Analysis of security attacks on AODV routing

Mohamed Abdelshafy, Peter J. B. King

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

8 Citations (Scopus)
53 Downloads (Pure)

Abstract

MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.
Original languageEnglish
Title of host publication 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
PublisherIEEE
Pages290-295
Number of pages6
ISBN (Electronic)978-1-908320-20-9
DOIs
Publication statusPublished - Dec 2013
Event8th International Conference for Internet Technology and Secured Transactions - London, United Kingdom
Duration: 9 Dec 201312 Dec 2013
Conference number: 8
http://www.icitst.org/

Conference

Conference8th International Conference for Internet Technology and Secured Transactions
Abbreviated titleICITST
CountryUnited Kingdom
CityLondon
Period9/12/1312/12/13
Internet address

Bibliographical note


© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

Fingerprint Dive into the research topics of 'Analysis of security attacks on AODV routing'. Together they form a unique fingerprint.

  • Cite this

    Abdelshafy, M., & King, P. J. B. (2013). Analysis of security attacks on AODV routing. In 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (pp. 290-295). IEEE. https://doi.org/10.1109/ICIST.2013.6747558