Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Title | Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Tripathi, Shripriya |
Conference Name | 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) |
Keywords | Ad-hoc On-demand Distance Vector, AODV, AODV routing protocols, attack vectors, Black hole attack, common routing protocols, compositionality, delays, Dsr, DSR routing protocols, dynamic source routing, Jitter, MANET, MANET security, Metrics, mobile ad hoc network, mobile ad hoc networks, Performance analysis, pubcrawl, Resiliency, Routing, routing algorithm, Routing protocols, Self-assembly, spoofing attack, suggested trust based routing algorithm, telecommunication security, Throughput, Trust, wormhole attack, wormhole tunnels |
Abstract | The nodes in Mobile Ad hoc Network (MANET) can self-assemble themselves, locomote unreservedly and can interact with one another without taking any help from a centralized authority or fixed infrastructure. Due to its continuously changing and self-organizing nature, MANET is vulnerable to a variety of attacks like spoofing attack, wormhole attack, black hole attack, etc. This paper compares and analyzes the repercussion of the wormhole attack on MANET's two common routing protocols of reactive category, specifically, Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (AODV) by increasing the number of wormhole tunnels in MANET. The results received by simulation will reveal that DSR is greatly affected by this attack. So, as a solution, a routing algorithm for DSR which is based on trust is proposed to prevent the routes from caching malicious nodes. |
DOI | 10.1109/WIECON-ECE48653.2019.9019971 |
Citation Key | tripathi_performance_2019 |
- mobile ad hoc network
- wormhole tunnels
- wormhole attack
- trust
- Throughput
- telecommunication security
- suggested trust based routing algorithm
- spoofing attack
- self-assembly
- Routing protocols
- routing algorithm
- Routing
- Resiliency
- pubcrawl
- Performance analysis
- mobile ad hoc networks
- Attack vectors
- Metrics
- MANET security
- MANET
- Jitter
- dynamic source routing
- DSR routing protocols
- Dsr
- delays
- Compositionality
- common routing protocols
- Black hole attack
- AODV routing protocols
- AODV
- Ad-hoc On-demand Distance Vector