Skip to main content

Performance Analysis of MANET Under Black Hole Attack Using AODV, OLSR and TORA

  • Conference paper
  • First Online:
Computational Intelligence in Information Systems (CIIS 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 532))

Abstract

Black Hole attack is one of the many attacks that can occur on a MANET. It works on the network layer by dropping all incoming packets instead of forwarding them to the destinations. MANET conveys communication in a multi-hop manner from the source node to the destination. But without any security means, the effects of such attack on MANET can disrupt the performance and operations of the network. This paper describes the effect of the attack on MANET that is using AODV, OLSR and TORA routing protocols with the introduction of IPSec protocol under the influence of Black Hole attack. The simulation of the attack is achieved using Riverbed Modeler Academic Edition. Based on the Black Hole attack simulations, MANET suffered the lowest throughput when it is using TORA and the highest using OLSR routing protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Godwin, P.J., Srivinasan, R.: A survey on MANET security challenges, attacks, and its countermeasures. Int. J. Emerg. Trends Technol. Comput. Sci. 3(1), 274–279 (2014)

    Google Scholar 

  2. Ullah, I., Anwar, S.: Effects of black hole attack on MANET using reactive and proactive protocols. Int. J. Comput. Sci. Issues 10(3), 152–159 (2013)

    Google Scholar 

  3. Singh, H., Singh, G., Singh, M.: Performance evaluation of mobile ad hoc network routing protocols under black hole attack. Int. J. Comput. Appl. 42(18), 1–6 (2012)

    Google Scholar 

  4. Jasvinder, Sachdeva, M.: Effects of black hole attack on an AODV routing protocol through the using of Opnet simulator. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(8), 657–664 (2013)

    Google Scholar 

  5. Eastom, W.: Computer Security Fundamentals. Pearson, New York (2012)

    Google Scholar 

  6. Forouzan, B.A.: Data Communications and Networking. McGraw-Hill, New York (2007)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thien Wan Au .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Rahman, F.H.M.A., Au, T.W. (2017). Performance Analysis of MANET Under Black Hole Attack Using AODV, OLSR and TORA. In: Phon-Amnuaisuk, S., Au, TW., Omar, S. (eds) Computational Intelligence in Information Systems. CIIS 2016. Advances in Intelligent Systems and Computing, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-319-48517-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48517-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48516-4

  • Online ISBN: 978-3-319-48517-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics