首页    期刊浏览 2024年09月15日 星期日
登录注册

文章基本信息

  • 标题:An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET
  • 其他标题:An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET
  • 本地全文:下载
  • 作者:S. Ashok Kumar ; E. Suresh Babu ; C. Nagaraju
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2015
  • 卷号:5
  • 期号:5
  • 页码:1102-1110
  • DOI:10.11591/ijece.v5i5.pp1102-1110
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:Over the last decade, researchers had proposed numerous mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent. In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.
  • 其他摘要:Over the last decade, researchers had proposed numerous mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent. In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.
  • 关键词:telecommunication and information technology;MANETs; Routing Protocols; AODV; DSR; Rushing Attack.
国家哲学社会科学文献中心版权所有