Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET
In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants a...
Ausführliche Beschreibung
Autor*in: |
Henock M Melaku [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Rechteinformationen: |
Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. |
---|
Schlagwörter: |
Mobile communications networks Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) |
---|
Übergeordnetes Werk: |
Enthalten in: International journal of computer applications in technology - Geneva-Aeroport : Inderscience Enterprises, 1988, 51(2015), 3, Seite 235 |
---|---|
Übergeordnetes Werk: |
volume:51 ; year:2015 ; number:3 ; pages:235 |
Links: |
---|
DOI / URN: |
10.1504/IJCAT.2015.069338 |
---|
Katalog-ID: |
OLC195807456X |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC195807456X | ||
003 | DE-627 | ||
005 | 20220216072420.0 | ||
007 | tu | ||
008 | 160206s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1504/IJCAT.2015.069338 |2 doi | |
028 | 5 | 2 | |a PQ20160617 |
035 | |a (DE-627)OLC195807456X | ||
035 | |a (DE-599)GBVOLC195807456X | ||
035 | |a (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 | ||
035 | |a (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q ZDB |
084 | |a 54.00 |2 bkl | ||
100 | 0 | |a Henock M Melaku |e verfasserin |4 aut | |
245 | 1 | 0 | |a Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. | ||
540 | |a Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. | ||
650 | 4 | |a Mobile communications networks | |
650 | 4 | |a TCP-IP | |
650 | 4 | |a Performance evaluation | |
650 | 4 | |a Network security | |
650 | 4 | |a Simulation | |
650 | 4 | |a Studies | |
650 | 4 | |a Routing | |
650 | 4 | |a Safety and security measures | |
650 | 4 | |a Ad hoc networks (Computer networks) | |
650 | 4 | |a Transmission Control Protocol/Internet Protocol (Computer network protocol) | |
650 | 4 | |a Analysis | |
700 | 0 | |a Dereje H Woldegebreal |4 oth | |
700 | 0 | |a Kumudha Raimond |4 oth | |
773 | 0 | 8 | |i Enthalten in |t International journal of computer applications in technology |d Geneva-Aeroport : Inderscience Enterprises, 1988 |g 51(2015), 3, Seite 235 |w (DE-627)13046483X |w (DE-600)740579-0 |w (DE-576)063973049 |x 0952-8091 |7 nnns |
773 | 1 | 8 | |g volume:51 |g year:2015 |g number:3 |g pages:235 |
856 | 4 | 1 | |u http://dx.doi.org/10.1504/IJCAT.2015.069338 |3 Volltext |
856 | 4 | 2 | |u http://search.proquest.com/docview/1685009563 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
936 | b | k | |a 54.00 |q AVZ |
951 | |a AR | ||
952 | |d 51 |j 2015 |e 3 |h 235 |
author_variant |
h m m hmm |
---|---|
matchkey_str |
article:09528091:2015----::netgtntefetoscrtatcsnhpromnefcvrat |
hierarchy_sort_str |
2015 |
bklnumber |
54.00 |
publishDate |
2015 |
allfields |
10.1504/IJCAT.2015.069338 doi PQ20160617 (DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo DE-627 ger DE-627 rakwb eng 004 ZDB 54.00 bkl Henock M Melaku verfasserin aut Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis Dereje H Woldegebreal oth Kumudha Raimond oth Enthalten in International journal of computer applications in technology Geneva-Aeroport : Inderscience Enterprises, 1988 51(2015), 3, Seite 235 (DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 0952-8091 nnns volume:51 year:2015 number:3 pages:235 http://dx.doi.org/10.1504/IJCAT.2015.069338 Volltext http://search.proquest.com/docview/1685009563 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.00 AVZ AR 51 2015 3 235 |
spelling |
10.1504/IJCAT.2015.069338 doi PQ20160617 (DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo DE-627 ger DE-627 rakwb eng 004 ZDB 54.00 bkl Henock M Melaku verfasserin aut Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis Dereje H Woldegebreal oth Kumudha Raimond oth Enthalten in International journal of computer applications in technology Geneva-Aeroport : Inderscience Enterprises, 1988 51(2015), 3, Seite 235 (DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 0952-8091 nnns volume:51 year:2015 number:3 pages:235 http://dx.doi.org/10.1504/IJCAT.2015.069338 Volltext http://search.proquest.com/docview/1685009563 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.00 AVZ AR 51 2015 3 235 |
allfields_unstemmed |
10.1504/IJCAT.2015.069338 doi PQ20160617 (DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo DE-627 ger DE-627 rakwb eng 004 ZDB 54.00 bkl Henock M Melaku verfasserin aut Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis Dereje H Woldegebreal oth Kumudha Raimond oth Enthalten in International journal of computer applications in technology Geneva-Aeroport : Inderscience Enterprises, 1988 51(2015), 3, Seite 235 (DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 0952-8091 nnns volume:51 year:2015 number:3 pages:235 http://dx.doi.org/10.1504/IJCAT.2015.069338 Volltext http://search.proquest.com/docview/1685009563 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.00 AVZ AR 51 2015 3 235 |
allfieldsGer |
