Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
In this paper we deal with the problem of packet forwarding misbehavior and study the effect of different attacks on AODV (Ad-hoc On-demand Distance Vector) routing since it is a mostly accepted network routing protocol for Mobile Adhoc Network (MANET). | ISSN:2249-5789 Shraddha Dubey et al , International Journal of Computer Science & Communication Networks,Vol 5(1),22-26 Comparative Study of Different Network Attacks Over AODV in MANET Shraddha Dubey R. K. Singh Student M. Tech. CSE Kamla Nehru Institute of Engineering & Technology Sultanpur (U.P.), India e-mail: shraddhadubey85@gmail.com Associate Professor, CSE department Kamla Nehru Institute of Engineering & Technology Sultanpur (U.P.), India Abstract: Due to the non-infrastructural nature of mobile adhoc networks that exhibits insecure environments, makes them vulnerable to attacks. The inbuilt features e.g. dynamically varying network topology, lack of centralized monitoring and management of the MANET, makes it exposed to a wide range of attacks. There is not a single way to determine whether a communication path is free from malicious nodes (which interrupts the network communication intentionally) or not. So defending the mobile ad-hoc network from malicious attacks is most important and challenging issue. In this paper we deal with the problem of packet forwarding misbehavior and study the effect of different attacks on AODV (Ad-hoc On-demand Distance Vector) routing since it is a mostly accepted network routing protocol for Mobile Adhoc Network (MANET). Keywords: MANET; blackhole attack; grayhole attack 1.Introduction: MANETs (collection of wireless nodes) have a dynamically varying topology. In MANET, nodes are usually illustrated by their higher degree of mobility as well as limited wireless transmission range for a particular node. Nodes that are in transmission range of each other are called neighbors. Neighbors can communicate directly to each other. However, when a node needs to communicate to another node, which is not in its transmission range then the data is routed through a sequence of multiple hops, with intermediate nodes acting as routers. Therefore, the transmission range of each node is extended by multi-hop packet forwarding .