
An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET
Author(s) -
Sanjay Kumar,
E. Suresh Babu,
C. Nagaraju,
Arepalli Peda Gopi
Publication year - 2015
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v5i5.pp1102-1110
Subject(s) - computer science , computer network , ad hoc on demand distance vector routing , routing protocol , network packet , throughput , routing (electronic design automation) , mobile ad hoc network , link state routing protocol , computer security , telecommunications , wireless
Over the last decade, researchers had proposed numerous mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent. In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.