Analysis and Implementation of Malicious Node in AODV Routing Protocol

Bhupendra B Patel, Chirag S Thaker, Nidhi R Jani

Abstract


The Mobile Ad-hoc Network (MANET) is constructed based on wireless medium and it is of self organizing behaviour. MANET is easy to establish and having dynamic topology. The mobile Ad-hoc networks are vulnerable to various networks attacks because MANET operational environment is open and dynamic or live. MANET uses the Routing protocols for data transfer. Two different types of Routing protocols are available: Table Driven and On Demand Routing Protocols. Malicious node is the one type of mobile node but its work is completely different compared to normal Mobile nodes. Malicious nodes have capability to change or remove Routing Information. It also sends or advertises the fake Route Request to attract user’s data. Malicious node disturbs the Network to carry correct flow of operation. It is responsible for attacks on the existing normal mobile nodes and creates receiver collision, limited transmission power, false misbehaviour etc. Malicious or selfish node carries attacks on the networks so it directly effects to the routing Performance. The objective of this work is to check Network performance in malicious environment and provide prevention for the attack. Throughput and Delay are analysed for Denial of Service (DoS) attack and prevention scenarios.

Keywords: MANET, AODV, Selfish Node, DoS Attack, Routing Protocols


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org