Вы находитесь на странице: 1из 14

CHAPTER- 5

IMPLEMENTATION AND RESULT IMPLEMENTATION


For better understanding of our work i.e. evaluation of friendship mechanism in manet we have framed our work in three scenarios which consist of a simple manet protocol for now we have taken DSDV in consideration and performed a comparative study by implementing a attack scenario on the same and after attack for confirming that whether our friendship mechanism is working in proper manner or not we have designed a code for prevention of attacked mechanism in dsdv protocol using trust based algorithm in manet.. In our work we have performed 3 simulations First scenario is with a normalized dsdv protocol. Second is for DSDV which is having some malicious nodes in it and then the scenario which is showing the prevention mechanism in DSDV protocol. We have taken 30 nodes for our implementation to be done. The simulation is done using NS-2 simulator, To analyze the performance of the network by applying various types of data flow following parameters has used to evaluate the performance of the work done which are as given below: i) ii) iii) iv) Total No. of Drop Packets: It is the difference between sending and received packets. Packet Delivery Ratio: The ratio between the numbers of packets received to the send. Throughput: Throughput is the average rate of successful message delivery over a communication channel. End to end Delay: It can be defined as the time a packet takes to travel from destination. source to

Outcomes and their analysis: We have reached towards outcome by implementing three protocols. 1. Normalized DSDV 2. DSDV with attack/malicious node i.e. blackholedsdv 3. DSDV with prevention and modification named as .MDSDV Nam implementation for DSDV PROTOCOL. In the first scenario where there is no Black Hole attack i.e. simple DSDV, in figure 1 we can see that there is no constant packet drop in nam output.

Fig.1 Packet flow under DSDV without attack

Nam implementation for with blackholedsdv protocol: In the second scenario where there is a Black Hole DSDV Node, there is packet dropping between Node 11 and Node 21, when we look at the animation of the simulation, using NAM.

Fig.2 Packet flow under DSDV with blackhole attack Nam implementation for prevented dsdv protocol: In the figure3 below we have implemented prevention technique in which the friendship mechanism is implemented there is packet drop between nodes but very less as compare to attacked dsdv in second scenario where there is a Black Hole DSDV Node.

Fig.3 Packet flow under Prevented DSDV with blackhole attack

5.2 Results and their analysis:

We have analyzed results under various parameters/performance matrices of all the three scenarios i.e normalized dsdv,blackholedsdv and prevented dsdv under the following parameters which are as follows: Packet Delivery Ratio of dsdv protocol: Figure 3 show the total no of sending and receiving packet under dsdv protocol.

Fig.4 PDR graph for sending and receiving Packets on DSDV without black hole attack

Packet Delivery Ratio under blackholedsdv protocol: Figure 5 show the total no of sending and receiving packet under dsdv protocol.

Fig.5 pdr graph for sending and receiving Packets on DSDV with black hole attack

Packet Delivery Ratio under preventeddsdv protocol: Figure 6 show the total no of sending and receiving packet under prevented and modified dsdv protocol.

Fig.6 pdr graph for sending and receiving Packets on DSDV with prevention of black hole attack Analysis of Packet Delivery Ratio: For analysis of packet delivery ratio from resultant graphs of sending and receiving packet we can see that from above figures fig.4,fig.5 and fig 6 of dsdv,blackholedsdv and prevented dsdv respectively that without presence of any selfish node the total no of sent and received packet reaches around 12000 packet and there is limited drop but when attack occurs the packet dropping increase which is shown in fig 5 as the diffrence in sending and receiving packet is more. Finally in fig6 when we have implemented friendship mechnism even if attack is there than also there is a limited packet drop in prevented dsdv protocol using friendship mechanism.

Throughput of dropping packets:

Throughput of dropping packets for DSDV Protocol: Figure 7 shows the throughput of dropping packet with respect to time under normalized DSDV protocol.

Fig.7 Throughput of dropping packet w.r.t. time under DSDV protocol without black hole attack Throughput of dropping packets for blackholedsdv Protocol: Figure 8 shows the throughput of dropping packet with respect to time under attacked DSDV protocol.

