Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

An ad-hoc network is a infrastructure less network i.e. there is no fix infrastructure. Each node is a mobile node and can act as a router; a source or a base station. There is no central coordinator. AODV is a well known on-demand routing protocol and is prone to WORMHOLE attack. Wormhole attack is one of the most common and harmful attack in MANET. In this paper we analyze and compare the performance of AODV before and under WORMHOLE attack on different AODV parameters. For this NS2 simulator has been used to study the performance of AODV on different number of nodes.

Keywords: MANET, AODV, Wormhole attack, tunnel, DelPhi

Edition: Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Share this Article

How to Cite this Article?

Manju Ojha, Dr. Rajendra Singh Kushwah, "Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014594, Volume 3 Issue 6, June 2014, 1823 - 1826

130 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 147 , Downloads: 84 | CTR: 57 % | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 159 , Downloads: 90 | CTR: 57 % | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'AODV'

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 134 , Downloads: 104 | CTR: 78 % | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Similar Articles with Keyword 'Wormhole attack'

Views: 123 , Downloads: 102 | CTR: 83 % | Weekly Hits: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Views: 138 , Downloads: 106 | CTR: 77 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Views: 136 , Downloads: 109 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this Article

Views: 131 , Downloads: 112 | CTR: 85 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

Similar Articles with Keyword 'tunnel'

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Views: 135 , Downloads: 110 | CTR: 81 % | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1796 - 1801

MPLS Traffic Engineering ? Fast Reroute

Shuguftha Naveed, S. Vinay Kumar

Share this Article

Views: 123 , Downloads: 112 | CTR: 91 % | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this Article

Views: 144 , Downloads: 113 | CTR: 78 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2158 - 2164

Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network

Mahendra Dhole, Anand Gadwal

Share this Article

Similar Articles with Keyword 'DelPhi'

Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Views: 144 , Downloads: 113 | CTR: 78 % | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2158 - 2164

Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network

Mahendra Dhole, Anand Gadwal

Share this Article

Views: 346 , Downloads: 171 | CTR: 49 % | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, Malaysia, Volume 8 Issue 1, January 2019

Pages: 2136 - 2139

Semantic Analysis of Object-Oriented Programming Languages: Survey

Abdulkadir Abubakar Bichi, Abdulrauf Garba Sharifai, Saud Adam Abdulkadir

Share this Article
Top