z-logo
open-access-imgOpen Access
Analysis of Throughput and Energy Consumption in MANET using IALERT Routing Protocol
Author(s) -
Lohit Kumar,
Vishali Sharma
Publication year - 2014
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/16646-6619
Subject(s) - computer science , throughput , protocol (science) , computer network , mobile ad hoc network , energy consumption , routing protocol , zone routing protocol , routing (electronic design automation) , wireless routing protocol , telecommunications , wireless , electrical engineering , medicine , network packet , engineering , alternative medicine , pathology
ad hoc Network consist of mobile nodes which do require neither a base station nor any fixed infrastructure. Nodes which are far apart from each other communicate hop by hop. An efficient routing protocol is required between the nodes to communicate. MANETs are not immune to attacks. In this paper we have implemented wormhole attack which is a type of active attack which disturbs the normal functioning of network and IALERT routing protocol. We have compared two parameters that are throughput and energy consumption of both our tcl files named wormhole and isolate. In wormhole file we have applied the attack and in the isolate file we have countered that attack. Results and simulations show that the throughput of isolate file is better than wormhole file and energy consumption of isolate file is less than wormhole file. digital certificates in ad hoc networks. But internal attackers are very difficult to find even its presence in the group due to its valid membership in the multicast group. Internal attackers are authenticated nodes do malicious activities in order to disturb the network and routing functionalities easily since they are all authorized members to access the network services. These attacks are more severe than attacks launched by external adversaries because internal adversaries can succeed the cryptosystem of the network. The intentions of internal attack are varies into; handler for an external intruder to launch its attack, selfishness and simply disturb the network without any intention. The node that executes internal attacks called compromised nodes or malicious node. The activities of internal attacks are; packet dropping, selective packet forwarding, forwarding packets to incorrect node, message fabrication, refused to cooperate as defined by routing protocol, sending false reply and Denial of Service (10). In this paper IALERT routing protocol has been implemented which dynamically partitions the network field horizontally and vertically and chooses a node for communication with all the other nodes. All the remaining nodes form cluster and the chosen node communicates with the clusters of nodes one by one. 49 nodes and wormhole attack has been implemented. Two tcl files name wormhole and isolate are made. In the first tcl file wormhole attack has been implemented on 7 th node at 110 seconds. So due to wormhole attack after 110 seconds node 7 will start to drop the packets. In second tcl file wormhole attack has been countered. So after 110 seconds node 7 will still communicate.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom