Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET

M. Dhivyaa*, K.R. Deepak**
* PG Scholar, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Erode, India.
** Assistant Professor, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Erode, India.
Periodicity:May - July'2015
DOI : https://doi.org/10.26634/jmt.2.2.4874

Abstract

Mobile Ad-hoc Network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other. MANETs are infrastructure-less, lack of centralized monitoring and dynamic changing network topology. So, this network is highly vulnerable to attacks due to the open medium. Wormhole attack is difficult to detect because they do not create any separate packets. In this paper, performance of wormhole attack is analyzed using DYMO and FSR routing protocol. The result analysis shows the impact of wormhole attack on MANETs in terms of throughput, average end-to-end delay, average jitter and packet delivery ratio.

Keywords

MANETs, Wormhole Attack, Wormhole Attack Classification, DYMO, FSR

How to Cite this Article?

Dhivyaa, M., and Deepak, K.R. (2015). Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 37-42. https://doi.org/10.26634/jmt.2.2.4874

References

[1]. Saloni Sharma, and Anuj Kumar Gupta, (2003). “A Comprehensive Study of DYMO Routing Protocol”. International Journal of Computer Applications, Vol. 73, No. 22, pp. 23-28.
[2]. Pardeep Kaur, (2014). “Performance Evaluation of Routing Protocols in MANETs under Wormhole Attack”. Journal of Emerging Technologies in Web Intelligence, Vol 6, No. 4.
[3]. Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi (2006). “performance comparison of routing protocols in mobile ad hoc networks”. International Journal of UbiComp, Vol. 6, No. 2, pp. 1-11.
[4]. Guangyu Pei Gerla and Tsu-Wei Chen Mario, (2001). “Fisheye State Routing in Mobile Ad Hoc Networks”. IETF MANET Working Group INTERNET-DRAFT. .
[5]. Zainab Dalaf Katheeth, and K.K. Raman, (2014). “Performance Evaluation with Throughput and Packet Delivery Ratio for Mobile Ad-hoc Networks”. International Journal of Advanced Resaerch in Computer and Communication Engineering, Vol. 3, No. 5
[6]. Akansha Shrivastava and Rajni Dubey, (2015). “Wormhole Attack in Mobile Ad-hoc Network: A Survey”. International Journal of Security and Its Applications, Vol. 9,No. 7 , pp. 293-298
[7]. Marianne, and Magdy El-Soudani, (2009). “A Full Image of the Wormhole Attacks: Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks”. International Journal of computer science and Information Security, Vol. 1, No. 1, pp. 41-52.
[8]. S.S. Tyagi, and R.K. Chauhan, (2010). “Performance Analysis of Proactive and Reactive Routing Protocols for Adhoc Network”. International Journal of Computer Applications, Vol. 1, No. 14, pp. 27-30.
[9]. Muneer Alshowkan, Eman Abdel Fattah, and Ammar Odeh, (2012). “Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET”. International Journal of Computer Applications, Vol. 49, No. 11, pp. 29-33.
[10]. Neha Pharswan, and Rama Sushil, (2014). “A Comparative Study oF Routing Protocols in Mobile Ad-hoc Network”. International Journal of Innovations & Advancement in Computer Science, Vol, 2, No. 2, pp. 50-54.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.