Other Articles by Author(s)

Bhawna Singla
A. K. Verma
L. R. Raheja

Author(s) and WSEAS

Bhawna Singla
A. K. Verma
L. R. Raheja

WSEAS Transactions on Communications

Print ISSN: 1109-2742
E-ISSN: 2224-2864

Volume 16, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Performance Analysis of AODV in Presence of Attacks

AUTHORS: Bhawna Singla, A. K. Verma, L. R. Raheja

Download as PDF

ABSTRACT: Mobile Adhoc Network (MANET) is a combination of three words mobile means that are able to change their position + adhoc means temporary and network means autonomous collection of nodes. MANET is the subcategory of wireless network i.e. collection of nodes over wireless communication medium where all the node are capable to change their position so that topology of network keeps on changing. Routing protocol determines the route from source node to destination node. Adhoc on demand distance vector (AODV) routing protocol is a type of reactive routing protocol that determines the route whenever there is a requirement. However MANETs are vulnerable to number of attacks due to such as lack of centralized infrastructure, wireless medium and dynamic topology. In general, attacks can be categorized as active attack and passive attack depending on whether it’s intention is to monitor the traffic or to cause damage to the network. Specifically, in this paper blackhole attack , wormhole attack and selfish node attack are being observed on AODV routing protocol. Selfish node attack is caused by selfish node that selfishly stops forwarding of packet and blackhole and wormhole attacks are caused by malicious node. This paper presents introduction of all these attacks and then it analyzes the performance of AODV under these attacks. The comparative analysis of these attacks is done with the help of NS2 simulation in terms of: cumulative sum of packets, throughput, end-to-end delay. The packet Ids of all the dropped packets are also plotted. Moreover, optimal packet size for the maximum throughput is also observed.

KEYWORDS: AODV, blackhole, wormhole, selfish, throughput, end-to-end delay, packet size


[1]. Perkins, E. Royer , “Adhoc On-demand Distance Vector Routing”, Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 99–100, 1999

[2]. Deyu Lin , “Optimization and Realization of Adhoc On-Demand Distance Vector Routing Based on NS2”, Proceedings of First Information Computing and Applications , pp. 531-537, 2012

[3]. Bhawna Singla, A.K.Verma, L.R.Raheja, “Performance of AODV under different scale network”, Wulfenia , volume 20, no.3, March2013

[4]. Deng H, Li W, D.P. Agarwal, “Routing Security in Wireless Ad-hoc Networks” IEEE Communications Magazine 40(10):70–75. doi: 10.1109/MCOM.2002.1039859

[5]. B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Adhoc Networks,” Wireless/Mobile NetworkSecurity, Springer, volume 17, 2006.

[6]. Jerzy Konarski, “Selfishness Detection in Mobile Adhoc Networks: How Dissemination of Indirect Information Turns into a Strategic Issue”, Proceedings of the 2nd International Conference on Information Technology, ICIT 2010 , 28-30 June 2010

[7]. Kumar, Jebakumar Mohan Singh Pappaji Josh, et al. 'A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT.' EURASIP Journal on Wireless Communications and Networking 2015.1 (2015): 1-11.

[8]. Subramaniyan, Senthilkumar, William Johnson, and Karthikeyan Subramaniyan. 'A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique.' EURASIP Journal on Wireless Communications and Networking 2014.1 (2014): 205.

[9]. Kumar, Amit, Vijay K. Katiyar, and Kamal Kumar. 'A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-Hoc Networks.' Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer, Singapore, 2017.

[10]. Duan, Junqi, et al. 'TSRF: A trust-aware secure routing framework in wireless sensor networks.' International Journal of Distributed Sensor Networks 2014 (2014).

[11]. Das, Debjit, Koushik Majumder, and Anurag Dasgupta. 'Selfish node detection and low cost data transmission in MANET using game theory.' Procedia Computer Science 54 (2015): 92-101.

[12]. Shah, Sachi N., and Rutvij H. Jhaveri. 'A survey oj various approaches to detect selfishness in wireless ad-hoc networks.' Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, 2015.

[13]. Y. Yoo and D. P. Agrawal, “Why does it pay to be selfish in a MANET?,” IEEE Wireless Communications Magazine, vol. 13, issue 6, pp. 87-97, Dec. 2006

[14]. Raja Mahmood RA, Khan AI , “A Survey on Detecting Blackhole Attack in AODV-based Mobile Adhoc Networks.” Proceedings of International Symposium on High Capacity Optical Networks and Enabling Technologies, Dubai, United Arab Emirates, 18-20 November 2007

[15]. Saini A, Kumar H , “ Comparison between Various Blackhole Detection Techniques in MANET” Proceedings of National Conference on Computational Instrumentation, Chandigarh, India, 19-20 March 2010

[16]. Bar, Radha Krishna, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh. 'QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack.' Procedia Technology 10 (2013): 530-537.

[17]. Lo, Nai-Wei, and Fang-Ling Liu. 'A secure routing protocol to prevent cooperative black hole attack in MANET.' Intelligent Technologies and Engineering Systems. Springer New York, 2013. 59-65.

[18]. Tamilselvan L, Sankaranarayanan V (2007) Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.


[15] Djenouri D, Badache N (2008) Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 8(6):689–704. doi: 10.1002/wcm.v8:6


[16] Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16-18 March 2009


[17]. Raj PN, Swadas PB (2009) DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET.International Journal of Computer Science 2:54–59. doi: abs/0909.2371


[18] Jaisankar N, Saravanan R, Swamy KD (2010) A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, 26-27 March 2010.


[19] Mistry N, Jinwala DC, IAENG, Zaveri M (2010) Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, 17-19 March, 2010

[24]. L.Hu and D.Evans, “ Using directional antennas to prevent against wormhole attacks”, Proceedings of NDSS Feb.2004

[25]. Y.Hu, A.Perrigand D. Johnson, “Packet leashes : A defense against wormhole attack in Wireless network”, Proceedings of INFOCOM ,volume 2, April 2003

[26]. R.Poovendran and L.Lazos, “A graph theoretic framework for preventing wormhole attacks in wireless adhoc networks” Wireless networks, volume 13, no.1 , pp.27-59, 2007

[27]. Shrivastava, Akansha, and Rajni Dubey. 'Wormhole Attack in Mobile Ad-hoc Network: A Survey.' International Journal of Security and Its Applications 9.7 (2015): 293-298.

[28]. Ji, Shiyu, Tingting Chen, and Sheng Zhong. 'Wormhole attack detection algorithms in wireless network coding systems.' IEEE Transactions on Mobile Computing 14.3 (2015): 660-674.

[29]. Biswas, Juhi, Ajay Gupta, and Dayashankar Singh. 'WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocol.' Industrial and Information Systems (ICIIS), 2014 9th International Conference on. IEEE, 2014.

[30]. K. Fall and K.Varadhan, “The NS Mannual”, available at http://www.isi.edu/nsnam/ns.

WSEAS Transactions on Communications, ISSN / E-ISSN: 1109-2742 / 2224-2864, Volume 16, 2017, Art. #12, pp. 85-93

Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board


The editorial board is accepting papers.

WSEAS Main Site