International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


Performance Analysis of AODV and TORA under DDoS Attack in MANETs

Sachin Garg


Abstract: Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) attack is launched from various attacking nodes, hence called DDoS. DDoS is an improved form of denial of service attack. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Two popular MANET routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV) and Temporally Ordered Routing Algorithm (TORA) have been implemented. The scope of this thesis is to study the effects of DDoS attack in MANET using both Ad-Hoc on Demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA). Comparative analysis of DDoS attack for both protocols is taken into account. The impact of DDoS attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay, network load and various other parameters. In this project an attempt has been made to compare the performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: AODV and TORA, under the normal conditions and DDoS attack situations. The simulation model is created using the Network Simulator 2 (NS-2) with MANET essential configurations and compatible physical layer models are used to study the performance of the AODV and TORA. The On-demand protocol, AODV has performed better than the TORA protocol under the both conditions. . Although AODV and TORA share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials. The performance differentials are analyzed using normal and attack situations.


Keywords: Mobile ad-hoc networks, DDoS attack, AODV, TORA, Security


Edition: Volume 3 Issue 10, October 2014,


Pages: 297 - 304


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sachin Garg, "Performance Analysis of AODV and TORA under DDoS Attack in MANETs", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 297-304, https://www.ijsr.net/get_abstract.php?paper_id=SEP14699

Similar Articles with Keyword 'Mobile adhoc networks'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur [24] | Pooja Saini [3]

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 972 - 976

Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs

Pidakala Sowmya | Kare Suresh Babu [2]

Share this Article
Top