10.1504/IJCAT.2015.069338 doi PQ20160617 (DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo DE-627 ger DE-627 rakwb eng 004 ZDB 54.00 bkl Henock M Melaku verfasserin aut Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis Dereje H Woldegebreal oth Kumudha Raimond oth Enthalten in International journal of computer applications in technology Geneva-Aeroport : Inderscience Enterprises, 1988 51(2015), 3, Seite 235 (DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 0952-8091 nnns volume:51 year:2015 number:3 pages:235 http://dx.doi.org/10.1504/IJCAT.2015.069338 Volltext http://search.proquest.com/docview/1685009563 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.00 AVZ AR 51 2015 3 235 |
allfieldsSound |
10.1504/IJCAT.2015.069338 doi PQ20160617 (DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo DE-627 ger DE-627 rakwb eng 004 ZDB 54.00 bkl Henock M Melaku verfasserin aut Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd. Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis Dereje H Woldegebreal oth Kumudha Raimond oth Enthalten in International journal of computer applications in technology Geneva-Aeroport : Inderscience Enterprises, 1988 51(2015), 3, Seite 235 (DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 0952-8091 nnns volume:51 year:2015 number:3 pages:235 http://dx.doi.org/10.1504/IJCAT.2015.069338 Volltext http://search.proquest.com/docview/1685009563 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.00 AVZ AR 51 2015 3 235 |
language |
English |
source |
Enthalten in International journal of computer applications in technology 51(2015), 3, Seite 235 volume:51 year:2015 number:3 pages:235 |
sourceStr |
Enthalten in International journal of computer applications in technology 51(2015), 3, Seite 235 volume:51 year:2015 number:3 pages:235 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
International journal of computer applications in technology |
authorswithroles_txt_mv |
Henock M Melaku @@aut@@ Dereje H Woldegebreal @@oth@@ Kumudha Raimond @@oth@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
13046483X |
dewey-sort |
14 |
id |
OLC195807456X |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC195807456X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216072420.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1504/IJCAT.2015.069338</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC195807456X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC195807456X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">ZDB</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Henock M Melaku</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communications networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP-IP</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Simulation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Routing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Safety and security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission Control Protocol/Internet Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Analysis</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dereje H Woldegebreal</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Kumudha Raimond</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of computer applications in technology</subfield><subfield code="d">Geneva-Aeroport : Inderscience Enterprises, 1988</subfield><subfield code="g">51(2015), 3, Seite 235</subfield><subfield code="w">(DE-627)13046483X</subfield><subfield code="w">(DE-600)740579-0</subfield><subfield code="w">(DE-576)063973049</subfield><subfield code="x">0952-8091</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:51</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:235</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1504/IJCAT.2015.069338</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1685009563</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">51</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="h">235</subfield></datafield></record></collection>
|
author |
Henock M Melaku |
spellingShingle |
Henock M Melaku ddc 004 bkl 54.00 misc Mobile communications networks misc TCP-IP misc Performance evaluation misc Network security misc Simulation misc Studies misc Routing misc Safety and security measures misc Ad hoc networks (Computer networks) misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Analysis Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
authorStr |
Henock M Melaku |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)13046483X |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0952-8091 |
topic_title |
004 ZDB 54.00 bkl Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET Mobile communications networks TCP-IP Performance evaluation Network security Simulation Studies Routing Safety and security measures Ad hoc networks (Computer networks) Transmission Control Protocol/Internet Protocol (Computer network protocol) Analysis |
topic |
ddc 004 bkl 54.00 misc Mobile communications networks misc TCP-IP misc Performance evaluation misc Network security misc Simulation misc Studies misc Routing misc Safety and security measures misc Ad hoc networks (Computer networks) misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Analysis |
