MANETS are connected and established between mobile nodes temporarily for a short period of time for the purpose of sharing information and exchanging messages among the source and destinations nodes. Since the length is normally very small therefore maximum throughput is necessary in order to exploit the entire communication period. Nodes which are part of this network behave both as the host and the router for the other communicating nodes. The main purpose of this research work is to simulate and analyzed the performance of proactive and reactive routing protocols of MANET under TCP and CBR traffic. In this work we have simulated and compared the performance of the three common and well known MANET routing protocols. We have use DSR and AODV as reactive routing protocols, DSDV as proactive routing protocols. Belligerent research in this area has been done since then with famous studies on Dynamic Source Routing, Ad hoc on demand Distance Vector and Destination Sequenced Distance Vector routing protocol. The simulations are performed and completed using Network Simulator version 2.35(NS-2.35) and the post analyses are performed by using awk script. To simulate and analyze the performance of the above routing protocols we have used Packet Delivery Ratio, Number of Packets Dropped and Throughput performance evaluation metrics. After simulating, measuring and analyzing the performance of thus routing protocols we are explore the effect of change in number of nodes on MANET reactive and proactive routing protocols. It has been observed from the simulation part Reactive protocols (AODV and DSR) are better than proactive routing protocols (DSDV) in terms of packet delivery ratio and throughput in case of both traffics i.e. TCP and CBR. But in the case of number of dropped packets of both 50 and 100 nodes with pause time shows that proactive routing (DSDV) have less number of dropped packets with TCP traffic.
Mobile adhoc networks (MANETs) are composed of independent and self organized nodes without the need of any infrastructure. Mobile adhoc networks consist of mobile devices that are freely moving inside and outside in the network. These devices can operate as a host, a router or both at the same time. These nodes have the ability to organize themselves because of their self configurable capability; they can be organized immediately without the help of any infrastructure. Due to various features like open medium, dynamic topology, lack of defensive mechanism, makes MANET more susceptible to security problems and attacks. Ad hoc On-Demand Distance vector routing protocol (AODV) is one of the best and most popular routing protocols in MANET. This routing protocol is frequently affected by well known black hole attack in which it injects a forged route reply message that considers as it has a fresh enough route to destination node. In this research we have modified AODV routing protocol to implement blackhole attack in NS-2 and measure its impact on the performance of AODV routing protocol by using different performance metrics like Average Throughput, Normalized Routing Overhead, Packet Delivery Ratio, and Number of Dropped Packets. After measuring the impacts of blackhole attack on the performance of normal AODV routing protocol we have implemented and simulated our proposed solution to prevent and minimize the effects of blackhole attack using NS-2. The proposed solution is implemented in NS-2 using AES symmetric cryptographic technique and digital signature schemes to secure AODV routing protocol of MANET from blackhole attack. After implementing and integrating our proposed solution in to NS-2, we have measured and analyzed the result of our proposed solution through NS-2 simulator with various network performance parameters. The simulation result shows that the proposed solution effectively prevents and minimizes the effects of blackhole attack in AODV routing protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.