A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
Publish place: Journal of Computer and Robotics، Vol: 8، Issue: 2
Publish Year: 1394
نوع سند: مقاله ژورنالی
زبان: English
View: 336
This Paper With 8 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_JCR-8-2_004
تاریخ نمایه سازی: 23 دی 1396
Abstract:
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other.
Keywords:
Authors
Maryam Fathi Ahmadsaraei
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran
Abolfazl Toroghi Haghighat
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran