This document analyzes the performance of three routing protocols - AODV, OLSR, and ZRP - under a blackhole security attack in a mobile ad hoc network (MANET). It defines the blackhole attack and describes how each protocol functions. Simulations are run in OPNET with 40 nodes using various performance metrics like network load, end-to-end delay, and packet delivery ratio. The results show that while all protocols are negatively impacted by blackhole nodes, AODV maintains the most consistent performance under attack compared to OLSR and ZRP.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc
network is a temporary network with no network infrastructure. The nodes communicate with each
other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes
find a path to the destination node using routing protocols. Due to the security vulnerabilities of
the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.
One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET.
A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This
paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which
combines the advantages of both reactive and proactive routing Protocol to detect the black hole
node. It also shows performance of ZRP.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc
network is a temporary network with no network infrastructure. The nodes communicate with each
other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes
find a path to the destination node using routing protocols. Due to the security vulnerabilities of
the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.
One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET.
A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This
paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which
combines the advantages of both reactive and proactive routing Protocol to detect the black hole
node. It also shows performance of ZRP.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
M017248993
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. IV (Mar – Apr. 2015), PP 89-93
www.iosrjournals.org
DOI: 10.9790/0661-17248993 www.iosrjournals.org 89 | Page
Performance measurement of MANET routing protocols under
Blackhole security attack
Md. Humayun Rashid1
, Md. Rashedul Islam2
1
Lecturer, Department of Computer Science &Eng, IUBAT-International University of Business Agriculture &
Technology, Bangladesh.
2
Lecturer, Department of Computer Science &Eng, IUBAT-International University of Business Agriculture &
Technology, Bangladesh.
Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other via
an access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where the
network is formed out of randomly moving nodes. The nodes in a Mobile ad hoc network work as a host as well
as a router. Since there is no centralized management and the network is formed only by the participating
node’s cooperation, Mobile ad hoc network (MANET) faces numerous security challenges. Out of many security
attacks Blackhole attack is one of the severe one. A Blackhole attack is a Denial-of-service attack. In a request
response based route discovery method, a Blackhole node advertises itself as a node that has the shortest route
to the destination. It can drop all the packets that it is supposed to relay to the destination. In this paper, we
evaluate the performance of one reactive protocol (AODV), one proactive protocol (OLSR) and a hybrid
protocol (ZRP). In order to find out the intensity of Blackhole attack on MANET, we take these three routing
protocols and check the performance of these protocols with and without attack. We compare the resultto see
which class of protocol is more challenged by the attack. We used OPNET 15.0 simulator to measure the
performance of these routing protocols in different performance metrics. After the simulation was run, we found
that the performance of these protocols get worse under Blackhole attack and the performance of AODV
outweigh both OLSR and ZRP.
Keywords:MANET,AODV,OLSR,ZRP,BLACKHOLE,Security
I. Introduction
Mobile Ad-Hoc network is an autonomous system where nodes/stations are connected with each other
through wireless links [2]. Nodes are free to join or leave the network at any time. Main reasons behind the
popularity of MANET are infrastructure less design approach, active nature and effortlessness in deployment.
Analyzing, reading and researching on routing in networks are the key investigation fields. Routing protocols of
MANET is deriving the attraction of researchers because of their challenging behavior in terms of security and
ability of performing smart responsibilities.
Protocols in MANET are classified into i. Reactive ii. Proactive iii.Hybrid [2]. Reactive protocols do
not commence route discovery until they are requested i.e. AODV [1].Proactive protocols works other way of
reactive protocol and it constantly maintain the updated topology of the network i.e. OLSR. On the other hand,
the hybrid routing protocols combine the advantages of both reactive routing protocols and the proactive routing
protocols i.e. ZRP. In this paper we are going to work with one reactive protocol (AODV) one proactive
protocol (OLSR) and one hybrid protocol (ZRP).
