Waqas Khan,Vishwesh Laxmikant Akre,Khalid Saeed,Asif Nawaz,Tariq Bashir,Adil Khan,Naveed Jan,Sheeraz Ahmed,Zia Ullah Khan,



MANETs,Ad-Hoc Routing Protocols,OLSR,DSR,Malicious Nodes,Black Hole Attack,


Mobile Ad-Hoc Networks (MANETs) are a collection of mobile nodes which are free to move from one place to another place without a central control entity. In MANETs the nodes are dependent on each other and the communication among mobile nodes is multi-hop due to which there are security issues in the MANETs protocols. Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR) protocols are mostly used as proactive and reactive routing protocols in MANETs. This research work analyzed the performance of the OLSR and DSR protocols in the presence and absence of black hole (BH) attack in terms of throughput, end-to-end delay, packet delivery ratio (PDR), and network load in various scenarios using OPNET Modeler 14.5 simulator. The results obtained in this research show that BH attack significantly degrades the performance of both DSR and OLSR protocols but due to the reactive nature of DSR routing protocol the performance is more degraded in DSR routing protocol as compared to OLSR routing protocol in the presence of BH attack.


I. Adam, G., Kapoulas, V., Bouras, C., Kioumourtzis, G., Gkamas, A., &Tavoularis, N. (2011, October). Performance evaluation of routing protocols for multimedia transmission over mobile ad hoc networks. In Wireless and Mobile Networking Conference (WMNC), 2011 4th Joint IFIP (pp. 1-6). IEEE.
II. Ade, S. A., &Tijare, P. A. (2010). Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. International Journal of Information Technology and Knowledge Management, 2(2), 545-548.
III. Aggarwal, R., &Rana, S. A. (2014). Comparitative Survey on Malicious Nodes and Their Attacks in MANET. (IOSR-JCE), 16(3), (PP 93-101).
IV. Arora, N., &Barwar, N. C. (2014). Performance Analysis of Black Hole Attack on different MANET Routing Protocols. International Journal of Computer Science and Information technologies, 5(3), 4417-4419.
V. Babu, E. S., Naganjaneyulu, S., Rao, P. S., & Reddy, G. N. (2019). An Efficient Cryptographic Mechanism to Defend Collaborative Attack Against DSR Protocol in Mobile Ad hoc Networks. In Information and Communication Technology for Intelligent Systems (pp. 21-30). Springer, Singapore.
VI. Chaurasia, M., & Singh, B. P. (2018). Prevention of DOS and Routing Attack in OLSR Under MANET. In Proceedings of International Conference on Recent Advancement on Computer and Communication (pp. 287-295). Springer, Singapore.
VII. Dokurer, S., Erten, Y. M., &Acar, C. E. (2007, March). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, 2007. Proceedings. IEEE (pp. 148-153). IEEE.
VIII. Garg, N., & Mahapatra, R. P. (2009). MANET Security issues. IJCSNS, 9(8), 241.
IX. Jaiswal, P., & Kumar, D. R. (2012). Prevention of Black Hole Attack in MANET. IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN, 2250-3501
X, Jamal, T., & Butt, S. A. (2018). Malicious node analysis in MANETS. International Journal of Information Technology, 1-9.
XI. Johnson, D. B., Maltz, D. A., &Broch, J. (2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc networking, 5, 139-172.
XII. Kaur, T., & Singh, A. (2013). Performance Evaluation of MANET with Black Hole Attack Using Routing Protocols. International Journal of Engineering Research and Applications (IJERA) ISSN, 2248(9622), 1324-1328.
XIII. Mamatha, G. S., & Sharma, D. S. (2010). A highly secured approach against attacks in MANETS. International Journal of Computer Theory and Engineering, 2(5), 1793-8201.
XIV. Mohammad, A. A. K., Mahmood, A. M., & Vemuru, S. (2019). Providing Security Towards the MANETs Based on Chaotic Maps and Its Performance. In Microelectronics, Electromagnetics and Telecommunications (pp. 145-152). Springer, Singapore.
XV. Mohammad, S. N., Singh, R. P., Dey, A., & Ahmad, S. J. (2019). ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique. In Innovations in Electronics and Communication Engineering (pp. 319-326). Springer, Singapore.
XVI. Mohebi, A., Kamal, E., & Scott, S. (2013). Simulation and analysis of AODV and DSR routing protocol under black hole attack. International Journal of Modern Education and Computer Science, 5(10), 19.
XVII. Mani, U., Chandrasekaran, R., & Dhulipala, V. S. (2013). Study and analysis of routing protocols in mobile ad-hoc network. Journal of Computer Science, 9(11), 1519.
XVIII. Rohal, P., Dahiya, R., &Dahiya, P. (2013). Study and analysis of throughput, delay and packet delivery ratio in MANET for topology based routing protocols (AODV, DSR and DSDV). international journal for advance research in engineering and technology, 1. (Vol. 1, pp. 54-58).
XIX. Roy A., Deb T. (2018) Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks. In: Mandal J., Saha G., Kandar D., Maji A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore
XX. Saddiki, K., Boukli-Hacene, S., Gilg, M., & Lorenz, P. (2018, September). Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol. In International Symposium on Security in Computing and Communication (pp. 117-131). Springer, Singapore.
XXI. Sajjad Muhammad, Khalid Saeed, Tariq Hussain, ArbabWaseem Abbas, Irshad Khalil, Iqtidar Ali, Nida Gul. : Impact of Jelly Fish Attackonthe Performance of DSR Routing Protocol in MANETs, J. Mech. Cont.& Math. Sci., Vol.-14, No.-4, July-August (2019) pp 132-140
XXII. Salehi, M., Samavati, H., &Dehghan, M. (2012, May). Evaluation of DSR protocol under a new Black hole attack. In Electrical Engineering (ICEE), 2012 20th Iranian Conference on (pp. 640-644). IEEE.
XXIII. Shrestha, A., &Tekiner, F. (2009, December). On MANET routing protocols for mobility and scalability. In Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on (pp. 451-456). IEEE.
XXIV. Tariq Hussain, Iqtidar Ali, Muhammad Arif, Samad Baseer, Fatima Pervez, Zia Ur Rehman. : AN INVESTIGATION OF THE PERFORMANCE OPTIMIZED LINK STATE ROUTING PROTOCOL ON THE BASIS OF MOBILITY MODELS, J. Mech. Cont.& Math. Sci., Vol.-15, No.-9, September (2020) pp 306-327.
XXV. Vamsi, P. R., & Kant, K. (2017). Generalized trust model for cooperative routing in MANETs. Wireless Personal Communications, 97(3), 4385-4412.

View Download