Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack

There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under Black-Hole Attack. The performance evaluations of metrics chosen are end to end delay, retransmission attempts, network load and throughput, when a percentage of nodes misbehave. It is evaluated that it is difficult to detect Black Hole attack, on the basis of the performance of the network.

[1]  Mohammad Reza Meybodi,et al.  Multicast Routing Protocols in MANET , 2012 .

[2]  Neha,et al.  MULTICAST ROUTING PROTOCOLS IN MANETS , 2012 .

[3]  Bruce Christianson,et al.  A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack , 2007, Third International Symposium on Information Assurance and Security.

[4]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[5]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[6]  Hrituparna Paul,et al.  Performance Evaluation of MANET Routing Protocols , 2012 .

[7]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[9]  Zeyad M. Alfawaer,et al.  A Proposed Security Subsystem for Ad Hoc Wireless Networks , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[10]  Khaldoun Al Agha,et al.  A shared secret-based algorithm for securing the OLSR routing protocol , 2006, Telecommun. Syst..

[11]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[12]  Mukesh Singhal,et al.  A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[13]  Peter Martini,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[14]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[15]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[16]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[17]  Stefaan Seys Security Architecture for Wireless Ad hoc Networks , 2004 .