Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5942
Title: Identifying the impacts of node mobility on network layer based active and passive attacks in mobile ad hoc networks: a simulation perspective
Authors: Uthumansa, Ahamed
Shantha, Fernando
Keywords: Node mobility
Active attacks
Passive attacks
Simulation study
Issue Date: 20-May-2021
Publisher: Springer Nature, Switzerland.
Citation: COMS2 2021, Communications in Computer and Information Science-CCIS-1416; pp. 262–275.
Series/Report no.: ;18
Abstract: Ad hoc On-demand Distance Vector Routing (AODV) is a routing protocol that is used in Mobile Ad hoc Network (MANET). Pure AODV protocol is failed to handle the security. In this research, we try to find the answers for the following research questions to upgrade AODV protocol in security concern. I). Does node mobility in a MANET impact the behavior of a malicious node? II). Is node mobility need to be considered when designing appropriate security countermeasures? We used Network Simulator 2 (NS2) for simulations and AODV as routing protocol. Blackhole and Grayhole attacks are selected to study the network layer based Active attacks and Wormhole attack is used for Passive attack. We observed the impacts of each attacks by changing the speed of nodes and the numbers of connected node in the network. We changed the directions of node mobility randomly during the simulation. Though node speed is constant for all nodes. Number of nodes and nodes speed are changed to collect more accurate results. We compared the performances of each network with a controller. Few Performance Matrices (PM) (Packet Delivery Ratio (PDR), End to End Delay (EED) and Throughput) are used to evaluate the network performances. Mobile nodes degrade the network performances. Node mobility either leads to break the links between nodes nor to create new links. Therefore it creates an opportunity to break the link with malicious node. We can screen the malicious node at routing if a routing protocol is equipped with an initial screening mechanism for malicious nodes.
URI: http://ir.lib.seu.ac.lk/handle/123456789/5942
ISBN: 978-3-030-76776-1
Appears in Collections:Books and Chapters of Books

Files in This Item:
File Description SizeFormat 
Uthumansa Ahamed.pdf200.78 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.