Performance Evaluation of Manaet in Aodv Routing Protocol Under Wormhole Attack Using Ns3
Performance Evaluation of Manaet in Aodv Routing Protocol Under Wormhole Attack Using Ns3
Supervisor Submitted By
Amit Kumar Bairwa Himanshu Gautam
Asst. Prof. 13E2RECSM4XP606
Department of Computer Science and Engineering
Rajasthan Institute of Engineering and Technology
Rajasthan Technical University
August, 2017
Acknowledgement
I would like to thank my guide Asst. Prof. Amit Kumar Bairwa for his
valuable guidance. I appreciate his presence for giving all discussions,
suggestions and the time for me whenever I needed him.
I am heartly thankful to my coordinator, Asst. Prof. Vijay Sharma,
whose encouragement, guidance and support from the initial to the
final level have enabled me to develop an understanding of the subject.
I would also like to give my special thanks to the Prof. Kapil Dev
Sharma (HOD CSE,), Dr. Saroj Hiranwal (Principal) and the
management of Rajasthan Institute of Engineering and Technology for
providing the opportunity to me to undertake this work.
I also want to thank my friends and family for their encouragement and
support. In particular, I am grateful to my parents for their love and for
instilling in me a deep sense of academic pride.
Lastly, I offer my regards and blessings to all of those who supported
me in any respect during the completion of the work.
Objective
Few characteristics of a Mobile Ad hoc Network, such as dynamic topology
and shared wireless medium, pose various security challenges.
This research focuses on the performance investigation of MANET routing
protocols, under various the security attacks.
Network performance is evaluated in terms of end to end delay, routing over
head, network load and throughput, when a percentage of nodes misbehave.
Find out which protocol has the highest resistance to security attacks.
Find out is there any benefit of behaving maliciously or selfish.
Introduction
Mobile Ad Hoc Network
Collection of mobile nodes that can dynamically form a network that does
not rely on any infrastructure.
Each device will work as computational device as well as router.
Each device will have limited battery.
MANET Challenges
Regardless of the attractive applications, the features of MANET introduce
several challenges that must be studied carefully before a wide commercial
deployment can be expected. These include:
1) Routing
4) Power Consumption
Routing protocol
Routing protocol may generally be categorized as three types
ABR
ACOR
Reactive Protocol
AODV
DSR
CGSR
DSDV
MANAET Routing Protocol Proactive Protocol
OLSR
WRF
ARPAM
OORP
Hybrid Protocol
TORA
ZRF
Continue
1)Dynamic Source Routing
Reactive or On Demand
Two phases of DSR protocol
1)Route discovery
2) Route maintenance
Sybil attack, Sinkhole attack, Black hole attack, Gray hole attack,
Network Layer Wormhole attack, Spoofing, Flooding, Location disclosure, Route
table overflow, Route table poisoning, Route cache poisoning
Sybil attack, Sinkhole attack, Black hole attack, Gray hole attack,
Network Layer Wormhole attack, Spoofing, Flooding, Location disclosure, Route
table overflow, Route table poisoning, Route cache poisoning
The attack can also still be performed even if the network communication provides
confidentiality and authenticity and even if the attacker has no cryptographic key.
Wormhole Attack
Hidden Attack:
The attackers do not modify either the content or the header of packets. W1,
W2 are invisible to other nodes.
S A1 B1 D
A1, B1: fake neighbors
Exposed Attack:
The attackers do not modify the content of the packets but include themselves
in the packet header following the route setup procedure.
S A1 W1 W2 B1 D
Other nodes know the existence of wormhole nodes but they do not know
wormhole nodes are malicious
2
RTT2 RTT3 3
A w w
RTT1 RTT4
1 4
We calculate all transmission times between two successive nodes along the path
established between the source & the destination.
Each intermediate node calculates the transmission time between it and the
destination, put the value into RREP & send back to the source node.
S A B C D
TSREQ R R EQ
Processing
TAREQ Time
R R EQ
RR
EQ
TBREQ
TCREQ
RTTS,D
R R EQ
TDREQ
RTTA,D
Time
TDREP
TCREP R R EP RTTB,D
RTTC,D
EP
RR RTTS,A
TBREP
RTTA,B
TAREP R R EP
RTTB,C
TSREP
R R EP RTTC,D
Processing Time
RREP format
RREQ Format
Black hole Attack
In Computer networking , a packet drop attack or black hole attack is a type
of denial-of-service attack in which a router that is supposed to relay
packets instead discard them.
This usually occurs from a router becoming compromised from a number
of different cases.
Because packets are routinely dropped from a lossy network, the packet
drop attack is very hard to detect and prevent.
The malicious router can also accomplish this attack selectively, e.g. by
dropping packets for a particular network destination, at a certain time of
the day, a packet every n packets or every t seconds, or a randomly selected
portion of the packets
Effect of Black Hole Attack on Dynamic
Source Routing Protocol
In DSR, the source node gets multiple paths to reach each
destination and best path will be decided based on minimum hop-
count.
Again the aggressive use of route cache will allow DSR to find a
current existing path without any new route discovery or choose an
alternate path to the destination in the presence of route failure or link
breakage due to mobility.
This will save large route discovery overhead and effectively reduce
the time delays. This route cache works fine with low traffic load
and lower mobility; however it will face some problems when the routes
in its cache become expired due to host mobility.
Under these conditions, the source node will continue to use these
expired routes without any notice
Tools & Technique for Implementation
Route overhead Vs Num. of Selfish Node for CBR Traffic From Figure, We can say that
when some nodes behave selfishly, they prune control packets and reduce the routing
overhead. As number of selfish nodes increase, Routing overhead of overall network
decrease drastically. Due to drastic decrement in routing overhead, overall network become
efficient and good nodes as well as selfish nodes saves energy.
2) Throughput: Figure shows the throughput of network with varying number of selfish
nodes. Simulation results suggest that certain numbers of selfish nodes are good for network.
It also improves network throughput and make network efficient. When initially density is
high, the probability of collision increase.
Figure shows Throughput Vs Num. of Selfish Node for CBR Traffic As more number of
nodes behaves selfishly, network density decreases which in turn decrease the
probability of packet collision. So up to certain limit, selfish nodes are good for network.
Effect of Worm Hole Attack on
AODV Protocol
In worm hole attack, all network traffics are redirected to a specific node which
does not exist at all. Because traffics disappear into the special node as the matter
disappears into Black hole in universe. So the specific node is named as a Black
hole.
A worm hole has two properties. First, the node exploits the ad hoc routing
protocol, such as AODV, to advertise itself as having a valid route to a destination
node, even though the route is spurious, with the intention of intercepting packets.
Second, the node consumes the intercepted packets.
Worm hole attacks in AODV protocol routing level can be classified into two
categories: RREQ worm hole attack and RREP Black hole attack. Following are
our simulation results that demonstrate the effects of worm hole attack on AODV
protocol in Mobile Ad- Hoc Networks.
1) Throughput:
Figure shows the throughput of network with varying number of selfish nodes
Simulation result suggest that as number of worm hole attacker increase network
become disconnected because every path will go through attacker nodes and that
node will drop all packets and its throughput decrease significantly. .
End to End Delay:
From below figure we can say that as number of attacker increase,
End to end delay increased because network is not able to find
appropriate in presence of worm hole attack.
3) Routing Overhead:
Simulation result suggest, In presence of worm hole nodes overall
routing overhead is decreased because worm hole node does not
forward route request and route reply packets
Comparative Results
Throughput
Queries!!!!