Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ International Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://dx.doi.org/10.60692/pp...
Other literature type . 2016
Data sources: Datacite
https://dx.doi.org/10.60692/yp...
Other literature type . 2016
Data sources: Datacite
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

The Impact of Black-Hole Attack on ZRP Protocol

تأثير هجوم الثقب الأسود على بروتوكول ZRP
Authors: CHAHIDI Badr; Abdellah Ezzati;

The Impact of Black-Hole Attack on ZRP Protocol

Abstract

le manque d'infrastructure dans les réseaux ad hoc facilite leur déploiement. Chaque nœud d'un réseau ad hoc peut acheminer des données à l'aide d'un protocole de routage, ce qui diminue le niveau de sécurité. Les réseaux ad hoc sont exposés à plusieurs attaques telles que l'attaque par trou noir. Dans cet article, une étude a été faite sur l'impact de l'attaque sur le protocole de routage hybride ZRP (Zone Routing Protocol). Dans cette attaque, un nœud malveillant est placé entre deux ou plusieurs nœuds afin de déposer des données. L'astuce de l'attaque est simple, le nœud malveillant déclare avoir le moyen le plus fiable d'atteindre la destination afin que la femme destination choisisse ce chemin. Dans cette étude, NS2 est utilisé pour évaluer l'impact de l'attaque sur ZRP. Deux mesures métriques, à savoir le ratio de paquets livrés et le délai de bout en bout.

falta de infraestructura en redes ad hoc facilita su implementación. Cada nodo en una red ad hoc puede enrutar datos utilizando un protocolo de enrutamiento, lo que disminuye el nivel de seguridad. Las redes ad hoc están expuestas a varios ataques, como el ataque de agujero negro. En este artículo, se ha realizado un estudio sobre el impacto del ataque en el protocolo de enrutamiento híbrido ZRP (Zone Routing Protocol). En este ataque, se coloca un nodo malicioso entre dos o más nodos para eliminar datos. El truco del ataque es simple, el nodo malicioso declara tener la forma más confiable de llegar al destino para que el destino de la esposa elija esta ruta. En este estudio, NS2 se utiliza para evaluar el impacto del ataque en ZRP. Dos medidas de métricas, a saber, la relación de entrega de paquetes y el retraso de extremo a extremo.

lack of infrastructure in ad hoc networks makes their deployment easier.Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security.Ad hoc networks are exposed to several attacks such as the blackhole attack.In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol).In this attack a malicious node is placed between two or more nodes in order to drop data.The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path.In this study, NS2 is used to assess the impact of the attack on ZRP.Two metrics measure, namely the packet delivered ratio and end to end delay.

عدم وجود بنية تحتية في الشبكات المخصصة يجعل نشرها أسهل. يمكن لكل عقدة في شبكة مخصصة توجيه البيانات باستخدام بروتوكول توجيه، مما يقلل من مستوى الأمان. تتعرض الشبكات المخصصة لعدة هجمات مثل هجوم الثقب الأسود. في هذه المقالة، تم إجراء دراسة حول تأثير الهجوم على بروتوكول التوجيه الهجين ZRP (بروتوكول توجيه المنطقة). في هذا الهجوم يتم وضع عقدة ضارة بين عقدتين أو أكثر من أجل إسقاط البيانات. خدعة الهجوم بسيطة، تعلن العقدة الضارة أن لديها الطريقة الأكثر موثوقية للوصول إلى الوجهة بحيث تختار وجهة الزوجة هذا المسار. في هذه الدراسة، يتم استخدام NS2 لتقييم تأثير الهجوم على مقياس ZRP.Two للمقاييس، وهي نسبة الحزمة المسلمة والتأخير من النهاية إلى النهاية.

Keywords

Ad Hoc Wireless Networks Research, Computer Networks and Communications, Routing Protocols, Structural engineering, Node (physics), Link-state routing protocol, Zone Routing Protocol, Engineering, Computer security, Multi-hop Wireless Routing, Ad Hoc Networks, DDoS Attacks, Security Protocols for Authentication and Key Exchange, Computer network, Network packet, Mobile Ad Hoc Networks, Wireless ad hoc network, Packet drop attack, Computer science, Routing protocol, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Wireless, Telecommunications, Wireless Routing Protocol, Optimized Link State Routing Protocol

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold