Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5943
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUthumansa, Ahamed-
dc.contributor.authorShantha, Fernando-
dc.date.accessioned2022-01-05T10:24:14Z-
dc.date.available2022-01-05T10:24:14Z-
dc.date.issued2021-08-15-
dc.identifier.citationJournal of Information Systems & Information Technology(JISIT), Vol.6(1): 28-42.en_US
dc.identifier.issn2478-0677-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5943-
dc.description.abstractThe opportunistic nature of the Mobile Ad-hoc Network (MANET) helps to deploy instantly where it is needed. MANET is the best solution as a network where infrastructure networks are unavailable. The fundamental characters of these networks are the reason for the vast variety of security attacks on them. Simulators provide a better platform to conduct research, though faulty designs of simulations provide incorrect results. Therefore, the issue remains available for a valid solution. We designed the study to investigate the network layer-based security attacks. The study included a detailed information of different attack simulations. Network Simulator 2 (NS2) was used. Ad-hoc On-demand Vector (AODV) routing protocol was used for the study. The Blackhole, Grayhole, and Wormhole attacks were simulated. The impacts of these attacks on the network performance were evaluated with Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time of an Intermediate node (SPTIN). The active attacks caused more damages to the network performance than passive attacks do. Moreover, the results proved that the impacts of an attack depend on the design of the attack. The incorrect design provides faulty results which lead to ill decisions. We are expecting to extend the simulation of different security attacks based on different simulators.en_US
dc.description.sponsorshipNullen_US
dc.language.isoen_USen_US
dc.publisherFaculty of Management and Commerce, South Eastern University Of Sri Lanka (SEUSL), University Park, Oluvil.en_US
dc.relation.ispartofseries;3-
dc.subjectBlackholeen_US
dc.subjectGrayholeen_US
dc.subjectSecurityen_US
dc.subjectSimulationen_US
dc.subjectWormholeen_US
dc.titleSimulation of network layer-based security attacks in a mobile ad-hoc networken_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
JISIT 2021 Volume 6 No 1 Paper 3 Page 28 42.pdf304.73 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.