Performance Evaluation of AODV and AOMDV Routing Protocol on Rushing Attack for Wireless Mesh Network

Authors

  • Siti Ummi Masruroh Department of Informatics, Faculty of Science and Technology, UIN Jakarta, Indonesia
  • Muhammad Irian Iqbal Department of Informatics, Faculty of Science and Technology, UIN Jakarta, Indonesia
  • Nashrul Hakiem Department of Informatics, Faculty of Science and Technology, UIN Jakarta, Indonesia

Keywords:

AODV, AOMDV, Rushing Attack, Wireless Mesh Network,

Abstract

Wireless LAN (WLAN) technology is becoming increasingly popular as an option to provide wireless internet access in corporate, campus, residential, public space, and others. Wireless Mesh Network (WMN), as one of the innovations of WLAN technology offers a unique solution as it can effectively and efficiently replace or enrich the capabilities of both the existing wired and wireless-based internet network infrastructure. This is because it can cover wider and difficult to reach service areas without ignoring security, mobility, and Quality of Service (QoS). This paper evaluated the impact of AODV and AOMDV routing protocol performance when under attack by Rushing Attack. This simulation used 49 and 100 nodes and Network Simulator 2 (NS2) and Network Animator (NAM) to evaluate the performance and the QoS parameters, namely the throughput, packet delivery ratio, packet drop rate, and end-to-end delay. The results from the trace file were derived from the evaluation of QoS. Based on the evaluation, it was found that AOMDV produces better performance than AODV. AOMDV has a higher performance evaluation of several Kbps because AOMDV has many backup paths, if the path used to send packets from source to destination is no longer efficient.

Downloads

Download data is not yet available.

Downloads

Published

2020-12-22

How to Cite

Masruroh, S. U., Iqbal, M. I., & Hakiem, N. (2020). Performance Evaluation of AODV and AOMDV Routing Protocol on Rushing Attack for Wireless Mesh Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 12(4), 51–55. Retrieved from https://jtec.utem.edu.my/jtec/article/view/5537