Performance evaluation of hybrid routing protocols against network layer attacks in MANET

This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous network layer attacks. The performance evaluation done has quantitatively represented facts for use of specific routing protocol. For fast and secure transmission of data for network scenario those protocols are used who acquire structural change of network scenario. Mobile nodes are open to security attacks as due to their changing network structure and open communication channel. This paper simulated protocols which are being used recently by mobile devices and based on research of proactive, reactive and hybrid protocols and the behaviour they exhibit in particular node structure against the vulnerabilities which they exhibit.

[1]  J. V. R. Murthy,et al.  Secure zone based routing protocol for mobile adhoc networks , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).

[2]  Alexander William Setiawan Putra,et al.  Data rate of connections in performing packet delivery of Wireless Mesh Network using Hybrid Wireless Mesh Protocol and Optimized Link State Routing protocol , 2014, 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering.

[3]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[4]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[5]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[6]  Gurdit Singh,et al.  Secure routing protocol for Hybrid Wireless Mesh Network (HWMN) , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[7]  A. Pushpa Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[8]  Kai Yang,et al.  Hybrid Routing Protocol for Wireless Mesh Network , 2009, 2009 International Conference on Computational Intelligence and Security.

[9]  Ravi Prakash,et al.  Improving the Performance of Hybrid Wireless Mesh Protocol , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[10]  N. Okazaki,et al.  Proposal of a Robust Zone-based Hierarchical Routing Method for Ad Hoc Networks , 2006, 2006 Asia-Pacific Conference on Communications.

[11]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[12]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..