Fig.8 Throughput of dropping packet w.r.t. time under blackholeDSDV protocol with black hole attack

Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 9 shows the throughput of dropping packet with respect to time with implemented friendship mechanism under prevented DSDV protocol.

Fig.9 Throughput of dropping packet w.r.t. time under preventeddsdv protocol with black hole attack

Analysis of Throughput of dropping packet: For analysis of Throughput of dropping packet w.r.t. time we can see that from above figures fig.7,fig.8 and fig 9 of dsdv,blackholedsdv and prevented dsdv respectively that without presence of any selfish node the throughput of dropping is more as compare to normalized dsdv and prevented dsdv .Thus we can say that when we implemented friendship mechanism under blackhole attack the rate of dropping degraded which can be verified from figure 9.Hence if the rate of packet dropping is decreased than there will be less no of packet which will be dropped.

End to end delay: End-End Delay for DSDV Protocol: Figure 10 shows the End to End delay with respect to time under DSDV protocol.

Fig 10End to end delay of packets on DSDV without black hole attack Throughput of dropping packets for blackholedsdv Protocol: Figure 11 shows the End to End delay with respect to time under BlackholeDSDV protocol.

Fig 11 End to end delay of packets on DSDV with black hole attack Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 12 shows the End to End delay with respect to time under Blackhole attack in dsdv protocol with friendship mechanism.

Fig 12 End to end delay of packets on DSDV with friendship mechanism. Analysis of End to End Delay: For analysis of End to End delay we can refer figures

fig.10,fig.11 and fig 12 of dsdv,blackholedsdv and prevented dsdv respectively. As we increases security the delay increases hence if we compare above mentioned graphs the attacked dsdv has very less e2e delay whereas when we have applied trust mechanism for friendship application among nodes the delay increeases which shouls be because when we increase the security the delay between source and destination for packet to be transferred increases.

Conclusion:
In this project simulation is done under Black hole attack using DSDV protocol in wireless mobile ad-hoc networks a node for examining the friendship of a node .For this purpose it is modified & implemented into a new DSDV routing protocol which behaves like a Black hole. we simulated different scenarios, where each one has one or two Black hole nodes that use the modified M DSDV protocol. In different scenarios the location of the Black hole nodes is to evaluate the impact. Moreover, it changed the number of nodes in different topologies. The packet loss is measured. Similarly other parameters like throughput and end- to -end delay due to Black hole attack is calculated and results are produced in the form of graphs using trace graph The main advantage of this work is that it enlightens the vulnerabilities of the DSDV protocol and it let very easy to find a friendship node and malicious node. Besides the study will help us to overcome the DSDV protocol flaws so that it could be made more robust against the attack.

Also the paper presents the overall measurement of the impact when a network is under the Black hole attack and helps in designing the topology which is more robust. The limitation of the simulation is that the measurement of the impact on MANETs becomes difficult when the mobility of the nodes increases too much. The possible application of this project is that the study can help to determine the impact on other routing protocols and other layers also. Another application of this work is determining the impact on sensor and mesh networks under Black hole attack or other attacks as well.

FUTURE SCOPE
This work can enhance the strength of next generation network designers and administrators to accommodate all their challenges for determination of network worm into common hierarchy and can eliminate the possibilities of wormhole, black hole and their occurrence in MANET. This work and the simulations gave various results to actuate the problem of network worms and respective attacks occurrence and to motivate the friendship node to update.

APPENDIX
A .PUBLICATIONS:
1.A Novel Paradigm: Friendship Etiquette in MANET by Nivedita Shirke ,a research scholar,Shri Satya Sai Institute of science and technology, Sehore and Gajendra Singh Chandel, an assistant professor, Shri Satya Sai Institute of science and technology, Sehore at IJERT, vol.2, issue 1, January 2013. 2. Implementation of friendship mechanism to enhance security in MANET by Nivedita Shirke ,a research scholar,Shri Satya Sai Institute of science and technology, Sehore and Gajendra Singh Chandel, an assistant professor, Shri Satya Sai Institute of science and technology, Sehore, proceeding in VSRD international journal, august 2013.

14

Вам также может понравиться