Analysis of security attacks on AODV routing

Mohamed Abdelshafy, Peter J. B. King

    Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

    10 Citations (Scopus)
    142 Downloads (Pure)

    Abstract

    MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.
    Original languageEnglish
    Title of host publication 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
    PublisherIEEE
    Pages290-295
    Number of pages6
    ISBN (Electronic)978-1-908320-20-9
    DOIs
    Publication statusPublished - Dec 2013
    Event8th International Conference for Internet Technology and Secured Transactions - London, United Kingdom
    Duration: 9 Dec 201312 Dec 2013
    Conference number: 8
    http://www.icitst.org/

    Conference

    Conference8th International Conference for Internet Technology and Secured Transactions
    Abbreviated titleICITST
    Country/TerritoryUnited Kingdom
    CityLondon
    Period9/12/1312/12/13
    Internet address

    Bibliographical note


    © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Fingerprint

    Dive into the research topics of 'Analysis of security attacks on AODV routing'. Together they form a unique fingerprint.

    Cite this