1.1 Ad Hoc On-Demand Vector Routing (AODV)
This protocol is a reactive routing protocol for ad hoc and mobile networks that maintain routes only
between nodes which need to communicate [3]. It allows its nodes to find routes rapidly for the entire
unidentified and newer ends which are not in the existing communication or navigation of the packets. This
entire operation mechanism is loop free. Nodes are allowed to response in other links breakages. Whenever the
link broken is reported the AODV cause the affected set of the nodes to be notified so that they avoid the node
which is not in the communication cycle [4]. In order to detect and manage neighboring nodes a simple hello
message [4] is used. Whenever there is no “fresh enough” route is detected it broadcast a route request (RREQ)
[3] to its neighbors. When neighboring node get RREQ then they reply through route reply (RREP) [3]. RREQ
and RREP help AODV to establish bidirectional route and the shortest path between the nodes are updated. The
AODV routing protocol builds on the DSDV algorithm [3] which minimizes the number of required broadcast
by creating routed on an on demand basis.
2. Performance measurement of MANET routing protocols under Blackhole security attack
DOI: 10.9790/0661-17248993 www.iosrjournals.org 90 | Page
1.2 Optimized Link State Routing (OLSR) Protocol
Optimized link state routing protocol [10] is a proactive routing protocol where the routes are
immediately available when needed. In OLSR any changed occurred in topology than it causes topological
information flooding to all available hosts in the network because it is an optimization version of pure link state
protocol. By reducing the maximum time interval for periodic message transmission OLSR may optimize the
reactivity to topological changes. As OLSR maintains routes to all destinations to network, traffic patterns are
benefited by the protocol where a large subset of nodes are communicating with another large subset of nodes
and where source and destination changes over time. The application does not permit delays for a long time for
in transmission of data packet is well suited for OLSR. A dense network is the perfect environment for OLSR
because on dense network most communication determined between the large numbers of nodes.
1.3 Zone routing protocol (ZRP)
The Zone routing protocol is a hybrid protocol that is composed of the nature of the reactive protocol
that seeks the routes towards the destination out of the zone [11] and of the proactive link state routing protocol
that works within the zone and manages the entire route in it. The hybrid nature of this protocol allows it to use
both reactive protocols and proactive protocols for sending information throughout the network.
Packet destined for a node in the same zone as the originator, are sent with the help of the proactive
protocol where an existing routing table is used for immediate packet delivery. Whereas, a reactive protocol is
used to confirm if a destination is outside the originating zone. The reactive protocol does it by checking every
successive zone in the route in order to see whether the destination node is outside or inside the zone. Is this way
the processing overhead is reduced for those routes. Also, the control overhead is reduced for longer routes
which would be an issues if the proactive routing protocols were used, while the routing delay is eliminated with
in a zone that would arise from the route discover process of the reactive routing protocols.
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or
gain unauthorized access to or make unauthorized use of an asset. Different types of attacks effects
tremendously on their performance. Basically attack in MANET is classified [5] as
I. Active attack
II. Passive attack
In this paper we are going to discuss about the effect of one active attack (Black hole attack) over AODV,
OLSR and ZRP protocols.
1.4 Black Hole Attack
Black hole attack is a denial of service attack [8] in which malicious node sends fake information by
claiming that it has a fresh or shortest route to destination route. Result of selecting this path for sending data
packets by the source node is data misuse or discarded. One RREQ message is broadcasted by the source node,
the black hole node immediately response with RREP message and source assume that the destination is behind
the black hole and avoids other RREP packets coming from other trusted nodes [7]. By assigning a high
sequence number malicious node performs this task [6]. Now attacker will drop the received message and will
not broadcast according to protocols need. Therefore the quantity of information on other nodes is reduced. This
malicious node is called black hole node [9].
II. Methods:
The aim of this project is to analyze the performance comparison of the chosenrouting protocols under
Blackhole attack and to see which protocol is more affected by the attack and results in less data delivery when
there’s a variation in node mobility speed. Also, we needed to see the effect of the presence of the malicious
node on the network and how it disrupts the normal operation of the network. To achieve the desired goals, the
basic method was to create three scenarios with normal operational parameters for the reactive, proactive and
hybrid routing protocols. And then, each of the scenarios was duplicated and few malicious nodes were added in
the duplicated scenarios. The whole idea was to check the performance of the reactive protocol (AODV), the
pro-active routing protocol (OLSR) and the hybrid protocol (ZRP).
2.1 Performance Metrics
To evaluate the performance of the Routing protocols, the following quantitative metrics were chosen.
2.1.1 Network load: It is the total amount of traffic received by the network, from the MAC layer, which is
queued for transmission. It represents the data traffic in bits/sec.
