1999
Sanzgiri K., Dahill B., Levine B. N., Shields, C., and Belding-Royer, E. M., Authenticated routing for ad hoc networks, IEEE Journals on Selected Areas in Communications, 23(3), 2005, 598- 610.
Mr. Mary Anita. E.A.
- India
anitareginald@yahoo.co.in
Dr. V. Vasudevan
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS