Abstract
The major challenging issue in mobile ad hoc networks is denial-of-service (DoS) attacks which disrupt the normal behaviour of routing protocols. DoS attacks are more effective attacks which result in degradation of routing protocol performance. These attacks occur in the communication network and degrade performance by delaying more packets and less throughput. In this paper, the black hole attack is introduced and the performance analysis of the AODV routing protocol is carried out with and without black hole attack under different traffic conditions with different packet sizes using different parameters. The traffic conditions used in this paper are CBR and FTP which are based on TCP and UDP agents. The instantaneous delay, throughput, and normalized routing load are common measure parameters used to carry out the performance analysis of the AODV routing protocol with and without black hole attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chaudhary, M.S., Singh, V.: Simulation and Analysis of Routing Protocol under CBR and TCP Traffic Source. IEEE, Communication Systems and Network Technologies (CSNT) (2012)
Kampitaki, D., Economides, A.A.: Simulation study of MANET routing protocols under FTP traffic. In: Conference on Electronics, Telecommunications and Computers-CETC 2013, Elsevier (2013)
Liu, S., Yang, Y., Wang, W.: Research of AODV routing protocol for ad hoc networks. In: AASRI Conference on Parallel and Distributed Computing and Systems, Elsevier (2013)
Mohapatra, S., Kanungo, P.: Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. In: International Conference on Communication Technology and System Design, Elsevier (2011)
Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. Springer, Human-centric Computing and Information Sciences (2011)
Das, K., Taggu, A.: A comprehensive analysis of DoS attacks in mobile adhoc networks. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE (2014)
Ahmed, S.J., Reddy, V.S., Damodaram, A., Radha Krishna, P.: Detection of black hole attack using code division security method. In: Advances in Intelligent Systems and Computing, vol. 338, Springer (2015)
Bar, R.K., Mandal, J.K., Singh, M.M.: QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. In: International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Elsevier (2013)
Razouqi, Q., Gaballah, M., Alsaleh, L.: Combined traffic simulation scenarios performance investigation routing protocols AODV, DSR and DSDV in MANET. In: 8th International Conference on Computer Engineering (ICENCO), IEEE (2012)
Rajankumar, P., Nimisha, P., Kamboj, P.: A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: International Conference on Computing for Sustainable Global Development (INDIAcom), IEEE, March 2014
Robins, A.D.: GAWK: an effective AWK programming, 3rd edn., April 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Barinderpal Singh, Rahul Hans (2016). Performance Evaluation of AODV Routing Protocol Using Different Parameters Under Black Hole Attack. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-0287-8_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0286-1
Online ISBN: 978-981-10-0287-8
eBook Packages: EngineeringEngineering (R0)