Abstract
Black Hole attack is one of the many attacks that can occur on a MANET. It works on the network layer by dropping all incoming packets instead of forwarding them to the destinations. MANET conveys communication in a multi-hop manner from the source node to the destination. But without any security means, the effects of such attack on MANET can disrupt the performance and operations of the network. This paper describes the effect of the attack on MANET that is using AODV, OLSR and TORA routing protocols with the introduction of IPSec protocol under the influence of Black Hole attack. The simulation of the attack is achieved using Riverbed Modeler Academic Edition. Based on the Black Hole attack simulations, MANET suffered the lowest throughput when it is using TORA and the highest using OLSR routing protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Godwin, P.J., Srivinasan, R.: A survey on MANET security challenges, attacks, and its countermeasures. Int. J. Emerg. Trends Technol. Comput. Sci. 3(1), 274–279 (2014)
Ullah, I., Anwar, S.: Effects of black hole attack on MANET using reactive and proactive protocols. Int. J. Comput. Sci. Issues 10(3), 152–159 (2013)
Singh, H., Singh, G., Singh, M.: Performance evaluation of mobile ad hoc network routing protocols under black hole attack. Int. J. Comput. Appl. 42(18), 1–6 (2012)
Jasvinder, Sachdeva, M.: Effects of black hole attack on an AODV routing protocol through the using of Opnet simulator. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(8), 657–664 (2013)
Eastom, W.: Computer Security Fundamentals. Pearson, New York (2012)
Forouzan, B.A.: Data Communications and Networking. McGraw-Hill, New York (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Rahman, F.H.M.A., Au, T.W. (2017). Performance Analysis of MANET Under Black Hole Attack Using AODV, OLSR and TORA. In: Phon-Amnuaisuk, S., Au, TW., Omar, S. (eds) Computational Intelligence in Information Systems. CIIS 2016. Advances in Intelligent Systems and Computing, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-319-48517-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-48517-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48516-4
Online ISBN: 978-3-319-48517-1
eBook Packages: EngineeringEngineering (R0)