S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan
{"title":"基于SVM的AODV和SAODV路由协议抗黑洞攻击性能分析","authors":"S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan","doi":"10.1109/iciptm54933.2022.9754166","DOIUrl":null,"url":null,"abstract":"This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector (AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets transfer and communication among the nodes using Support Vector Machine (SVM) technique. The comparative analysis of SAODV and AODV protocol are presented against blackhole attack for the parameters energy consumption, throughput, packet delivery ratio and end-to-end delay in ad hoc networks. A methodology is designed which lays rules based on learnings from the computations and estimations made at the time of packet transfer. It has been found that the proposed methodology gives promising results than the one which lays networking rules at the time of setting up the network.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"153 1","pages":"455-459"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Performance Analysis of AODV and SAODV Routing Protocol using SVM against Black Hole Attack\",\"authors\":\"S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan\",\"doi\":\"10.1109/iciptm54933.2022.9754166\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector (AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets transfer and communication among the nodes using Support Vector Machine (SVM) technique. The comparative analysis of SAODV and AODV protocol are presented against blackhole attack for the parameters energy consumption, throughput, packet delivery ratio and end-to-end delay in ad hoc networks. A methodology is designed which lays rules based on learnings from the computations and estimations made at the time of packet transfer. It has been found that the proposed methodology gives promising results than the one which lays networking rules at the time of setting up the network.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"153 1\",\"pages\":\"455-459\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754166\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Analysis of AODV and SAODV Routing Protocol using SVM against Black Hole Attack
This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector (AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets transfer and communication among the nodes using Support Vector Machine (SVM) technique. The comparative analysis of SAODV and AODV protocol are presented against blackhole attack for the parameters energy consumption, throughput, packet delivery ratio and end-to-end delay in ad hoc networks. A methodology is designed which lays rules based on learnings from the computations and estimations made at the time of packet transfer. It has been found that the proposed methodology gives promising results than the one which lays networking rules at the time of setting up the network.