A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
Publish place: Journal of Computer and Robotics، Vol: 8، Issue: 2
Publish Year: 1394
Type: Journal paper
Language: English
View: 408
This Paper With 8 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_JCR-8-2_004
Index date: 13 January 2018
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks abstract
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other.
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks Keywords:
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks authors
Maryam Fathi Ahmadsaraei
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran
Abolfazl Toroghi Haghighat
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran