Abstract

Un-wired Computers (Mobile Computers) such as Laptops, Net-books, Notebooks and Personal Digital Assistants (PDAs) are the fastest growing segments of Computing Industry; this changing aspect of computing has led to the invention of Mobile Ad-Hoc Networks (MANET). Mobile Ad Hoc networking is a new era of infrastructure less communication networks for mobile devices (hosts, nodes etc.), where mobile nodes that are in radio range for each other can directly communicate with each other when in range and can even use intermediate nodes as routers when are moving away or are getting out of range from the connected nodes, this property along with the ability of switching from one network topology to another help in improving node mobility. Due to this mobility factor and undefined infrastructure security is a major concern in mobile Ad Hoc networks. In this paper we are providing a detailed analysis of the performance of ad-hoc routing protocol AODV in Mobile Ad Hoc networks with and without the presence of malicious node. We have used Qualnet version 5.0 (simulator) to measure the effect of attack on mobile ad-hoc networks that gives a clear picture for the throughput, variations in CBR, packet delivery delay, average jitter and end-to-end delay in mobile ad-hoc networks when attack effects the mobile ad-hoc network.

Highlights

  • Unwired computers (Mobile Computers) like Personal Digital Assistants (PDAs)’s, Laptops, Smart phones are the fastest growing industry of today’s computing segment as the world is becoming global, we need to cope up with the increasing pace of world and in this scenario these unwired computers play a vital role and proves to be very helpful when combined with Ad-Hoc networks

  • We have used Qualnet version 5.0 to measure the effect of Black-hole attack on mobile ad-hoc sensor networks and the plotted results gives a clear picture for the throughput, variations in CBR, packet delivery delay, average jitter and end-to-end delay in mobile ad-hoc networks when the presence of malicious nodes effecting the performance of AD HOC ON-DEMAND DISTANCE VECTOR (AODV) and mobile ad-hoc sensor networks

  • OVERVIEW OF CURRENT LITERATURE After going through many research articles and analyzing the work of several researchers in the field of mobile ad-hoc networks we focused on the working of AODV protocol and its behavior under certain undesirable circumstances

Read more

Summary

INTRODUCTION

Unwired computers (Mobile Computers) like PDA’s, Laptops, Smart phones are the fastest growing industry of today’s computing segment as the world is becoming global, we need to cope up with the increasing pace of world and in this scenario these unwired computers play a vital role and proves to be very helpful when combined with Ad-Hoc networks. The mobile nodes that are in radio range for each other can directly communicate with each other when in range and can even use intermediate nodes as routers when are moving away or are getting out of range from the connected nodes, this property along with the ability of switching from one network topology to another help in improving node mobility. Due to this mobility factor and undefined infrastructure, security is a major concern in mobile Ad Hoc networks. We have used Qualnet version 5.0 (simulator) to measure the effect of Black-hole attack on mobile ad-hoc sensor networks and the plotted results gives a clear picture for the throughput, variations in CBR, packet delivery delay, average jitter and end-to-end delay in mobile ad-hoc networks when the presence of malicious nodes effecting the performance of AODV and mobile ad-hoc sensor networks

CONCEPTUAL ARCHITECTURE OF MANET
Issues related to Security in Ad-hoc Networks
Sybil Attack
Wormhole attacks
Black-hole Attack
OVERVIEW OF CURRENT LITERATURE
SIMULATION PARAMETERS
Pause Time Vs Packet Drop Ratio
Packet Drop Ratio with Varying Node Speed
Throughput Vs Node Mobility
End to End Delay at AODV with respect to Node Speed
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call