Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET

Authors

  • G Kalpana Computer Science, Bharathiar University, India
  • S Archana Computer Science, Bharathiar University, India

Keywords:

MANET, AODV, DSR, Wormhole

Abstract

An ad hoc network refers to a network connection established for a single session and does not essential a router or a wireless base station. A MANET is a collection of mobile nodes connected through wireless networks. MANET can join and leave the network dynamically. However, MANET is particularly vulnerable due to its fundamental characteristics, such as dynamic topology, distributed co-operation, and constrained capability. One main challenge on designing these networks is their vulnerability to security attacks.In this paper the performance of Threshold Based Algorithms using routing protocols AODV and DSR with wormhole attack detection  have been analysed using NS2 considering various parameters such as packet delivery ratio and average throughput to evaluate its performance.

References

V. Mahajan, M. Natu, A. Sethi. “Analysis of wormhole intrusion attacks in MANETS”. In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008.

Dipali Koshti,” Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, 2011.

S.Archana, Dr.G.Kalpana, “ A Survey on Security Attacks in Mobile Ad Hoc Network”, National Conference on INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY(NCITIT) ISBN:978-93-84743-32-1,7 FEB-2015

Chattopadhyay, Mekhala. AN APPROACH TO DETECT WORMHOLE ATTACK IN AODV BASED MANET. Diss. Jadavpur University Kolkata-700032 India 2014.

S.Archana, Dr.G.Kalpana, “A Comparative Analysis of AODV and DSR Protocol under Wormhole Attack in MANET”, International Conference on Innovation Information and Embedded and Communication System, March-2015

Perkins CE, Royer EM, Chakeres “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF , October, 2003.

Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication”, International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) 265, 2010.

F. Nait-Abdesselam, B. Bensaou, T. Taleb. “Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks”, IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.

Network Simulator 2. http://isi. edu/nsnam/ns/

Saurabh Upadhyay and Aruna Bajpai, Avoiding Wormhole Attack in MANET using Statistical Analysis Approach, International Journal on Cryptography and Information Security(IJCIS),Vol.2, No.1,March 2012.

K.Santhi and Dr.M.Punithavalli “Optimized Reliable And Load Balanced Routing Protocol For Mobile Ad

Hoc Networks” -Journal of Theoretical and Applied Information Technology (JATIT))-Vol.51 No.3 May 2013

Reshmi Maulik and Nabendu Chaki, “A Study on Wormhole Attacks in MANET”, International Journal of Computer Information Systems and Industrial Management Applications, ISSN 2150-7988 Volume 3 (2011) pp. 271-279.

Mohammed Saeed Alkatheiri, Jianwei Liu and Abdur Rashid Sangi, “AODV Routing Protocol Under Several Routing Attacks in MANETs”, 978-1-61284-307-0/11, IEEE, 2011.

Shalini Jain, Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile adhoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 pp 1793-8201.

R. Vembu, R. Syed Hayath, “ Methodology For Comparing Reactive Routing Protocols To Detect And Prevent The Wormhole Attack Using Path Tracing Approach” IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) e-ISSN: 2278-2834, p-ISSN: 2278-8735 PP 12-17.

Downloads

Published

2025-11-10

How to Cite

[1]
G. Kalpana and S. Archana, “Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET”, Int. J. Comp. Sci. Eng., vol. 3, no. 7, pp. 133–138, Nov. 2025.

Issue

Section

Research Article