Abstract
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of both DSR and its flow-state extension routing protocols in the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of flow-state DSR is better than DSR in the presence of all attacks. Flooding attacks are found to dramatically impact all the standard performance metrics. Blackhole attacks significantly worse the packet delivery ratio in a static network using unmodified DSR. All the attacks greatly increase the end-to-end delay; an effect particularly marked in a static network.
Original language | English |
---|---|
Title of host publication | 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) |
Publisher | IEEE |
Pages | 174-180 |
Number of pages | 7 |
ISBN (Print) | 9781467380515 |
DOIs | |
Publication status | Published - 2015 |
Event | 7th International Workshop on Reliable Networks Design and Modeling 2015 - Munich, Germany Duration: 5 Oct 2015 → 7 Oct 2015 |
Conference
Conference | 7th International Workshop on Reliable Networks Design and Modeling 2015 |
---|---|
Country/Territory | Germany |
City | Munich |
Period | 5/10/15 → 7/10/15 |
Keywords
- Attack
- Blackhole
- DSR
- Flooding
- Flow-state
- Grayhole
- MANET
- Routing
- Security
- Selfish
ASJC Scopus subject areas
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality
- Control and Systems Engineering