International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 329

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.2 / 10


     

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Rozy Rana, Kanwal Preet Singh


Abstract: The main goal of this Research paper is to see the simulation and performance factors of routing protocols (AODV, DSDV AND DSR) after attack in NS-2. Routing Protocols specifies how communication between two routers takes place. By this we can specify the choice of the route. We will analyze literature sources related to wireless networks simulators. We will also analyze the Network simulator ns-2 and will give its detailed Description. Therefore we can analyze the performance factors packet delay, packet loss and throughput in nodes after the Black Hole Attack. We will compare these three routing protocols by evaluating on the basis of their performance.


Keywords: Performance, NS-2, AODV, DSDV, DSR, Throughput, Delay


Edition: Volume 3 Issue 7, July 2014


Pages: 787 - 792



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rozy Rana, Kanwal Preet Singh, "Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 787-792, https://www.ijsr.net/getabstract.php?paperid=20141134, DOI: https://www.doi.org/10.21275/20141134



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article
Top