Вы находитесь на странице: 1из 5

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL UNDER

FLOODING ATTACK IN MANETS USING NS2


NAGRAJ KYASA
Asst. Professor, Department of ECE, DBIT, Kumbalagodu Mysore Road,
Bangalore, Karnataka,INDIA
nagaraj.kyasa@gmail.com

SIDDLINGAPPAGOUDA BIRADAR
Asst. Professor, Department of ECE, DBIT, Kumbalagodu Mysore Road,
Bangalore, Karnataka,INDIA
siddubiradarr@gmail.com

ABSTRACT: The mobile ad hoc network (MANETs) consists of a collection of wireless mobile
nodes that are capable of communicating with each other without the use of infrastructure
network. In MANET, routing attacks are particularly serious about attacks due to malicious nodes.
One of these attacks is the flooding attack. Black hole attack is a type of denial-of-service attack in
which a intermediate router that is supposed to relay packets instead discards them which leads to
data loss as a result the performance of the network reduces. This usually occurs from a router
becoming malicious router. The packet drop attack is very hard to prevent. This paper describes
the effect of black hole attack on Ad hoc On-Demand Distance Vector (AODV) protocols using
certain performance metrics parameters.

KEYWORDS: MANET, AODV, Black Hole Attack, Network Simulator 2.

INTRODUCTION

A MANET is a type of wireless ad-hoc network, and is a self-establishing network of mobile


nodes connected by wireless links which leads to the formation of random topology [9]. The nodes
are free to move irregularly and adjust themselves immediately; thus, the network's wireless
topology may change randomly and unpredictably. Such a wireless network topology may be
connected to the larger Internet. Wireless networks are presently growing rapidly in the network
industry. They can arrange mobile users with universal communication facility and information
access with irrespective of its location. General wireless networks are many times connected to
wire network so that the internet connections can be increased to mobile users. So this type of
wireless network needs a proper wireline courage infrastructure. All mobile hosts in a
communication cell can reach a base station on the wireline network in one-hop radio
transmission. Along with the conventional wireless networks, other kind of model, based on radio
to radio multi-hopping, has neither fixed base stations nor a wired courage infrastructure. In some
environments application, such as battleground communications, emergency recovery etc., the
wired network is not available easily and multi-hop wireless networks provide the only achievable
means for communication and information access. This type of network is called Mobile Ad hoc
network. It is also need to play an important role in private areas such as campus recreation,
conferences, and electronic classrooms etc [4]. Mobile hosts and wireless networking hardware are
becoming widely available, and extensive work has been done recently in integrating these
elements into traditional networks such as the Internet. Usually sometimes, mobile customers may
want to communicate with each other without the boundaries of fixed infrastructure like fixed
backbones or confined within a certain area. For example, a group of students may want to
communicate with each other to share some lecture notes, assignments etc.; friends or business
associates may meet somewhere and may want to share some files; some disaster recovery team
may want to setup a network in some emergency to share the details of the situation with each
other. In such situations, a temporary network can be setup without a centralized infrastructure.
These are some examples where MANETs can be employed efficiently and effectively [3].

AODV

In order to discover routes for data transfer, AODV routing protocol uses on-demand technique.
That is source node creates path to transfer the data packet to destination. In order to identify most
recent route, it make use of destination sequence number. But in AODV routing protocol the
intermediate and source node keeps the next-hop information. Initially while finding the route in
on-demand routing protocol, source node broadcast RouteRequest packet in the wireless ad-hoc
network, when a route is not available for required destination. Source node may obtain many
numbers of routes to different destinations by means of RouteRequest packet. AODV routing
protocol uses destination sequence number (DestSeqNum) to determine latest path to destination
which is main difference between AODV and other on-demand routing protocols. If the
DestSeqNum of the current packet is greater than the last DestSeqNum stored at the node then
only the node updates its information in the routing table. Destination identifier (DestID) and
source identifier (SrcID) are carried by RouteRequest Packet [7].

