SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8


     Performance Evaluation of Routing Protocols in MANETs under
                          Wormhole Attack
                                     1,
                                       Pardeep Kaur, 2, Deepak Aggarwal
                                           1,
                                             M. Tech Student , 2, Assistant Professor
                          1,2
                                ,Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India


Abstract
         Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central
administrator. Nodes can move fro m one place to another in the network or may leave or join the network at any time.
Due to this the topology of the network changes rapidly. So the routing protocols are required that can adopt the frequent
changes in the network topology. Due to the absence of central ad min istrator the MANETs are vulnerab le to attacks. In
this paper comparison of reactive protocols i.e AODV and DYM O has been done under three types of wormhole attack.
Performance is measured with metrics like Packet Delivery Rat io, Average End -to-End Delay, Th roughput and Jitter by
varying the number of nodes.

Keywords-A ODV, DYMO, MANET, Wormhole

1. Introduction
         Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central
administrator. The nodes can leave or join the network at any time. Nodes act as routers that relay packets generated by
other nodes to their destination [Jeroen Hoebeke et al., 2006]. Due to the movement of nodes the topology of the network
changes rapidly. The nodes which are near to each other or within each other’s radio range can communicate direct ly. But
nodes which are far away they use intermediate nodes to send data. MANETs has advantages like Simp le, cheap and fast
setup of networks, mo re robust concerning failure of single component due to decentralized structure because of these
they are used in many applications like wireless sensor networks, rescue operations, sports events and conferences etc.

2. Routing Protocols
          Proactive protocols are also known as table driven protocols. In these protocols each node maintains a route in
their routing table to all the destination nodes in the network. Due to that, routes are discovered for every mobile node of
the network, without any request for communication by the hosts [Gurjinder Kau r et al., 2011]. The routing tables are
updated periodically or when a change occurs in the network topology. Some of proactive protocols are DSDV, OLSR
and STAR. Reactive protocols are also known as on-demand routing protocols. In these protocols a route is only
discovered when source node want to send data to the destination node. Source node broadcast a route request message to
find a route to the destination. So me of the reactive routing protocols are DSR, AODV and DYMO. Due to the random
movement of nodes, the network topology becomes unpredictable and changes rapidly. In order to find the most adaptive
and efficient routing protocols for dynamic MANET topologies, the behavior of routing protocols need to be analyzed at
varying node speeds, network size, number of traffic nodes and node density [Fahim Maan et al., 2010].AODV and
DYM O routing protocols are used in simu lation.

2.1 AODV
         Ad-hoc on–demand distance vector is a reactive routing protocol. This property imp lies that it requests a route
when it needs one and the nodes which do not want to take part in active co mmunicat ion, need not to maintain routing
tables. AODV uses the sequence number to find fresh routes. AODV has two basic operations: route discovery and route
maintenance. AODV uses RREQ, RREP and RERR messages to find and maintain th e routes.In route discovery , when a
source node desire a route to the destination node for which it does not have a route, it broadcast a route request (RREQ)
message in the network. RREQ message contains source IP address, destination IP address, seque nce number, hop count
and broadcast ID. A neighbor receiving a RREQ may send route reply (RREP), if it is either the destination or if it has
unexpired route to the destination. When destination node send a route reply (RREP) message to the source node, a
forward path is formed. Now source node will send the data through this path.In route maintenance, when a link breakage
in an active route is detected, the node notifies this link breakage by sending a route error (RE RR) message to the source
node [Dong-Won Kum et al., 2010] . The source node will rein itiate the route discovery process if it still has data to send.

2.2 DYMO
        DYM O is a successor of AODV. It is a co mb ination of AODV and DSR routing protocols. Similar to AODV,
DYM O has two basic operations, route discovery and route maintenance. In route discovery, the source node broadcast a
RREQ message throughout the network to find the destination node. During this process, each intermediate node records
a route to the source node and rebroadcast the RREQ after appending its own address. This is called the path

||Issn 2250-3005(online)||                             ||December || 2012                                       Page 292
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8


accumulat ion function. When the destination node receives the RREQ, it responds with RREP to the source node. Each
intermediate node that receives the RREP records a route to the destination node. When the source node receives RREP
message, the route is established between the source node and the destination node. As path accumulation function can
reduce the routing overhead, although the packet size of the routing packet is increased [Dong-Won Kum et al., 2010].
When a link breaks, the source of the packet is notified. RERR message is sent to inform the source node.

