International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Rozy Rana [3] | Kanwal Preet Singh [3]


Abstract: The main goal of this Research paper is to see the simulation and performance factors of routing protocols (AODV, DSDV AND DSR) after attack in NS-2. Routing Protocols specifies how communication between two routers takes place. By this we can specify the choice of the route. We will analyze literature sources related to wireless networks simulators. We will also analyze the Network simulator ns-2 and will give its detailed Description. Therefore we can analyze the performance factors packet delay, packet loss and throughput in nodes after the Black Hole Attack. We will compare these three routing protocols by evaluating on the basis of their performance.


Keywords: Performance, NS-2, AODV, DSDV, DSR, Throughput, Delay


Edition: Volume 3 Issue 7, July 2014,


Pages: 787 - 792


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rozy Rana, Kanwal Preet Singh, "Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 787-792, https://www.ijsr.net/get_abstract.php?paper_id=20141134

Similar Articles with Keyword 'Performance'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar [2] | Santanu Chatterjee

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top