A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
الموضوعات : Journal of Computer & RoboticsMaryam Fathi Ahmadsaraei 1 , Abolfazl Toroghi Haghighat 2
1 - Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
2 - Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
الکلمات المفتاحية: Black Hole Attack, Intrusion Detection Systems, Mobile Ad Hoc Networks, NS-2 Simulation,
ملخص المقالة :
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other.