TAILIEUCHUNG - Comparative study of different network attacks over AODV in MANET

In this paper we deal with the problem of packet forwarding misbehavior and study the effect of different attacks on AODV (Ad-hoc On-demand Distance Vector) routing since it is a mostly accepted network routing protocol for Mobile Adhoc Network (MANET). | ISSN:2249-5789 Shraddha Dubey et al , International Journal of Computer Science & Communication Networks,Vol 5(1),22-26 Comparative Study of Different Network Attacks Over AODV in MANET Shraddha Dubey R. K. Singh Student M. Tech. CSE Kamla Nehru Institute of Engineering & Technology Sultanpur (.), India e-mail: shraddhadubey85@ Associate Professor, CSE department Kamla Nehru Institute of Engineering & Technology Sultanpur (.), India Abstract: Due to the non-infrastructural nature of mobile adhoc networks that exhibits insecure environments, makes them vulnerable to attacks. The inbuilt features . dynamically varying network topology, lack of centralized monitoring and management of the MANET, makes it exposed to a wide range of attacks. There is not a single way to determine whether a communication path is free from malicious nodes (which interrupts the network communication intentionally) or not. So defending the mobile ad-hoc network from malicious attacks is most important and challenging issue. In this paper we deal with the problem of packet forwarding misbehavior and study the effect of different attacks on AODV (Ad-hoc On-demand Distance Vector) routing since it is a mostly accepted network routing protocol for Mobile Adhoc Network (MANET). Keywords: MANET; blackhole attack; grayhole attack : MANETs (collection of wireless nodes) have a dynamically varying topology. In MANET, nodes are usually illustrated by their higher degree of mobility as well as limited wireless transmission range for a particular node. Nodes that are in transmission range of each other are called neighbors. Neighbors can communicate directly to each other. However, when a node needs to communicate to another node, which is not in its transmission range then the data is routed through a sequence of multiple hops, with intermediate nodes acting as routers. Therefore, the transmission range of each node is extended by multi-hop packet forwarding .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.