Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis

  • E. Suresh Babu
  • Satuluri Naganjaneyulu
  • P. S. V. Srinivasa Rao
  • M. Srinivas Rao
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Recently, wireless networks are rapidly gaining importance and generating more interest in wireless communication, due to remarkable improvements in wireless devices such as low-cost laptops, palmtops, PDA, etc. Revolutionary development of these widespread wireless networks has resulted in a number of new applications such as vehicle-to-vehicle communication in remote areas. This paper attempts to comprehend the performance issue by evaluating of two proposed two table-driven (DSDV, OLSR) routing protocols with varying traffic and mobility condition in a realistic manner. Moreover. We modelled a collaborative attack against these two routing protocols that can obstruct the normal operations of the ad hoc networks. Precisely, our experiential result shows the comparative analysis of OLSR, DSDV under hostile environments with varying mobility and traffic scenario.

Keywords

OLSR DSDV Collaborative attack Adhoc networks 

References

  1. 1.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “An Implementation and Performance Evaluation Study of AODV, MAODV, RAODV in Mobile Ad hoc Networks.” vol 4 (2013): 691–695.Google Scholar
  2. 2.
    Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks,” vol. 2, pp. 1–22, 2004.Google Scholar
  3. 3.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “Inspired Pseudo Biotic DNA based Cryptographic Mechanism against Adaptive Cryptographic Attacks.” International Journal of Network Security 18, no. 2 (2016): 291–303.Google Scholar
  4. 4.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks.” Advanced Computing and Systems for Security. Springer India, 2016. 123–144.Google Scholar
  5. 5.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism.” Procedia Computer Science 70 (2015): 341–347.Google Scholar
  6. 6.
    Babu, E. Suresh, C. Nagaraju, and M. H. M. Prasad. “A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks.” In Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, pp. 339–344. ACM, 2015.Google Scholar
  7. 7.
    Huhtonen, Aleksandr. “Comparing AODV and OLSR routing protocols.” Seminar on internetworking, Sjkulla. 2004. Kullberg, “Performance of the Ad-hoc On-Demand Distance Vector Routing Protocol”. 2004.Google Scholar
  8. 8.
    Qasim, F. Said, and H. Aghvami, “Mobile Ad Hoc Networks Simulations Using Routing Protocols for Performance Comparisons”, 2008.Google Scholar
  9. 9.
    Amnai, Mohamed, Youssef Fakhri, and Jaafar Abouchabaka. “QOS routing and performance evaluation for Mobile Ad Hoc Networks using OLSR protocol.” arXiv preprint arXiv:1107.3656 (2011).
  10. 10.
    Babu, E. Suresh, and M. H. M. K. Prasad. “An Implementation Analysis and Evaluation Study of DSR with Inactive DoS Attack in Mobile Ad hoc Networks.” vol 2 (2013): 501–507.Google Scholar
  11. 11.
    Kumar, S. Ashok, E. Suresh Babu, C. Nagaraju, and A. Peda Gopi. “An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET.” International Journal of Electrical and Computer Engineering 5, no. 5 (2015).Google Scholar
  12. 12.
    Gopi, A. Peda, E. Suresh Babu, C. Naga Raju, and S. Ashok Kumar. “Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study.” International Journal of Electrical and Computer Engineering 5, no. 5 (2015).Google Scholar
  13. 13.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “An Implementation and Performance Evaluation of Passive DoS Attack on AODV Routing Protocol in Mobile Ad hoc Networks.” International Journal of Emerging Trends & Technology in Computer Science 2, no. 4 (2013): 124–129.Google Scholar
  14. 14.
    Swarna, Mahesh, Syed Umar, and E. Suresh Babu. “A Proposal for Packet Drop Attacks in MANETS.” In Microelectronics, Electromagnetics and Telecommunications, pp. 377–386. Springer India, 2016.Google Scholar
  15. 15.
    Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers”, Proc. ACM SIGCOMM Conf. Comms. Architectures, pp 234–244, 1994.Google Scholar
  16. 16.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “Light-Weighted DNA Based Hybrid Cryptographic Mechanism Against Chosen Cipher Text Attacks.” International Journal of Information Processing and Indexed With arXiv, Indian Citation Index-2015, ISSN-0973–821.Google Scholar
  17. 17.
    Babu, E. Suresh, C. Nagaraju, and MHM Krishna Prasad. “Efficient DNA-Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs.” In Proceedings of International Conference on ICT for Sustainable Development, pp. 695–706. Springer Singapore, 2016.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • E. Suresh Babu
    • 1
  • Satuluri Naganjaneyulu
    • 2
  • P. S. V. Srinivasa Rao
    • 3
  • M. Srinivas Rao
    • 4
  1. 1.Department of Computer Science and EngineeringK L UniversityGunturIndia
  2. 2.Department of Information TechnologyLBRCEMylavaramIndia
  3. 3.Department of Computer Science and EngineeringSVECWBhimavaramIndia
  4. 4.Department of Computer Science and EngineeringSVIETMachilipatnamIndia

Personalised recommendations