Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/isias.2007.4299750
|View full text |Cite
|
Sign up to set email alerts
|

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

Abstract: The unique characteristics of a mobile ad hoc network (MANET)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Bo et al [18] have compared DSDS, DSR and AODV under security attack where misbehavior of nodes was investigated. Network performance was evaluated in terms of Normalized throughput, Routing overhead, Normalized routing load and Average packet delay.…”
Section: Related Workmentioning
confidence: 99%
“…Bo et al [18] have compared DSDS, DSR and AODV under security attack where misbehavior of nodes was investigated. Network performance was evaluated in terms of Normalized throughput, Routing overhead, Normalized routing load and Average packet delay.…”
Section: Related Workmentioning
confidence: 99%
“…New type of nodes are defined as the type 3 nodes [3] showing malicious behavior. Malicious nodes aim at damaging the working of other nodes by causing network outage by partitioning the network, by flooding the network, by sending forged routing packets, by replication of stale packets, etc.…”
Section: Routing Misbehaviorsmentioning
confidence: 99%
“…Most of the research so far has been done in the area of routing protocols [4,8]; although in recent year's security issues have also been explored. Some secure routing protocols have been proposed to protect routing messages and prevent attackers from either modifying these messages or injecting harmful routing messages into the network [3,5,8,14].…”
Section: Introductionmentioning
confidence: 99%
“…Current efforts toward the design of secure routing protocols are mainly oriented to on-demand protocols because of the advantages of reactive protocols over proactive protocols already mentioned in the previous section. Performance comparison performed on routing protocols by Bo et al [47] shows that for both on-demand protocols AODV and DSR, throughput declines, average packet delay is high, and the overall performance degrades under security attacks. Therefore, SRP was selected as a candidate protocol for comparing performance under security attacks.…”
Section: Srpmentioning
confidence: 99%