Performance Evaluation of AODV Routing Protocol Using Different Parameters Under Black Hole Attack

The major challenging issue in mobile ad hoc networks is denial-of-service (DoS) attacks which disrupt the normal behaviour of routing protocols. DoS attacks are more effective attacks which result in degradation of routing protocol performance. These attacks occur in the communication network and degrade performance by delaying more packets and less throughput. In this paper, the black hole attack is introduced and the performance analysis of the AODV routing protocol is carried out with and without black hole attack under different traffic conditions with different packet sizes using different parameters. The traffic conditions used in this paper are CBR and FTP which are based on TCP and UDP agents. The instantaneous delay, throughput, and normalized routing load are common measure parameters used to carry out the performance analysis of the AODV routing protocol with and without black hole attack.

[1]  J. K. Mandal,et al.  QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack , 2013 .

[2]  P. Kanungo,et al.  Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator , 2012 .

[3]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[4]  Q. Razouqi,et al.  Combined traffic simulation scenarios performance investigation routing protocols AODV, DSR and DSDV in MANET , 2012, 2012 8th International Computer Engineering Conference (ICENCO).

[5]  Anastasios A. Economides,et al.  Conference on Electronics , Telecommunications and Computers – CETC 2013 Simulation study of MANET routing protocols under FTP traffic , 2014 .

[6]  Yang Yang,et al.  Research of AODV Routing Protocol for Ad Hoc Networks1 , 2013 .

[7]  V. Singh,et al.  Simulation and Analysis of Routing Protocol under CBR and TCP Traffic Source , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[8]  Pariza Kamboj,et al.  A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3 , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[9]  Syed Jalal Ahmad,et al.  Detection of Black Hole Attack Using Code Division Security Method , 2015 .

[10]  Amar Taggu,et al.  A comprehensive analysis of DoS attacks in Mobile Adhoc Networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).