Abstract
MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.
Original language | English |
---|---|
Title of host publication | 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) |
Publisher | IEEE |
Pages | 290-295 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-908320-20-9 |
DOIs | |
Publication status | Published - Dec 2013 |
Event | 8th International Conference for Internet Technology and Secured Transactions - London, United Kingdom Duration: 9 Dec 2013 → 12 Dec 2013 Conference number: 8 http://www.icitst.org/ |
Conference
Conference | 8th International Conference for Internet Technology and Secured Transactions |
---|---|
Abbreviated title | ICITST |
Country/Territory | United Kingdom |
City | London |
Period | 9/12/13 → 12/12/13 |
Internet address |
Bibliographical note
© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works