International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 2- Issue 7, July 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Simulation And Analysis Of Performance Parameters For Black Hole And Flooding Attack In MANET Using AODV Protocol

[Full Text]



Swati Jain, Dr Naveen Hemrajani, Dr. Sumit Srivastava



Index Terms: MANET, Wireless Networks, Ad hoc Networking, Routing overhead, Packet Delivery Rate.



Abstract: As the increase of wireless networks, use of mobile phones, smart devices are gaining popularity so the adhoc network is also a uprising field. Each device in a MANET is free to move independently in any direction, linking to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router.. This paper describes the features, application, flooding attack and black hole attack in the MANET implemented on AODV protocol. The simulation work is carried out in Network Simulator (NS2.34). The performance analysis is done for 3, 5 and 10 nodes. The average delay, routing overhead, packet drop rate and packet delivery rate are calculated. By the simulation it has been evaluated that in flooding attack the routing overhead is more as compared to the black hole attack. A comparative study is also done on these parameters for all three scenarios.



[1]. Fan-Hsun Tseng1, Li-Der Chou1 and Han-Chieh Chao ; A survey of black hole attacks in wireless mobile ad hoc networks ; Human-centric Computing and Information Sciences 2011

[2]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester; An Overview of Mobile Ad Hoc Networks: Applications and Challenges

[3]. Siddhu Warrier; report on Characterisation and Applications of MANET Routing Algorithms in Wireless Sensor Networks

[4]. Sem_H Dokurer “Simulation Of Black Hole Attack In Wireless Ad-Hoc Networks” [5] http://www.isi.edu/nsnam/vint

[5]. Teerawat Issariyakul ,Ekram Hossain “Introduction to Network Simulator NS2”

[6]. Mangesh Ghonge, Prof. S. U. Nimbhorkar“Simulation of AODV under Blackhole Attack in MANET”

[7]. http://www.ns2ultimate.com