Downloading: Performance Analysis of AODV and TORA under DDoS Attack in MANETs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR) | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Amazon Sale

To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Performance Analysis of AODV and TORA under DDoS Attack in MANETs

Sachin Garg

Abstract: Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) attack is launched from various attacking nodes, hence called DDoS. DDoS is an improved form of denial of service attack. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Two popular MANET routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV) and Temporally Ordered Routing Algorithm (TORA) have been implemented. The scope of this thesis is to study the effects of DDoS attack in MANET using both Ad-Hoc on Demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA). Comparative analysis of DDoS attack for both protocols is taken into account. The impact of DDoS attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay, network load and various other parameters. In this project an attempt has been made to compare the performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: AODV and TORA, under the normal conditions and DDoS attack situations. The simulation model is created using the Network Simulator 2 (NS-2) with MANET essential configurations and compatible physical layer models are used to study the performance of the AODV and TORA. The On-demand protocol, AODV has performed better than the TORA protocol under the both conditions.. Although AODV and TORA share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials. The performance differentials are analyzed using normal and attack situations.

Keywords: Mobile ad-hoc networks, DDoS attack, AODV, TORA, Security

Amazon Sale