Access the full text.
Sign up today, get DeepDyve free for 14 days.
Umesh Chaurasia, Varsha Singh (2013)
MAODV: Modified wormhole detection AODV protocol2013 Sixth International Conference on Contemporary Computing (IC3)
M. Arora, R. Challa, D. Bansal (2010)
Performance Evaluation of Routing Protocols Based on Wormhole Attack in Wireless Mesh Networks2010 Second International Conference on Computer and Network Technology
Reshmi Maulik, N. Chaki (2010)
A comprehensive review on wormhole attacks in MANET2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
Hoang Nguyen, U. Nguyen (2006)
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc NetworksInternational Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)
Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee (2011)
Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networksAd Hoc Networks, 9
Mehdi Sookhak, Adnan Akhundzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khan, Xiong Li, Xiaomin Wang (2015)
Geographic Wormhole Detection in Wireless Sensor NetworksPLoS ONE, 10
Yih-Chun Hu, A. Perrig, David Johnson (2006)
Wormhole attacks in wireless networksIEEE Journal on Selected Areas in Communications, 24
S. Sesay, Zongkai Yang, Jianhua He (2004)
A Survey on Mobile Ad Hoc Wireless NetworkInformation Technology Journal, 3
A. Boukerche (2004)
Performance Evaluation of Routing Protocols for Ad Hoc Wireless NetworksMobile Networks and Applications, 9
Hassan Azwar (2017)
Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 SimulatorInternational journal of engineering research and technology, 5
Dezun Dong, Mo Li, Yunhao Liu, Xiangyang Li, Xiangke Liao (2009)
Topological detection on wormholes in wireless ad hoc and sensor networksIEEE/ACM Transactions on Networking, 19
R. Ramanathan, J. Redi (2002)
A brief overview of ad hoc networks: challenges and directionsIEEE Communications Magazine, 40
Dhruvi Sharma, Vimal Kumar, Rakesh Kumar (2016)
Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET
G. Garg, S. Kaushal, Akashdeep Sharma (2014)
Reactive protocols analysis with wormhole attack in ad-hoc networksFifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
Samir Das, R. Castañeda, Jiangtao Yan (2000)
Simulation‐based performance evaluation of routing protocols for mobile ad hoc networksMobile Networks and Applications, 5
M. Sanaei, I. Isnin, M. Bakhtiari (2013)
Performance evaluation of routing protocol on AODV and DSR under wormhole attackJournal of Computer Networks and Communications
Yurong Xu, Guanling Chen, James Ford, F. Makedon (2007)
Detecting Wormhole Attacks in Wireless Sensor Networks
E. Belding-Royer, C. Toh (1999)
A review of current routing protocols for ad hoc mobile wireless networksIEEE Wirel. Commun., 6
Z. Haas, M. Pearlman (2002)
The zone routing protocol (zrp) for ad hoc networks" intemet draft
YC Hu, A Perrig, DB Johnson (2006)
Wormhole attacks in wireless networksSelected Areas in Communications, IEEE Journal on, 24
T. Issariyakul, E. Hossain (2008)
Introduction to Network Simulator NS2
N. Beijar (2002)
Zone Routing Protocol ( ZRP )
Hoang Lan Nguyen, Uyen Trang Nguyen (2008)
A study of different types of attacks on multicast in mobile ad hoc networksAd Hoc Networks, 6
He has worked as a professor and vice-principal Global institute of Management & Technology, Amritsar, Punjab and as Director-Principal in CT institutes shahpur
M. Corson, J. Macker (1999)
Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation ConsiderationsRFC, 2501
S Mohapatra, P Kanungo (2012)
Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulatorProcedia Engineering, 30
C. Perkins, E. Belding-Royer, Samir Das (2001)
Ad hoc On-Demand Distance Vector (AODV) RoutingRFC, 3561
Y. Ho, A. Ho, K. Hua (2008)
Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environmentsComput. Commun., 31
L. Chen, Ruijuan Yang, Mei-rong Huang (2016)
Ad Hoc High-Dynamic Routing Protocol Simulation and Research
B. Awerbuch, Reza Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens (2004)
Mitigating Byzantine Attacks in Ad Hoc Wireless Networks
EM Royer, CK Toh (1999)
A review of current routing protocols for ad hoc mobile wireless networksPersonal Communications, IEEE, 6
C. Bettstetter, H. Hartenstein, X. Costa (2002)
Stochastic properties of the random waypoint mobility model: epoch length, direction distribution, and cell change rate
Jogendra Kumar, Annapurna Singh, M. Panda, H. Bhadauria (2016)
Study and Performance Analysis of Routing Protocol Based on CBRProcedia Computer Science, 85
M. Abolhasan, T. Wysocki, E. Dutkiewicz (2004)
A review of routing protocols for mobile ad hoc networksAd Hoc Networks, 2
G. Kaur, V. Jain, Y. Chaba (2011)
Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Adhoc networks2011 World Congress on Information and Communication Technologies
H. Chiu, K. Lui (2006)
DelPHI: wormhole detection mechanism for ad hoc wireless networks2006 1st International Symposium on Wireless Pervasive Computing
V. Mahajan, M. Natu, A. Sethi (2008)
Analysis of wormhole intrusion attacks in MANETSMILCOM 2008 - 2008 IEEE Military Communications Conference
C. Calafate, P. Garrido, J. Oliver, Manuel Malumbres (2009)
Mobile Ad Hoc Networks
Vandana C.P (2013)
Evaluation of Impact of Wormhole Attack on AODV
R. Poovendran, Loukas Lazos (2007)
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networksWireless Networks, 13
C. Mbarushimana, A. Shahrabi (2007)
Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2
I. Chlamtac, Marco Conti, J. Liu (2003)
Mobile ad hoc networking: imperatives and challengesAd Hoc Networks, 1
David Johnson (2003)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks
N. Saeed, M. Abbod, Hamed. Al-Raweshidy, N. Saeed, M. Abbod, Hamed. Al-Raweshidy (2012)
MANET routing protocols taxonomy2012 International Conference on Future Communication Networks
J. Deny, A. Kumar, M. Sundarajan, Vishal Khanna (2017)
Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
Yih-Chun Hu, A. Perrig, David Johnson (2003)
Packet leashes: a defense against wormhole attacks in wireless networksIEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 3
(2010)
She is an Assistant Professor
L. Abusalah, A. Khokhar, M. Guizani (2008)
A survey of secure mobile Ad Hoc routing protocolsIEEE Communications Surveys & Tutorials, 10
Simulation Based Comparative Study of Routing Protocols… 63
A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a part of any network at any time that’s why it is susceptible to different types of attacks. Wormhole attack is most threatening security attack in ad hoc network where an attacker node receives packet at one location and replay them at other location which is remotely located far. In this paper, we study and compare the performance of AODV, DSR and ZRP under the impact of multiple wormhole attacker nodes. Diverse scenarios are characterized as like average of 50 runs and mobility. By statistical placement of multiple wormhole nodes across the network, we evaluate the performance in terms of throughput, packet delivery ratio, packet loss, average end to end delay and jitter. Finally based on the simulation we investigated the most affected routing protocol in terms of network metrics.
Wireless Personal Communications – Springer Journals
Published: Apr 28, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.