Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July-September 2023, Volume 38 Issue 4
    Article

    AD HOC ON- DEMAND DISTANCE VECTOR AND DYNAMIC SOURCE ROUTING PROTOCOL FOR ENHANCING THE QOS OF THE MANET UNDER WORM HOLE ATTACK MODEL
    Versha Matre and Dr. Pradnya Ashish Vikhar
    Journal of Data Acquisition and Processing, 2023, 38 (4): 475-486 . 

    Abstract

    Mobile Ad hoc network (MANET) is a wireless network that has the capability to reconfigure itself without any centralized structure. This variety of network isn't in a situated number and configuration, but rather, it forms itself and allows for different nodes to adjoin in automatically. Since it has an adaptable and robust nature that makes it sensitive to attacks which could be fixed to the network really effortlessly. As an effect, the attacker would after serve as a sender or receiver for counterfeited packets. One of the most risky attacks of this network is wormhole attack. With wormhole attack, packets of data are transferred from one node to another dangerous node inside or outside the network. Thus, we hold in this work to study the aftereffect of a wormhole attack on two routing protocols, namely Ad hoc On- Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The comparison will subsist held in terms of two main network interpretation standards throughput and end- to- end delay. Network Simulator- 2 (NS- 2) will be applied to operate the simulation tests in this work and compute the effects. This study gives a substitute contribution to the field of network attacks. It provides a substitute Worm Hole Attack Model (WHAM), which will exist applied to MANET routing applying NS- 2 WHAM has existed referred to the protocols mentioned above to test their resistance and strength under the attack.

    Keyword

    Mobile ad hoc network (MANET); Routing Protocols; AODV; DSR; Wormhole Attack.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved
.