Analysis of AODV & DSR Routing Protocols in Presence of Malicious Nodes for Hybrid Network
Abstract
Routing in hybrid network is emerging area of research due to different connectivity of network. Hybrid network is a combination of wireless and wired networks. It is very difficult to route a packet in both the network using single protocol. The existing routing protocols are not able to perform in both the network simultaneously. On the other hand if any node behaving like malicious and creates attack on network, than whole communication will be squeeze. This paper analyses AODV and DSR routing protocols for hybrid networks in presence of malicious node. The simulation has been done on QualNet 5.0. The results are discussed in the paper.
Keywords: Hybrid network, AODV, DSR, malicious nodes
Cite this Article
Jahan et al. Analysis of AODV & DSR Routing Protocols in Presence of Malicious Nodes for Hybrid Network. Recent Trends in Parallel Computing. 2016; 3(1): 27–33p.
Full Text:
PDFReferences
Rappaport TS. Wireless Communications: Principles and Practice. Prentice-Hall. 1996.
Iwata A et al. Scalable Routing Strategies for Ad-hoc Wireless Networks. IEEE JSAC. 1999: 1369–79p.
Gadkari Mushtak Y, Sambre Nitin B. VANET: Routing Protocols, Security Issues and Simulation Tools. IOSR Journal of Computer Engineering. 2012; July–Aug.
Mizukoshi M, Munetomo M. Distributed denial of services attack protection system with genetic algorithms on Hadoop cluster computing framework. Evolutionary Computation (CEC), 2015 IEEE Congress on, Sendai. 2015: 1575-1580p.
Zhao H, Hu J, Qin J, Varadharajan V, Wan H. Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, Liverpool. 2012: 706–713p.
Zhang K, Liang X, Lu R, Shen X. Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet of Things Journal. 2014; 1(5): 372–383p.
Gadkari Mushtak Y, Sambre Nitin B. VANET: Routing Protocols, Security Issues and Simulation Tools. IOSR Journal of Computer Engineering. 2012; July–Aug.
Kurosawa Satoshi, Nakayama Hidehisa, Kato Nei, Jamalipour Abbas, Nemoto Yoshiaki. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security. 2007; 5(3).
Perkins CE, Royer EM. Ad-Hoc On-Demand Distance Vector Routing. Proc. IEEE WMCSA’99, New Orleans, LA. 1999: 90–100p.
Johnson DB, Maltz DA. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, T. Imielinski and H. Korth, Eds. 1996; 5: 153–181p.
Qualnet Simulator Documentation. Qualnet 5.0 User`s Guide. Scalable Network Technologies, Inc., Los Angeles, CA 90045. 2006.
Refbacks
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/