Along with it, it also carries time to live (TTL), broadcast identifier (BcastID) and destination
sequence number (DestSeqNum) field which helps to identify the shortest path between source and
destination node. DestSeqNum checks the latest of the route that is accepted by the source node.
When a RouteRequest received by the intermediate nodes it either send it further or builds a
RouteReply if it is correct route to the destination. The correct route is determined by intermediate
node only by comparing the destination sequence number in the RouteRequest packet with
sequence number at intermediate node. If duplicate RouteRequest are received multiple times then
they are discarded, this process is indicated by SrcID-BcastID pair. The intermediate node that are
present between source and destination node have valid routes or the route reply packets from the
destination itself allowed to send to the source [8]. While forwarding the RouteRequest the
intermediate node enters into the last node address and its BcastID. In case if a RouteReply is not
received a timer is used in order to delete this entry. This plays an important role while finding
active path at the intermediate node as AODV protocol does not all data packets of source routing.
The node stories information about previous node only when it receives the RouteReply packet
which helps to forward the packets further to next node as a next hope towards the destination.

FLOODING ATTACK

In flooding attack, Malicious node will create a more number of RREQ to a node, which is even
doesnt exist in the network topology. This is how malicious node, Start to flood the request in the
network. The purpose of this attack is to consume the network bandwidth and to exhaust the
network resources all the time.

440
SIMULATION RESULT & ANALYSIS

The simulation results are shown in the following section in the form of varying graphs. The
performance of AODV routing protocol with black hole attack and without black hole attack,
based on performance parameters like average jitter, average end-to-end delay and throughput are
as shown in the figures. Fig.1 shows the creation of clusters with 25 mobile nodes as it is shown
in the NAM console which is a built-in program in NS-2-allinone package after the end of the
simulation process.

Tab1: simulation parameters used in this evaluation


Simulator NS-2.35
Protocol AODV
Simulation duration 0-105 seconds
Simulation area 1186m x 1000m
Number of nodes 25
Movement model Random Waypoint
MAC Layer Protocol IEEE 802.11
Link Type Duplex-link
Queue size 50
Transmission range 250
Interference range 550
Packet Size 1500 bytes/packet
Application Type CBR
Agent Type UDP

441
Tab2: Data packets at received application layer
At Application layer
Packets Without Flooding With Flooding Attack
Attack
Sent 1238 1238
Received 1238 1238
Total 2476 2476

Tab3: Data packets at received network layer


At Network layer
Packets Without Flooding With Flooding Attack
Attack
Sent 1238 59346
Received 3945 400103
Total 5183 459449

CONCLUSION

After simulation and comparison of with and without black hole attack, the experimental results
show that the effect of malicious nodes that exist in wireless network. The performance of network
starts reducing during the analysis of AODV protocol.

FUTURE SCOPE

In future, by considering different simulation parameters and performance metrics we can do the
analysis of different types of attack such as wormhole attack, routing attack, DoS attack Jellyfish
attack, eclipse attack, man- in-the- middle attack, stealth attack and jamming attack etc. on
MANETs with different routing protocols.

REFERENCES

Singh Harmandeep, Singh Gurpreet and Singh Manpreet, Performance Evaluation of Mobile Ad
Hoc Network Routing Protocols Under Black Hole Attack, International Journal of Computer
Applications, Vol. 42(18) , pp.1-6,2012.
Chandra Subash, Mandhata , Dr.Suryn Patro, A counter measure to Black hole attack on
AODVbased Mobile Ad-Hoc Networks, International Journal of Computer & Communication
Technology (IJCCT), Volume-2, Issue-VI, 2011.
S.Kannan, T. Kalaikumaran, . S.Karthik, V.P. Arunachalam A Review on Attack Prevention
methods in MANETJournal of modern mathematics and statistics 5(1) :37-42, 2011, ISSN
1994-5388, Medwell journals, 2011.
Rakesh kumar Sahu,Narendra S chaudhari performance evaluation of ad hoc network under
black hole attack 978-1-4673-4805-8, IEEE 2012.
Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy and P. Balamuralidhar, A
Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks, Proceedings of
IEEE 6th International Conference on Information, Communications and Signal Processing,
pp.1-5, 2007.

442
Sima ,A. Kush, Malicious Node Detection in MANET in Computer Engineering and Intelligent
Systems ISSN 2222-1719 Vol 2, No.4,pp. 6-13, 2011.
Istry N, Jinwala DC, IAENG, Zaveri M, Improving AODV Protocol Against Blackhole Attacks,
International Multi Conference of Engineers and Computer Scientists MECS Hong Kong, Vol.
2, pp 1-6, 17-19 March, 2010.
Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L, Developing a BDSR Scheme to Avoid
Black Hole Attack .

443

Вам также может понравиться