H. Moudni, M. Er-rouidi, H. Mouncif, Benachir El Hadadi
{"title":"针对移动Ad-Hoc网络AODV路由协议的攻击","authors":"H. Moudni, M. Er-rouidi, H. Mouncif, Benachir El Hadadi","doi":"10.1109/CGIV.2016.81","DOIUrl":null,"url":null,"abstract":"A Mobile Ad hoc NETwork (MANET) is much more vulnerable to attack than a wired network due to the dynamic changes of the network topology, high mobility, limited physical security and lack of centralized administration. Unfortunately, the routing protocols are designed based on the assumption that all nodes trust each other and cooperate without maliciously disrupting the operation of routing. This paper analyzes the impact of security attacks on the performance of the AODV routing protocol. Simulations are setup in the NS-2 network simulator and the performance of the AODV routing protocol is discussed under black hole, flooding and rushing attacks. This analysis is provided in terms of performance metrics, such as a packet delivery ratio, the average end-to-end delay and normalized routing load.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks\",\"authors\":\"H. Moudni, M. Er-rouidi, H. Mouncif, Benachir El Hadadi\",\"doi\":\"10.1109/CGIV.2016.81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A Mobile Ad hoc NETwork (MANET) is much more vulnerable to attack than a wired network due to the dynamic changes of the network topology, high mobility, limited physical security and lack of centralized administration. Unfortunately, the routing protocols are designed based on the assumption that all nodes trust each other and cooperate without maliciously disrupting the operation of routing. This paper analyzes the impact of security attacks on the performance of the AODV routing protocol. Simulations are setup in the NS-2 network simulator and the performance of the AODV routing protocol is discussed under black hole, flooding and rushing attacks. This analysis is provided in terms of performance metrics, such as a packet delivery ratio, the average end-to-end delay and normalized routing load.\",\"PeriodicalId\":351561,\"journal\":{\"name\":\"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)\",\"volume\":\"161 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CGIV.2016.81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CGIV.2016.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
A Mobile Ad hoc NETwork (MANET) is much more vulnerable to attack than a wired network due to the dynamic changes of the network topology, high mobility, limited physical security and lack of centralized administration. Unfortunately, the routing protocols are designed based on the assumption that all nodes trust each other and cooperate without maliciously disrupting the operation of routing. This paper analyzes the impact of security attacks on the performance of the AODV routing protocol. Simulations are setup in the NS-2 network simulator and the performance of the AODV routing protocol is discussed under black hole, flooding and rushing attacks. This analysis is provided in terms of performance metrics, such as a packet delivery ratio, the average end-to-end delay and normalized routing load.