3. Wormhole Attack




                                                High speed of channel lin k
                                                 Fig 1. Wormho le attack

Wormhole is a severe type of attack, where t wo attackers are connected to each other through high speed off-channel link.
In this wormhole node receives the packet at one location and send it to other wormhole node through high speed off -
channel link. The worst can happen that nodes can be in dilemma that they are close to the destination even though they
are at far distance.
Three types of wormho le attack are:
1. All Pass: In this wormhole nodes will pass all the packets irrespective of their size.
2. All Drop : In this all the packets are dropped by wormhole nodes.
3 Th reshold: Wormhole drops all the packets size greater than or equal to the threshold value.

4. Simulation And Results
         The Qualnet 5.2 simulator is used for simulation. The MA C protocol IEEE 802.11 was used with a data rate of 2
         Mbps.
                                              Table 1. Simu lation Parameters
                                     Parameter                              Value
                                     Terrain Size                      1500m×1500 m
                                    No. of Nodes                        25/ 50/ 75/ 100
                              No. of wormho le nodes                      4/8/12/16
                                    Traffic Type                             CBR
                                 No. of CBR links                              5
                                  Mobility Model                      Random Waypoint
                                 Routing Protocols                     AODV, DYM O
                                         MAC                                  802.11
                                     Packet Size                            512 bytes
                                        Speed                                0-10m/s
                                     Pause Time                               10 sec
                                   Simu lation Time                          400 sec
                                     Attack Type                            Wormhole

4.1 Performance Metrics
         Performane Metrics used to measure the performance are :

4.1.1 Packet Deli very Ratio: Packet delivery rat io is calculated by dividing the number of        packets received by the
destination through the number of packets originated by source.

4.1.2 Average End-to-End Delay: Average end-to-end delay is the average time it takes a data packet to reach to
destination in seconds. It is calculated by subtracting “time at which first packet was transmitted by source” from “time at
which first data packet arrived to destination.
4.1.3 Throughput: It is defined as total number of delivered data packets divided by the total duration of simulation time.

4.1.4 Jitter: Jitter is the variation in the time between packets arriving, caused by network congestion, and route changes.


||Issn 2250-3005(online)||                             ||December || 2012                                       Page 293
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8


    Results without wormhole attack




Results wi th Wormhole

    All Pass




||Issn 2250-3005(online)||                         ||December || 2012                                      Page 294
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8


      ALL Drop In all drop, all the packets that are sent by the sender to the receiver are dropped by the wormhole
nodes.




          Fig. 12 Throughput for All Drop mode                      Fig. 13 Avg Jitter fo r All Drop mode

    Threshol d (150 Bytes) In this case, wormhole drops all the packets which are above 150 bytes in size.




5. Conlusion And Future Work
         Fro m simulat ion results it is concluded that AODV perform better than DYMO without wormhole attack. But
under the wormhole attack the performance of bothe the protocols decreased. But still A ODV has better performance than
DYM O. A ll Pass and Threshold has effected the performance greatly. At 25 nodes it has shown some results but as the
number of nodes increased the wormhole nodes came into existance and decreased the performance co mpletely. All drop
has less affect on the performance as it drop the route request packets and routes are establishe d through other nodes in
the network.In future work performance can be measured with different performance metrics like routing overhead by
varying pause time and speed. Security mechanism to prevent fro m these types of attacks can also be developed.


||Issn 2250-3005(online)||                           ||December || 2012                                       Page 295
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8


References
[1]   Priti Garg, Asma Tuteja . Co mparative Performance Analysis of Two Ad-hoc Routing Protocols , International
      Conference on Network and Electronics Engineering, IPCSIT vol.11,IACSIT Press, Singapore, 2011.
[2]   Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade. Mobile Ad Hoc Networking: Imperat ives and Challenges ,
      IJCA Special Issue on “Mobile Ad-hoc Networks”, 2010.
[3]   Jeroen Hoebeke, Ingird Moerman, Bart Dhoebt and Piet Demeester, , An Overview of Mobile Ad-hoc Networking:
      Applications and Challenges, 2006.
[4]   S. Su resh kumar, T. V.P Sundararajan and A Shan mugam. Perfo rmance Co mparison of three types of wormhole
      attack in Mobile Adhoc Network, proceedings of the international conference on information science and
      applications, Chennai, India, 2010.
[5]   Gu rjinder Kaur, V. K Jain and Yogesh Chaba. Wormhole attacks: Perfo rmance Evaluation of On Demand Routing
      Protocols in Mobile Ad-hoc Networks, world conference on informat ion and communication technologies,pp.
      1155-1158, 2011.
[6]   Dong-Won Kum, Jin-Su Park, You-Ze Cho and Byoung-Yoon Cheon. Performance Evaluation of AODV and
      DYM O Routing Protocols in MANET, IEEE CCNC, 2010.
[7]   Fahim Maan, Nau man Mazhar. MANET Routing Protocols vs Mobility Models: A Performance
      Evaluation,ICUFN, 2010.
[8]   MIAO Quan-xing, XU Lei. DYM O Routing Protocol Research and Simu lation Based on NS2 International
      Conference on Co mputer Application and System Modeling , 2010.
[9]   Rashid Sheikh, Mahakal Singh Chandel, durgesh Kumar Mishra. Security issues in MANET: A Review, IEEE,
      2010.




||Issn 2250-3005(online)||                        ||December || 2012                                      Page 296

Weitere ähnliche Inhalte

Was ist angesagt?

Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routingijcseit
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...dlogumorappur
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 

Was ist angesagt? (17)

Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routing
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
A2546035115
A2546035115A2546035115
A2546035115
 
A25001003
A25001003A25001003
A25001003
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...
 
498 503
498 503498 503
498 503
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
O26087092
O26087092O26087092
O26087092
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 

Andere mochten auch

A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksIAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Andere mochten auch (9)

A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
47 50
47 5047 50
47 50
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
1 7
1 71 7
1 7
 

Ähnlich wie International Journal of Computational Engineering Research(IJCER)

New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...pijans
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLZac Darcy
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 

Ähnlich wie International Journal of Computational Engineering Research(IJCER) (20)

K017426872
K017426872K017426872
K017426872
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
 
Jt3516941700
Jt3516941700Jt3516941700
Jt3516941700
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 

International Journal of Computational Engineering Research(IJCER)

  • 1. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8 Performance Evaluation of Routing Protocols in MANETs under Wormhole Attack 1, Pardeep Kaur, 2, Deepak Aggarwal 1, M. Tech Student , 2, Assistant Professor 1,2 ,Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India Abstract Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central administrator. Nodes can move fro m one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly. So the routing protocols are required that can adopt the frequent changes in the network topology. Due to the absence of central ad min istrator the MANETs are vulnerab le to attacks. In this paper comparison of reactive protocols i.e AODV and DYM O has been done under three types of wormhole attack. Performance is measured with metrics like Packet Delivery Rat io, Average End -to-End Delay, Th roughput and Jitter by varying the number of nodes. Keywords-A ODV, DYMO, MANET, Wormhole 1. Introduction Mobile Ad-Hoc Net work is a group of wireless mobile nodes connected to each -other without any central administrator. The nodes can leave or join the network at any time. Nodes act as routers that relay packets generated by other nodes to their destination [Jeroen Hoebeke et al., 2006]. Due to the movement of nodes the topology of the network changes rapidly. The nodes which are near to each other or within each other’s radio range can communicate direct ly. But nodes which are far away they use intermediate nodes to send data. MANETs has advantages like Simp le, cheap and fast setup of networks, mo re robust concerning failure of single component due to decentralized structure because of these they are used in many applications like wireless sensor networks, rescue operations, sports events and conferences etc. 2. Routing Protocols Proactive protocols are also known as table driven protocols. In these protocols each node maintains a route in their routing table to all the destination nodes in the network. Due to that, routes are discovered for every mobile node of the network, without any request for communication by the hosts [Gurjinder Kau r et al., 2011]. The routing tables are updated periodically or when a change occurs in the network topology. Some of proactive protocols are DSDV, OLSR and STAR. Reactive protocols are also known as on-demand routing protocols. In these protocols a route is only discovered when source node want to send data to the destination node. Source node broadcast a route request message to find a route to the destination. So me of the reactive routing protocols are DSR, AODV and DYMO. Due to the random movement of nodes, the network topology becomes unpredictable and changes rapidly. In order to find the most adaptive and efficient routing protocols for dynamic MANET topologies, the behavior of routing protocols need to be analyzed at varying node speeds, network size, number of traffic nodes and node density [Fahim Maan et al., 2010].AODV and DYM O routing protocols are used in simu lation. 2.1 AODV Ad-hoc on–demand distance vector is a reactive routing protocol. This property imp lies that it requests a route when it needs one and the nodes which do not want to take part in active co mmunicat ion, need not to maintain routing tables. AODV uses the sequence number to find fresh routes. AODV has two basic operations: route discovery and route maintenance. AODV uses RREQ, RREP and RERR messages to find and maintain th e routes.In route discovery , when a source node desire a route to the destination node for which it does not have a route, it broadcast a route request (RREQ) message in the network. RREQ message contains source IP address, destination IP address, seque nce number, hop count and broadcast ID. A neighbor receiving a RREQ may send route reply (RREP), if it is either the destination or if it has unexpired route to the destination. When destination node send a route reply (RREP) message to the source node, a forward path is formed. Now source node will send the data through this path.In route maintenance, when a link breakage in an active route is detected, the node notifies this link breakage by sending a route error (RE RR) message to the source node [Dong-Won Kum et al., 2010] . The source node will rein itiate the route discovery process if it still has data to send. 2.2 DYMO DYM O is a successor of AODV. It is a co mb ination of AODV and DSR routing protocols. Similar to AODV, DYM O has two basic operations, route discovery and route maintenance. In route discovery, the source node broadcast a RREQ message throughout the network to find the destination node. During this process, each intermediate node records a route to the source node and rebroadcast the RREQ after appending its own address. This is called the path ||Issn 2250-3005(online)|| ||December || 2012 Page 292
