Simulation of network layer-based security attacks in a mobile ad-hoc network

dc.contributor.authorUthumansa, Ahamed
dc.contributor.authorShantha, Fernando
dc.date.accessioned2022-01-05T10:24:14Z
dc.date.available2022-01-05T10:24:14Z
dc.date.issued2021-08-15
dc.description.abstractThe opportunistic nature of the Mobile Ad-hoc Network (MANET) helps to deploy instantly where it is needed. MANET is the best solution as a network where infrastructure networks are unavailable. The fundamental characters of these networks are the reason for the vast variety of security attacks on them. Simulators provide a better platform to conduct research, though faulty designs of simulations provide incorrect results. Therefore, the issue remains available for a valid solution. We designed the study to investigate the network layer-based security attacks. The study included a detailed information of different attack simulations. Network Simulator 2 (NS2) was used. Ad-hoc On-demand Vector (AODV) routing protocol was used for the study. The Blackhole, Grayhole, and Wormhole attacks were simulated. The impacts of these attacks on the network performance were evaluated with Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time of an Intermediate node (SPTIN). The active attacks caused more damages to the network performance than passive attacks do. Moreover, the results proved that the impacts of an attack depend on the design of the attack. The incorrect design provides faulty results which lead to ill decisions. We are expecting to extend the simulation of different security attacks based on different simulators.en_US
dc.description.sponsorshipNullen_US
dc.identifier.citationJournal of Information Systems & Information Technology(JISIT), Vol.6(1): 28-42.en_US
dc.identifier.issn2478-0677
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5943
dc.language.isoen_USen_US
dc.publisherFaculty of Management and Commerce, South Eastern University Of Sri Lanka (SEUSL), University Park, Oluvil.en_US
dc.relation.ispartofseries;3
dc.subjectBlackholeen_US
dc.subjectGrayholeen_US
dc.subjectSecurityen_US
dc.subjectSimulationen_US
dc.subjectWormholeen_US
dc.titleSimulation of network layer-based security attacks in a mobile ad-hoc networken_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
JISIT 2021 Volume 6 No 1 Paper 3 Page 28 42.pdf
Size:
304.73 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: