Advertisement

Comparative Study of OLSR, DSDV, AODV, DSR and ZRP Routing Protocols Under Blackhole Attack in Mobile Ad Hoc Network

  • Ankit Singh
  • Gurpreet Singh
  • Mandeep Singh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)

Abstract

Mobile ad hoc network consists of an independent set of moveable nodes who are exchanging information among one another within the network. Safety of ad hoc networks is the measure concern for transmitting the information among the wireless nodes. Wireless nodes are having friendly characteristics due to which they expose themselves to different kinds of malicious attacks which are very complicated to identify as each node contributes likewise in network process. Blackhole attack is a routing attack in which malicious node pretends to be the shortest route to reach target node then to all other routes. The purpose is to analyse the performance of various routing protocols of freely movable ad hoc network for instance OLSR, DSR, AODV, DSDV and ZRP under Blackhole attack. The performance factors which will be considered for analysis are packet drop rate, average throughput, average end-to-end delay of packet and packet delivery ratio.

Keywords

MANET OLSR DSDV AODV DSR ZRP and Blackhole attack 

References

  1. 1.
    Sushama Singh, Atish Mishra & Upendra Singh. Detection and Avoiding of Collaborative Blackhole attack on MANET using Trusted AODV Routing.. In Colossal Data Analysis and Networking (CDAN), Symposium. IEEE (2016).Google Scholar
  2. 2.
    Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, & Benachir El Hadadi. Modified AODV Routing Protocol to Improve Security and Performance against Blackhole attack. In Information Technology for Organizations Development (IT4OD), 2016 International Conference. IEEE (2016).Google Scholar
  3. 3.
    Kannan Govindan & Pransant Mohapatra. Trust Computations and Trust Dynamics in Mobile Ad-hoc Networks: A Survey. In IEEE Communication Surveys & Tutorials (Volume: 14, Issue: 2, Second Quarter 2016). IEEE (2016).Google Scholar
  4. 4.
    Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, & Benachir El Hadadi. Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks. In Computer Graphics, Imaging and visualization (CGiV), 2016 13th International Conference. IEEE (2016).Google Scholar
  5. 5.
    Sagar R. Deshmukh & Dr P.N. Chatur. Secure Routing to Avoid Blackhole Affected Routes in MANET. In Colossal Data Analysis and Networking (CDAN), Symposium. IEEE (2016).Google Scholar
  6. 6.
    Aporva Jain, Urmila Prajapati & Piyush Chouhan. Trust Based Mechanism with AOVD Protocol for prevention of Blackhole attack in MANET. In Colossal Data Analysis and Networking (CDAN), Symposium. IEEE (2016).Google Scholar
  7. 7.
    S.H. Jaychandra, R Manjunatha, Nayab Hussain, B.U. Sujan, H.L. Gururaj & B.Ramesh. Analysis of Blackhole Attack in Ad-hoc Network using AODV and MAODV protocol. SPRINGER (2016).Google Scholar
  8. 8.
    Neelu Kumari, Sandeep Kumar Gupta, Rajini Choudhary & Shubh Laxshmi Agrwal. New performance analysis of AODV, DSDV and OLSR routing protocol for MANET. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference. IEEE (2016).Google Scholar
  9. 9.
    Parvinder Kaur, Dalveer Kaur & Rajiv Mahajan. A review and comparison of AODV, DSR and ZRP routing protocols on the basis of qualitative metrics. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference. IEEE (2016).Google Scholar
  10. 10.
    V.Keerthika & N. Malarvizhi. Mitigate black hole attack using trust with AODV in MANET. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference. IEEE (2016).Google Scholar
  11. 11.
    Ram Kishore Singh & Parma Nand. Literature review of routing attacks in MANET. In Computing, Communication and Automation (ICCCA), 2016 International Conference. IEEE (2016).Google Scholar
  12. 12.
    Sakshi Jain & Ajay Khuteta. Detecting and overcoming blackhole attack in mobile Adhoc Network. In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference. IEEE (2015).Google Scholar
  13. 13.
