Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network

This paper discussed about two proactive protocols which are DSDV and OLSR as well as two reactive protocols which are AODV and DSR. In addition, security analyses have been conducted and it covered the possible attacks that can be implemented against Mobile Ad-hoc Network (MANET). Furthermore, anal...

Full description

Saved in:
Bibliographic Details
Main Authors: Omar, Malek Najib, Thorig, Ibrahim, Salleh, Mazleena, Razzaque, Mohammad Abdur
Format: Conference or Workshop Item
Language:English
Published: 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/61015/1/MazleenaSalleh2014_PerformanceandSecurityAnalysisforProactive.pdf
http://eprints.utm.my/id/eprint/61015/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.61015
record_format eprints
spelling my.utm.610152017-03-12T08:10:58Z http://eprints.utm.my/id/eprint/61015/ Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network Omar, Malek Najib Thorig, Ibrahim Salleh, Mazleena Razzaque, Mohammad Abdur QA75 Electronic computers. Computer science This paper discussed about two proactive protocols which are DSDV and OLSR as well as two reactive protocols which are AODV and DSR. In addition, security analyses have been conducted and it covered the possible attacks that can be implemented against Mobile Ad-hoc Network (MANET). Furthermore, analysis and the comparison studies of the routing protocols in MANET that is conducted by simulation are discussed. The metrics have been used to compare these routing protocols are throughput, end to end delay, packet delivery ratio fraction verses the number of nodes in AODV and DSR. A black hole security attack was simulated and analyzed for DSDV, AODV and DSR. This study also investigated the impact of the increased in number of nodes used in the simulation to have more accurate results for the analysis. 2014 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/61015/1/MazleenaSalleh2014_PerformanceandSecurityAnalysisforProactive.pdf Omar, Malek Najib and Thorig, Ibrahim and Salleh, Mazleena and Razzaque, Mohammad Abdur (2014) Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network. In: 1st International Conference of Recent Trends in Information and Communication Technology (IRICT 2014), 12-13 Sept, 2014, Skudai, Johor.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Omar, Malek Najib
Thorig, Ibrahim
Salleh, Mazleena
Razzaque, Mohammad Abdur
Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
description This paper discussed about two proactive protocols which are DSDV and OLSR as well as two reactive protocols which are AODV and DSR. In addition, security analyses have been conducted and it covered the possible attacks that can be implemented against Mobile Ad-hoc Network (MANET). Furthermore, analysis and the comparison studies of the routing protocols in MANET that is conducted by simulation are discussed. The metrics have been used to compare these routing protocols are throughput, end to end delay, packet delivery ratio fraction verses the number of nodes in AODV and DSR. A black hole security attack was simulated and analyzed for DSDV, AODV and DSR. This study also investigated the impact of the increased in number of nodes used in the simulation to have more accurate results for the analysis.
format Conference or Workshop Item
author Omar, Malek Najib
Thorig, Ibrahim
Salleh, Mazleena
Razzaque, Mohammad Abdur
author_facet Omar, Malek Najib
Thorig, Ibrahim
Salleh, Mazleena
Razzaque, Mohammad Abdur
author_sort Omar, Malek Najib
title Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
title_short Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
title_full Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
title_fullStr Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
title_full_unstemmed Performance and security analysis for proactive and reactive protocols in mobile Ad-hoc network
title_sort performance and security analysis for proactive and reactive protocols in mobile ad-hoc network
publishDate 2014
url http://eprints.utm.my/id/eprint/61015/1/MazleenaSalleh2014_PerformanceandSecurityAnalysisforProactive.pdf
http://eprints.utm.my/id/eprint/61015/
_version_ 1643655044000645120
score 13.18916