{"title":"MANET中混合路由协议抗网络层攻击的性能评估","authors":"A. Chandra, Sanjeev Thakur","doi":"10.1109/NGCT.2015.7375119","DOIUrl":null,"url":null,"abstract":"This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous network layer attacks. The performance evaluation done has quantitatively represented facts for use of specific routing protocol. For fast and secure transmission of data for network scenario those protocols are used who acquire structural change of network scenario. Mobile nodes are open to security attacks as due to their changing network structure and open communication channel. This paper simulated protocols which are being used recently by mobile devices and based on research of proactive, reactive and hybrid protocols and the behaviour they exhibit in particular node structure against the vulnerabilities which they exhibit.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Performance evaluation of hybrid routing protocols against network layer attacks in MANET\",\"authors\":\"A. Chandra, Sanjeev Thakur\",\"doi\":\"10.1109/NGCT.2015.7375119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous network layer attacks. The performance evaluation done has quantitatively represented facts for use of specific routing protocol. For fast and secure transmission of data for network scenario those protocols are used who acquire structural change of network scenario. Mobile nodes are open to security attacks as due to their changing network structure and open communication channel. This paper simulated protocols which are being used recently by mobile devices and based on research of proactive, reactive and hybrid protocols and the behaviour they exhibit in particular node structure against the vulnerabilities which they exhibit.\",\"PeriodicalId\":216294,\"journal\":{\"name\":\"2015 1st International Conference on Next Generation Computing Technologies (NGCT)\",\"volume\":\"176 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 1st International Conference on Next Generation Computing Technologies (NGCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGCT.2015.7375119\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGCT.2015.7375119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance evaluation of hybrid routing protocols against network layer attacks in MANET
This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous network layer attacks. The performance evaluation done has quantitatively represented facts for use of specific routing protocol. For fast and secure transmission of data for network scenario those protocols are used who acquire structural change of network scenario. Mobile nodes are open to security attacks as due to their changing network structure and open communication channel. This paper simulated protocols which are being used recently by mobile devices and based on research of proactive, reactive and hybrid protocols and the behaviour they exhibit in particular node structure against the vulnerabilities which they exhibit.