3. Performance measurement of MANET routing protocols under Blackhole security attack
DOI: 10.9790/0661-17248993 www.iosrjournals.org 91 | Page
2.1.2 End to End delay: End to end delay is the time that a packet takes to reach the destination from the
sender. Delay occurs from the source throughout the intermediate nodes towards the destination. For example,
route discovery process, queuing at the interfaces, buffering, retransmission etc.
2.1.3 Packet delivery ratio: It is the ratio of the successful data received at the destination over the number of
data packets generated. It measures the reliability of the protocol in action.
III. Simulation environment setup and Study
In this section, the total description of how the simulation was carried out and how the different
scenarios were created with their associated parameters were given. We used OPNET network simulator 15.0 to
carry out our tasks. Simulation was run for 1000 seconds of simulation time. The nodes were made to form Ad
hoc networks in a 1000 × 1000 m rectangular area. Six scenarios of the same measurement were created with 40
mobile nodes in each of them. In order to find out the effect of mobility on the protocols, each node’s speed was
varied using seven values of 10, 20, 30, 40, 50, 60, 70m/s. The node mobility speed depends on the increase in
the speed value. Each node was assigned with a pause time of 1 second. We usedFTP application for heavy file
transfer in the network. At first, three scenarios were created to see the normal operation of each protocol.
Then, each of the three scenarios was duplicated and malicious nodes were injected with the properties of a
Blackhole node in each of the duplicated scenarios. In this simulation, the Blackhole nodes generate a number
between 15 and 150 randomly. The Blackhole node adds the generated random value in to the sequence number
of RREQ and then it also generates the sequence number in RREP.
Table-1: The different parameters used in the network simulation
IV. Result analysis
In this section the results based on the simulations have been shown. The results are given in the following
figures were evaluated using OPNET.
Network load:
Fig-2: Network load of AODV, OLSR & ZRP (without attack). Fig-3: Network load of AODV, OLSR & ZRP (with attack).
Model family MANET
Routing protocols AODV, OLSR,ZRP
Network scale Campus
Technology WLAN(Ad HOC)
Operational mode 802.11b
Simulation area 1000 × 1000 m
Simulation time 1000 seconds
Number of scenarios 6
Number of nodes in each scenario 40
Attacker nodes 10
Node speed/mobility 10-70 m/s
Pause time 1 sec
Trajectory Vector
Packet inter arrival time Exponential(1)
Packet size(bits) Exponential (1024)
Data rate 15 Mbps
Default transmitting power .005 watts
4. Performance measurement of MANET routing protocols under Blackhole security attack
DOI: 10.9790/0661-17248993 www.iosrjournals.org 92 | Page
End to End delay:
Fig-3: Delay with varied mobility without attack. Fig-4: Delay with varied mobility with attack.
Packet delivery ratio:
Fig-5: Packet delivery ratio without attack. Fig-6: Packet delivery ratio with attack.
4.1 Network load:
As can be seen from the figures above, without the Blackhole attack in the network, OLSR outperforms
both ZRP and AODV in terms of network load. AODV shows the least network load in the network. Since the
mobile network influences change in link state and results in broadcasting of Topology control (TC) messages
and Hello messages for finding neighboring hosts and link status, OLSR has highest load comparing to the other
two protocols. Also OLSR’s table driven approach also puts pressure on the network load as its frequent update
and maintenance of the network increases overhead. While comparing to the other two protocols, AODV shows
minimum load.
The performance of all three protocols in terms of network load gets affected by the presence of the
malicious nodes in the network. OLSR shows a little drop in network load that is because some of the traffic it
sends and receives for maintenance of the network is diverted to the Blackholenodes.The order of the network
load remains the same with OLSR having the maximum network load and ZRP having more network load than
AODV. Even though both AODV and ZRP have less network load, their network load tends to drop with time.
4.2 Delay:
From the above figures for End-to-End delay, it is clear that without the Blackhole nodes in the
network, delay of both AODV and OLSR is around only 0.1 millisecond and 0.25 milliseconds respectively,
since, AODV and OLSR use HELLO messages to determine any link outages. AODV also takes less connection
setup time comparing to the other protocols. Whereas ZRP actually shows more delay variation than AODV and
OLSR as the node mobility increases.
