CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Analysis of Black Hole Attack in MANET Using DSR and OLSR Routing Protocols

عنوان مقاله: Analysis of Black Hole Attack in MANET Using DSR and OLSR Routing Protocols
شناسه ملی مقاله: COMCONF02_146
منتشر شده در دومین کنفرانس بین المللی یافته های نوین پژوهشی در مهندسی برق و علوم کامپیوتر در سال 1395
مشخصات نویسندگان مقاله:

Amin Mohajer - Faculty of Information, Communications and Security TechnologyMalek Ashtar University of TechnologyTehran, Iran
Morteza Barari - Faculty of Information, Communications and Security TechnologyMalek Ashtar University of TechnologyTehran, Iran
Abbas Mirzaei - Faculty of Computer Engineering and Information TechnologyIslamic Azad UniversityArdabil, Iran
Somayeh Feizi - Faculty of Computer Engineering and Information TechnologyIslamic Azad UniversityArdabil, Iran

خلاصه مقاله:
Mobile Ad hoc Networks (MANET), don’t have the basic and classic network devices, such as routers or access points. In these networks data transfer among the nodes is realized by collaboration among multiple hops that rather than just serving as a single terminal, act also as a router to establish a route. But, such networks are vulnerable to a type of routing misbehavior, called Black Hole attack. In this attack, an attacker cheats nodes, absorbs their packets and then deletes them. Hence, Black Hole disrupts communication, or even makes it impossible in some cases. In this paper, we analysis Black Hole attack in MANET using DSR and OLSR routing protocol and the vulnerability of both protocol analysis, The network performance evaluation scenario is implemented in ns-2 environment and is compared with DSR and OLSR protocol in different scenarios. Simulation results show that the defence is more efficient than DSR protocol in terms of packet delivery ratio, end to end delay, throughput and packet dropped rate.

کلمات کلیدی:
Mobile Ad Hoc networks, DSR routing protocol, Black Hole attack, OLSR

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/545956/