Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(79.45KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing Protocols under Black Hole Attack in MANET
Mary Anita. E.A., V. Vasudevan
Pages - 75 - 84     |    Revised - 30-09-2009     |    Published - 21-10-2009
Published in International Journal of Security (IJS)
Volume - 3   Issue - 4    |    Publication Date - August 2009  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Black Hole attack, MAODV, ODMRP
ABSTRACT
One main challenge in the design of routing protocols is their vulnerability to security attacks. This is mainly due to the wireless and dynamic nature of ad hoc networks. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept thereby exploiting the proper functioning of the protocol. In this paper the performance of multicast on demand routing protocols such as Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol and On Demand Multicast Routing Protocol (ODMRP) are evaluated and analyzed under black hole attack under different scenarios in terms of the performance metrics such as packet delivery ratio and end to end delay. The evaluation is done with network simulator NS-2. Simulation results indicate that both the protocols suffer a significant reduction in packet delivery ratio in the presence of black hole attackers but the impact is more in ODMRP when compared to MAODV.
ABSTRACTING & INDEXING
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
REFERENCES
A. Vasiliou and A. A. Economides, Evaluation of Multicasting Algorithms in Manets, PWASET, vol. 5, April 2005, pp. 94-97.
A.Patcha and A.Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, Radio and Wireless Conference, 2003. RAWCON ’03, Proceedings, pp. 75-78, 10-13 Aug. 2003.
Al-Shurman, M. Yoo, S. Park, Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference, 2004, pp. 96-97.
B. Sun, Y. Guan, J. Chen and U. Pooch, Detecting black hole attack in mobile ad hoc networks, Personal Mobile Communications Conference. 2003.5th European (Conf. Publ. No. 492), pp. 490 – 495, April 2003.
C. Siva Ram Murthy and B. S. Manoj, Ad hoc Wireless Networks- Architectures and Protocols, Pearson Education, 2007
D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.
E. A. Mary Anita and V. Vasudevan, Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack, IJCSIS, Vol. 3, No.1, 2009.
H. Deng, W. Li, and Dharma P. Agrawal, Routing Security in Ad Hoc Networks, IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, October 2002, pp. 70-75.
L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Vol. 13, No. 6, Nov./Dec. 1999, pp. 24–30.
P. Ning and K. Sun, How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad Hoc Routing Protocols, Information Assurance workshop, IEEE Systems, Man and Cybernetics Society, June 2003, pp. 60–67.
P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, Proceedings of Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS’02), San Antonio, Texas, Jan. 2002, pp. 27–31.
S.Lee, M.Gerla and C.Chain, On Demand Multicast Routing protocol-(ODMRP), Proc. of the IEEE Wireless Communication and Networking Conference (WCNC), September 1999
Sanzgiri K., Dahill B., Levine B. N., Shields, C., and Belding-Royer, E. M., Authenticated routing for ad hoc networks, IEEE Journals on Selected Areas in Communications, 23(3), 2005, 598- 610.
MANUSCRIPT AUTHORS
Mr. Mary Anita. E.A.
- India
anitareginald@yahoo.co.in
Dr. V. Vasudevan
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions