2018
DOI: 10.17706/jcp.13.2.222-235
|View full text |Cite
|
Sign up to set email alerts
|

VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network

Abstract: Mobile Ad hoc Network is a collection of wireless mobile nodes that dynamically creates network without a fixed infrastructure. However, all the characters make the security problems, such as Blackhole, Grayhole attacks. In this article, we propose Valid Route Authentication mechanism (VRA) for security, and integrating VRA into the discovery route process of AODV protocol. Improved protocol named VRA-AODV which can detect Black and Grayhole attacks. Using NS2, we compare the performance of AODV and improved p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…After researchers set up the simulation environment and define the parameters needed to control the MANET environment, the results of the simulation tool need to be evaluated. To analyze the network performance, some metrics are used as follows:  THPT: Throughput is the rate of successfully delivered packets that reached the receiver node per time slot [43]. Throughput is affected by topology changes, noise on communication links, the power of transmission from the source node, and the existence of malicious nodes affecting the throughput ratio.…”
Section: Evaluation Metrics and Performance Analysis In Manetsmentioning
confidence: 99%
See 1 more Smart Citation
“…After researchers set up the simulation environment and define the parameters needed to control the MANET environment, the results of the simulation tool need to be evaluated. To analyze the network performance, some metrics are used as follows:  THPT: Throughput is the rate of successfully delivered packets that reached the receiver node per time slot [43]. Throughput is affected by topology changes, noise on communication links, the power of transmission from the source node, and the existence of malicious nodes affecting the throughput ratio.…”
Section: Evaluation Metrics and Performance Analysis In Manetsmentioning
confidence: 99%
“…THPT: Throughput is the rate of successfully delivered packets that reached the receiver node per time slot [43]. Throughput is affected by topology changes, noise on communication links, the power of transmission from the source node, and the existence of malicious nodes affecting the throughput ratio.…”
Section: Evaluation Metrics and Performance Analysis In Manetsmentioning
confidence: 99%