Analysis of security attacks on AODV routing

MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. Thes...

Full description

Saved in:
Bibliographic Details
Published in8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) pp. 290 - 295
Main Authors Abdelshafy, Mohamed A., King, Peter S. B.
Format Conference Proceeding
LanguageEnglish
Published Infonomics Society 01.12.2013
Subjects
Online AccessGet full text

Cover

Loading…
Abstract MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.
AbstractList MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.
Author Abdelshafy, Mohamed A.
King, Peter S. B.
Author_xml – sequence: 1
  givenname: Mohamed A.
  surname: Abdelshafy
  fullname: Abdelshafy, Mohamed A.
  email: ma814@hw.ac.uk
  organization: Sch. of Math. & Comput. Sci., Heriot-Watt Univ., Edinburgh, UK
– sequence: 2
  givenname: Peter S. B.
  surname: King
  fullname: King, Peter S. B.
  email: PJ.B.King@hw.ac.uk
  organization: Sch. of Math. & Comput. Sci., Heriot-Watt Univ., Edinburgh, UK
BookMark eNotj71qwzAURlVohybNE2TRA9TuvZItS6Nx_wyBDHWzBsm6KqKpXGxn8Ns30Ewf5wwHvhW7TUMixrYIOSKYp7Zpu48uF4AyV1UJAswNW6EBLcUF1D17rJM9LVOc-BD4RP15jPPC7Tzb_vviEq_3zwc-Duc5pq8HdhfsaaLNddfs8_Wla96z3f6tbepdFlFpk1lPEmVZ-d55AJK6ACoL7QoXeizBh8pppYQUAh0GsoAKlLdGSSrQGiPXbPvfjUR0_B3jjx2X4_WA_ANV_z5o
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICITST.2013.6750209
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1908320206
9781908320209
EndPage 295
ExternalDocumentID 6750209
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i1689-ade31357dcbd00e3840e548b4bfc150df7b86623221b1fea01606da963e41a993
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:04 EDT 2023
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i1689-ade31357dcbd00e3840e548b4bfc150df7b86623221b1fea01606da963e41a993
OpenAccessLink https://pure.coventry.ac.uk/ws/files/21701005/Binder2.pdf
PageCount 6
ParticipantIDs ieee_primary_6750209
PublicationCentury 2000
PublicationDate 20131201
PublicationDateYYYYMMDD 2013-12-01
PublicationDate_xml – month: 12
  year: 2013
  text: 20131201
  day: 01
PublicationDecade 2010
PublicationTitle 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
PublicationTitleAbbrev ICITST
PublicationYear 2013
Publisher Infonomics Society
Publisher_xml – name: Infonomics Society
Score 1.6306037
Snippet MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a...
SourceID ieee
SourceType Publisher
StartPage 290
SubjectTerms Cryptography
Educational institutions
Floods
Mobile ad hoc networks
Routing protocols
Title Analysis of security attacks on AODV routing
URI https://ieeexplore.ieee.org/document/6750209
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5OBx7Zr-yJqjTMcmTAU72W0kzSuI0MrWXvzrfWm7ieLBWwiBJC8J70vyve8B3ER-ZDLaCE7qceOQx1OOlql0VOzzgBC5Edq-Qy4exWwZPqyiVQeG-1gYRKzJZ-jaYv2Xb4q0sk9lIwK3hG5kF7pjKZtYrVZIiHtyNJ_Mk5fEsrUCt235I2VK7TGmh7DY9dUQRd7dqtRu-vlLhvG_gzmCwXdsHnvee51j6GDeh-FOW4QVGdu2KemYKksbQc-KnN0-3b2yTVFZkvMAltP7ZDJz2jwIzhsXMdnNYMCDaGxSbTwPA7qTIV00dKizlPAc2VrHgmCM73PNM1RWNE4YRUcLQ64IgJxALy9yPAXmx0oEvoktEybUIlLCaHsKY4WEVFCdQd_OdP3RSF2s20me_119AQfW2g274xJ65abCK_LRpb6uF-cL356RWg
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV844GxSeN8mGREhaqFtiCRom6VHV8khJSgkiz8es5JWgRiYLMsS7bPtu7ZfvcO4CpwA53SRrASh2uLPJ60VJRElgxd7hEi10KZd8jpTIzm_v0iWLSgt4mFQcSKfIa2KVZ_-TpPSvNU1idwS-gm2oJtwtWhqKO1Gikh7kT98WAcP8eGr-XZTdsfSVMqnzHcg-m6t5oq8maXhbKTz19CjP8dzj50v6Pz2NPG7xxAC7MO9NbqIixP2UeTlI7JojAx9CzP2M3j7Qtb5aWhOXdhPryLByOryYRgvXIRkuU0etwLrnWitOOgR7cypKuG8lWaEKIja6tQEJBxXa54itLIxgkt6XChzyVBkENoZ3mGR8DcUArP1aHhwvhKBFJoZc5hKJGwCspj6JiZLt9rsYtlM8mTv6svYWcUTyfLyXj2cAq7xvI11-MM2sWqxHPy2IW6qBbqC63AlKU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=8th+International+Conference+for+Internet+Technology+and+Secured+Transactions+%28ICITST-2013%29&rft.atitle=Analysis+of+security+attacks+on+AODV+routing&rft.au=Abdelshafy%2C+Mohamed+A.&rft.au=King%2C+Peter+S.+B.&rft.date=2013-12-01&rft.pub=Infonomics+Society&rft.spage=290&rft.epage=295&rft_id=info:doi/10.1109%2FICITST.2013.6750209&rft.externalDocID=6750209