Kuldeep Singh, Amanat Boparai, Vrinda Handa, S. Rani
{"title":"MANET中安全攻击性能分析及路由协议改进","authors":"Kuldeep Singh, Amanat Boparai, Vrinda Handa, S. Rani","doi":"10.1109/CSCESM.2015.7331887","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc networks unlike the normal wired networks do not have an access point and are set up on a temporary or urgent basis to complete a particular task. Due to their inherent impromptu nature, they are set up in insecure environments, which makes them susceptible to attacks. Routing protocols which form the backbone of any network are a common target of these nodes. Two such protocols i.e Ad hoc On-Demand Distance Vector Routing Protocol (AODV) and Ad hoc On-Demand Multipath Distance Vector Protocol (AOMDV) are analysed in this paper. The attacks implemented are Blackhole, Grayhole, Flooding and Rushing attack. Their impact is studied on the protocols using parameters like Throughput, Packet Delivery Ratio, Normalized Routing Overhead, End to end delay, Packet Loss and Mean Hop Count.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Performance analysis of security attacks and improvements of routing protocols in MANET\",\"authors\":\"Kuldeep Singh, Amanat Boparai, Vrinda Handa, S. Rani\",\"doi\":\"10.1109/CSCESM.2015.7331887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad hoc networks unlike the normal wired networks do not have an access point and are set up on a temporary or urgent basis to complete a particular task. Due to their inherent impromptu nature, they are set up in insecure environments, which makes them susceptible to attacks. Routing protocols which form the backbone of any network are a common target of these nodes. Two such protocols i.e Ad hoc On-Demand Distance Vector Routing Protocol (AODV) and Ad hoc On-Demand Multipath Distance Vector Protocol (AOMDV) are analysed in this paper. The attacks implemented are Blackhole, Grayhole, Flooding and Rushing attack. Their impact is studied on the protocols using parameters like Throughput, Packet Delivery Ratio, Normalized Routing Overhead, End to end delay, Packet Loss and Mean Hop Count.\",\"PeriodicalId\":232149,\"journal\":{\"name\":\"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCESM.2015.7331887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCESM.2015.7331887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance analysis of security attacks and improvements of routing protocols in MANET
Mobile Ad hoc networks unlike the normal wired networks do not have an access point and are set up on a temporary or urgent basis to complete a particular task. Due to their inherent impromptu nature, they are set up in insecure environments, which makes them susceptible to attacks. Routing protocols which form the backbone of any network are a common target of these nodes. Two such protocols i.e Ad hoc On-Demand Distance Vector Routing Protocol (AODV) and Ad hoc On-Demand Multipath Distance Vector Protocol (AOMDV) are analysed in this paper. The attacks implemented are Blackhole, Grayhole, Flooding and Rushing attack. Their impact is studied on the protocols using parameters like Throughput, Packet Delivery Ratio, Normalized Routing Overhead, End to end delay, Packet Loss and Mean Hop Count.