topic_unstemmed |
ddc 004 bkl 54.00 misc Mobile communications networks misc TCP-IP misc Performance evaluation misc Network security misc Simulation misc Studies misc Routing misc Safety and security measures misc Ad hoc networks (Computer networks) misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Analysis |
topic_browse |
ddc 004 bkl 54.00 misc Mobile communications networks misc TCP-IP misc Performance evaluation misc Network security misc Simulation misc Studies misc Routing misc Safety and security measures misc Ad hoc networks (Computer networks) misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Analysis |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
d h w dhw k r kr |
hierarchy_parent_title |
International journal of computer applications in technology |
hierarchy_parent_id |
13046483X |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
International journal of computer applications in technology |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)13046483X (DE-600)740579-0 (DE-576)063973049 |
title |
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
ctrlnum |
(DE-627)OLC195807456X (DE-599)GBVOLC195807456X (PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450 (KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo |
title_full |
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
author_sort |
Henock M Melaku |
journal |
International journal of computer applications in technology |
journalStr |
International journal of computer applications in technology |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
235 |
author_browse |
Henock M Melaku |
container_volume |
51 |
class |
004 ZDB 54.00 bkl |
format_se |
Aufsätze |
author-letter |
Henock M Melaku |
doi_str_mv |
10.1504/IJCAT.2015.069338 |
dewey-full |
004 |
title_sort |
investigating the effects of security attacks on the performance of tcp variants and routing protocols in manet |
title_auth |
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
abstract |
In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. |
abstractGer |
In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. |
abstract_unstemmed |
In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 |
container_issue |
3 |
title_short |
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET |
url |
http://dx.doi.org/10.1504/IJCAT.2015.069338 http://search.proquest.com/docview/1685009563 |
remote_bool |
false |
author2 |
Dereje H Woldegebreal Kumudha Raimond |
author2Str |
Dereje H Woldegebreal Kumudha Raimond |
ppnlink |
13046483X |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
doi_str |
10.1504/IJCAT.2015.069338 |
up_date |
2024-07-04T02:05:04.639Z |
_version_ |
1803612276277641216 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC195807456X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216072420.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1504/IJCAT.2015.069338</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC195807456X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC195807456X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)g1323-d6bf60b93823d84f71cf7d741aa9f1c7205205c3b9837f3e1b4ceaa9ebd13d450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0169999720150000051000300235investigatingtheeffectsofsecurityattacksontheperfo</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">ZDB</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Henock M Melaku</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Nutzungsrecht: © COPYRIGHT 2015 Inderscience Publishers Ltd.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communications networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP-IP</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Simulation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Routing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Safety and security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission Control Protocol/Internet Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Analysis</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dereje H Woldegebreal</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Kumudha Raimond</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of computer applications in technology</subfield><subfield code="d">Geneva-Aeroport : Inderscience Enterprises, 1988</subfield><subfield code="g">51(2015), 3, Seite 235</subfield><subfield code="w">(DE-627)13046483X</subfield><subfield code="w">(DE-600)740579-0</subfield><subfield code="w">(DE-576)063973049</subfield><subfield code="x">0952-8091</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:51</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:235</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1504/IJCAT.2015.069338</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1685009563</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">51</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="h">235</subfield></datafield></record></collection>
|
score |
7.401101 |