    Mohamed A. Abdelshafy & Peter J. B. King. Dynamic source routing under attacks. In Reliable Networks Design and Modeling (RNDM), 2015 7th International Workshop. IEEE (2015).Google Scholar
  14. 14.
    Abhijeet Salunke & Dayan and Ambawade. Dynamic Sequence Number Thresholding protocol for detection of blackhole attack in Wireless Sensor Network. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference. IEEE (2015).Google Scholar
  15. 15.
    Dhiraj Nitnaware & Anita Thakur. Blackhole Attack Detection and Prevention Strategy in DYMO for MANET. In Signal Processing and Integrated Networks (SPIN), 2016 3rd International Conference. IEEE (2016).Google Scholar
  16. 16.
    Sagar R.Deshmukh, P.N. Chatur & Nikhil B Bhople. AODV-based secure routing against blackhole attack in MANET. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), International Conference. IEEE (2016).Google Scholar
  17. 17.
    Neeraj Arya, Upendra Singh & Sushma Singh. Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. In Computer, Communication and Control (IC4), 2015 International Conference. IEEE (2015).Google Scholar
  18. 18.
    Anurag Gupta & Kamlesh Rana. Assessment of various attacks on AODV in malicious environment. In Next Generation Computing Technologies (NGCT) 2015 1st International Conference. IEEE (2015).Google Scholar
  19. 19.
    Kriti Patidar & Vandana Dubey. Modification in routing mechanism of AODV for defending blackhole and wormhole attacks. In IT in Business, Industry and Government (CSIBIG), 2014 Conference. IEEE (2014).Google Scholar
  20. 20.
    Chaitali Biswas Dutta & Utpal Biswas. An energy aware blackhole attack for multipath AODV. In Business and Information Management (ICBIM), 2014 2nd International Conference. IEEE (2014).Google Scholar
  21. 21.
    Chaitali Biswas Dutta & Utpal Biswas. A novel blackhole attack for multipath AODV and its mitigation. In Recent Advances and Innovations in Engineering (ICRAIE-2014), International Conference. IEEE (2014).Google Scholar
  22. 22.
    Sivendra Prackash & Abhishek Swaroop. A brief survey of blackhole detection and avoidance for ZRP protocol in MANETs. In Computing, Communication and Automation (ICCCA), 2016 International Conference. IEEE (2016).Google Scholar
  23. 23.
    Sweta Dixit, Priya Pathak & Sandeep Gupta. A Novel Approach for Grayhole and Blackhole Detection and Prevention. In Colossal Data Analysis and Networking (CDAN), Symposium. IEEE (2016).Google Scholar
  24. 24.
    Siddhart Dhama, Sundeep Sharam & Mukul Saini. Blackhole Attack Detection and Prevention Mechanism for Mobile Ad-hoc Networks. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference. IEEE (2016).Google Scholar
  25. 25.
    Nirbhay Chaubey, Akshai Aggarwal, Savita Gandhi & Keyurbhai A Jani. Effect of pause time on AODV and TSDRP routing protocols under black hole attack and DoS attacks in MANETs. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference. IEEE (2015).Google Scholar
  26. 26.
    Pradeep R. Dumne & Arati Manjaramkar. Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs. Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2016 5th International Conference. IEEE (2016).Google Scholar
  27. 27.
    Vaishali Gaikwad Mohite & Lata Ragha. Security agents for detecting and avoiding cooperative blackhole attacks in MANET. Applied and Theoretical Computing and Communication Technology (iCATccT), 2015 International Conference. IEEE (2015).Google Scholar
  28. 28.
    Mohamed A. Abdelshafy & Peter J. B. King. Resisting blackhole attacks on MANETs. In Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual Conference. IEEE (2016).Google Scholar
  29. 29.
    Ankit D. Patel & Kartik Chawda. Blackhole and grayhole attacks in MANET. In Information Communication and Embedded Systems (ICICES2014), 2014 International Conference. IEEE (2014).Google Scholar
  30. 30.
    Hemant Sharma, Koushik Banerjee & Brijesh Kumar Chaurasia. Blackhole Tolerant Protocol for ZigBee Wireless Networks. In Computational Intelligence and Communication Networks, 2014 International Conference. IEEE (2014).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringLovely Professional UniversityKapurthalaIndia

Personalised recommendations