  • 2. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8 accumulat ion function. When the destination node receives the RREQ, it responds with RREP to the source node. Each intermediate node that receives the RREP records a route to the destination node. When the source node receives RREP message, the route is established between the source node and the destination node. As path accumulation function can reduce the routing overhead, although the packet size of the routing packet is increased [Dong-Won Kum et al., 2010]. When a link breaks, the source of the packet is notified. RERR message is sent to inform the source node. 3. Wormhole Attack High speed of channel lin k Fig 1. Wormho le attack Wormhole is a severe type of attack, where t wo attackers are connected to each other through high speed off-channel link. In this wormhole node receives the packet at one location and send it to other wormhole node through high speed off - channel link. The worst can happen that nodes can be in dilemma that they are close to the destination even though they are at far distance. Three types of wormho le attack are: 1. All Pass: In this wormhole nodes will pass all the packets irrespective of their size. 2. All Drop : In this all the packets are dropped by wormhole nodes. 3 Th reshold: Wormhole drops all the packets size greater than or equal to the threshold value. 4. Simulation And Results The Qualnet 5.2 simulator is used for simulation. The MA C protocol IEEE 802.11 was used with a data rate of 2 Mbps. Table 1. Simu lation Parameters Parameter Value Terrain Size 1500m×1500 m No. of Nodes 25/ 50/ 75/ 100 No. of wormho le nodes 4/8/12/16 Traffic Type CBR No. of CBR links 5 Mobility Model Random Waypoint Routing Protocols AODV, DYM O MAC 802.11 Packet Size 512 bytes Speed 0-10m/s Pause Time 10 sec Simu lation Time 400 sec Attack Type Wormhole 4.1 Performance Metrics Performane Metrics used to measure the performance are : 4.1.1 Packet Deli very Ratio: Packet delivery rat io is calculated by dividing the number of packets received by the destination through the number of packets originated by source. 4.1.2 Average End-to-End Delay: Average end-to-end delay is the average time it takes a data packet to reach to destination in seconds. It is calculated by subtracting “time at which first packet was transmitted by source” from “time at which first data packet arrived to destination. 4.1.3 Throughput: It is defined as total number of delivered data packets divided by the total duration of simulation time. 4.1.4 Jitter: Jitter is the variation in the time between packets arriving, caused by network congestion, and route changes. ||Issn 2250-3005(online)|| ||December || 2012 Page 293
  • 3. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8 Results without wormhole attack Results wi th Wormhole  All Pass ||Issn 2250-3005(online)|| ||December || 2012 Page 294
  • 4. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8  ALL Drop In all drop, all the packets that are sent by the sender to the receiver are dropped by the wormhole nodes. Fig. 12 Throughput for All Drop mode Fig. 13 Avg Jitter fo r All Drop mode  Threshol d (150 Bytes) In this case, wormhole drops all the packets which are above 150 bytes in size. 5. Conlusion And Future Work Fro m simulat ion results it is concluded that AODV perform better than DYMO without wormhole attack. But under the wormhole attack the performance of bothe the protocols decreased. But still A ODV has better performance than DYM O. A ll Pass and Threshold has effected the performance greatly. At 25 nodes it has shown some results but as the number of nodes increased the wormhole nodes came into existance and decreased the performance co mpletely. All drop has less affect on the performance as it drop the route request packets and routes are establishe d through other nodes in the network.In future work performance can be measured with different performance metrics like routing overhead by varying pause time and speed. Security mechanism to prevent fro m these types of attacks can also be developed. ||Issn 2250-3005(online)|| ||December || 2012 Page 295
  • 5. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 8 References [1] Priti Garg, Asma Tuteja . Co mparative Performance Analysis of Two Ad-hoc Routing Protocols , International Conference on Network and Electronics Engineering, IPCSIT vol.11,IACSIT Press, Singapore, 2011. [2] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade. Mobile Ad Hoc Networking: Imperat ives and Challenges , IJCA Special Issue on “Mobile Ad-hoc Networks”, 2010. [3] Jeroen Hoebeke, Ingird Moerman, Bart Dhoebt and Piet Demeester, , An Overview of Mobile Ad-hoc Networking: Applications and Challenges, 2006. [4] S. Su resh kumar, T. V.P Sundararajan and A Shan mugam. Perfo rmance Co mparison of three types of wormhole attack in Mobile Adhoc Network, proceedings of the international conference on information science and applications, Chennai, India, 2010. [5] Gu rjinder Kaur, V. K Jain and Yogesh Chaba. Wormhole attacks: Perfo rmance Evaluation of On Demand Routing Protocols in Mobile Ad-hoc Networks, world conference on informat ion and communication technologies,pp. 1155-1158, 2011. [6] Dong-Won Kum, Jin-Su Park, You-Ze Cho and Byoung-Yoon Cheon. Performance Evaluation of AODV and DYM O Routing Protocols in MANET, IEEE CCNC, 2010. [7] Fahim Maan, Nau man Mazhar. MANET Routing Protocols vs Mobility Models: A Performance Evaluation,ICUFN, 2010. [8] MIAO Quan-xing, XU Lei. DYM O Routing Protocol Research and Simu lation Based on NS2 International Conference on Co mputer Application and System Modeling , 2010. [9] Rashid Sheikh, Mahakal Singh Chandel, durgesh Kumar Mishra. Security issues in MANET: A Review, IEEE, 2010. ||Issn 2250-3005(online)|| ||December || 2012 Page 296