In the presence of Blackhole nodes in the network,all the protocols exhibit more delay. The AODV
protocol starts its operation at a fluctuating 2ms delay whereas the OLSR protocol reaches more than 5ms as the
node mobility increases. The ZRP protocol takes the most delay at approximately 50ms.
4.3 PDR:
As seen from the above results, without the Blackhole attack taking place in the scenario, AODV and
OLSR maintain a packet delivery rate that is almost 100% even thought there was an increased mobility. With a
packet delivery rate of a staggering 98% packet delivery rate ZRP comes behind. This is because in order to
maintain neighbor connectivity both AODV and OLSR use HELLO message and to maintain links. Therefore
they have such impressive results.
5. Performance measurement of MANET routing protocols under Blackhole security attack
DOI: 10.9790/0661-17248993 www.iosrjournals.org 93 | Page
On the other hand the packet delivery ratio for all the three protocols drops in presence of the malicious
nodes in the network. The packet delivery ratio drops, as some traffic is misled towards the Blackhole nodes. It
is also noticed that even though AODV and OLSR had almost the same performance without the presence of the
malicious nodes in the network, but with the malicious nodes disrupting, AODV does better at delivering packet
comparing to OLSRwhereas, packet delivery ratio of ZRP increases slightly as the node mobility increases.
In terms of the performance of individual routing protocols it can be said that in terms of Network load,
End-to-End delay and Packet delivery ratio, AODV is a better protocol because of its nearly consistent
performance under attack.
V. Conclusion
To get a more accurate result, the same performance comparison can be done using different node
density. Different performance metrics can be chosen to identify the better performing protocol under attack.
The simulation study on more pro-active, reactive and hybrid protocols can be done for a better comparison. The
other attack such as Wormhole attack, jellyfish attack, routing table overflow attack can be studied to see the
effects of them routing protocols and to find out which protocol is more harmful than the other. In future we
wish to come up with algorithms for all three protocols that will ensure performance consistency under attack.
References
[1]. Esmaili H.A., KhalijiShoja M. R, Gharaee “Performance Analysis of AODV under Black Hole attack through use of OPNET
simulator”, World of Computer Science and Information Technology Journal (WCSIT), ,ISSN: 2221-0741,Vol. 1, No. 2, 49-52,
2011
[2]. Ullah I.,Rehman S. “Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols”, Master Thesis,
Electrical Engineering, Thesis no: MEE 10:62,June, 2010
[3]. Das R. Dr. Purkayastha B.S., Dr. Das P. “Security Measures for Black Hole Attack in MANET: An Approach” International Journal
of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4 Apr 2011
[4]. Chowdhury A.,Kunal “Performance Evaluation of AODV under Blackhole Attack”, International Journal of Emerging Technology
and Advanced Engineering (IJETAE), ISSN 2250-2459,Volume 2, Issue 5, May 2012
[5]. Singh H., Singh G., Singh M., ”Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack” ,
International Journal of Computer Applications (0975 – 8887), Volume 42– No.18, March 2012
[6]. Roopak M, Dr. Reddy B., “Performance Analysis of Aodv Protocol under Black Hole Attack”, International Journal of Scientific &
Engineering Research, ISSN 2229-5518 Volume 2, Issue 8,August-2011
[7]. Dokurer, S.; Ert, Y.M.; and Acar, C.E. (2007). “Performance analysis of adhoc networks under blackhole attacks”. SoutheastCon,
2007, Proceedings IEEE, 148 – 153.
[8]. Kaur H., Bala M., Sahni V., ” Study of Blackhole Attack Using Different Routing Protocols in MANET” , International Journal of
Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 7, July 2013
[9]. Bhole A. T., Patil P. N., ”Study Of Blackhole Attack In MANET”, International Journal of Engineering and Innovative Technology
(IJEIT), ISSN: 2277-3754,Volume 2, Issue 4, October 2012
[10]. Ade S. A., Tijare P. A.,” Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc
Networks”, International Journal of Information Technology and Knowledge Management,July-December 2010, Volume 2, No. 2,
pp. 545-548
[11]. J Hsu, S Bhatia, M Takai, R Bagrodia “Performance of mobile ad hoc networking routing protocols in realistic scenarios, Military
Communications Conference”. MILCOM '03. IEEE (Volume:2 ), 2003