AODV and SAODV under Attack: Performance Comparison

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of SAODV is better than AODV in the presence of blackhole, grayhole and selfish attacks while its performance is worse than AODV in the presence of flooding attack. The blackhole and flooding attacks have a severe impact on the AODV and SAODV performance while the grayhole and selfish attacks have less significant effect on it.

[1]  Azzedine Boukerche,et al.  Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.

[2]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[3]  Praveen Joshi Security issues in routing protocols in MANETs at network layer , 2011, WCIT.

[4]  K P Manikandan,et al.  A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks , 2011 .

[5]  Ritu Chauhan,et al.  Security Attacks In Mobile Adhoc Networks , 2012 .

[6]  Sylvie Perreau,et al.  Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.

[7]  Prasenjit Choudhury,et al.  A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  N. Sharma,et al.  The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[12]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[13]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[14]  Peter J. B. King,et al.  Analysis of security attacks on AODV routing , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).