International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

An ad-hoc network is a infrastructure less network i.e. there is no fix infrastructure. Each node is a mobile node and can act as a router; a source or a base station. There is no central coordinator. AODV is a well known on-demand routing protocol and is prone to WORMHOLE attack. Wormhole attack is one of the most common and harmful attack in MANET. In this paper we analyze and compare the performance of AODV before and under WORMHOLE attack on different AODV parameters. For this NS2 simulator has been used to study the performance of AODV on different number of nodes.

Keywords: MANET, AODV, Wormhole attack, tunnel, DelPhi

Edition: Volume 3 Issue 6, June 2014

Pages: 1823 - 1826


How to Cite this Article?

Manju Ojha, Dr. Rajendra Singh Kushwah, "Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014594, Volume 3 Issue 6, June 2014, 1823 - 1826

18 PDF Views | 25 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article



Similar Articles with Keyword 'AODV'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article



Similar Articles with Keyword 'Wormhole attack'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this article



Similar Articles with Keyword 'tunnel'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1796 - 1801

MPLS Traffic Engineering ? Fast Reroute

Shuguftha Naveed, S. Vinay Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2809 - 2814

Study for IPv4 and IPv6 Coexistence

Abhay Singh, Alabhya Maheshawari, Dushyant Shukla

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2158 - 2164

Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network

Mahendra Dhole, Anand Gadwal

Share this article



Similar Articles with Keyword 'DelPhi'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2158 - 2164

Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network

Mahendra Dhole, Anand Gadwal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this article

Survey Paper, Computer Science & Engineering, Malaysia, Volume 8 Issue 1, January 2019

Pages: 2136 - 2139

Semantic Analysis of Object-Oriented Programming Languages: Survey

Abdulkadir Abubakar Bichi, Abdulrauf Garba Sharifai, Saud Adam Abdulkadir

Share this article
Top