Download - Implimentation and Results
-
7/30/2019 Implimentation and Results
1/14
CHAPTER- 5
IMPLEMENTATION AND RESULT
IMPLEMENTATION
For better understanding of our work i.e. evaluation of friendship mechanism in manet we have
framed our work in three scenarios which consist of a simple manet protocol for now we have
taken DSDV in consideration and performed a comparative study by implementing a attack
scenario on the same and after attack for confirming that whether our friendship mechanism is
working in proper manner or not we have designed a code for prevention of attacked mechanism
in dsdv protocol using trust based algorithm in manet.. In our work we have performed 3
simulations First scenario is with a normalized dsdv protocol. Second is for DSDV which is
having some malicious nodes in it and then the scenario which is showing the prevention
mechanism in DSDV protocol. We have taken 30 nodes for our implementation to be done. The
simulation is done using NS-2 simulator, To analyze the performance of the network by applying
various types of data flow following parameters has used to evaluate the performance of the
work done which are as given below:
i) Total No. of Drop Packets: It is the difference between sending and received packets.
ii) Packet Delivery Ratio: The ratio between the numbers of packets received to the send.
iii) Throughput: Throughput is the average rate of successful message delivery over a
communication channel.
iv) End to end Delay: It can be defined as the time a packet takes to travel from source to
destination.
-
7/30/2019 Implimentation and Results
2/14
Outcomes and their analysis:
We have reached towards outcome by implementing three protocols.
1. Normalized DSDV
2. DSDV with attack/malicious node i.e. blackholedsdv
3. DSDV with prevention and modification named as .MDSDV
Nam implementation for DSDV PROTOCOL.
In the first scenario where there is no Black Hole attack i.e. simple DSDV, in figure 1 we can see
that there is no constant packet drop in nam output.
Fig.1 Packet flow under DSDV without attack
-
7/30/2019 Implimentation and Results
3/14
Nam implementation for with blackholedsdv protocol: In the second scenario where there is a
Black Hole DSDV Node, there is packet dropping between Node 11 and Node 21, when we look
at the animation of the simulation, using NAM.
Fig.2
Packet flow under DSDV with blackhole attack
Nam implementation for prevented dsdv protocol: In the figure3 below we have implemented
prevention technique in which the friendship mechanism is implemented there is packet drop
between nodes but very less as compare to attacked dsdv in second scenario where there is a
Black Hole DSDV Node.
Fig.3 Packet flow under Prevented DSDV with blackhole attack
-
7/30/2019 Implimentation and Results
4/14
5.2 Results and their analysis:
We have analyzed results under various parameters/performance matrices of all the three
scenarios i.e normalized dsdv,blackholedsdv and prevented dsdv under the following parameters
which are as follows:
Packet Delivery Ratio of dsdv protocol: Figure 3 show the total no of sending and receiving
packet under dsdv protocol.
Fig.4 PDR graph for sending and receiving Packets on DSDV without black hole attack
Packet Delivery Ratio under blackholedsdv protocol: Figure 5 show the total no of sending
and receiving packet under dsdv protocol.
-
7/30/2019 Implimentation and Results
5/14
Fig.5pdr graph for sending and receiving Packets on DSDV with black hole attack
Packet Delivery Ratio under preventeddsdv protocol: Figure 6 show the total no of sending
and receiving packet under prevented and modified dsdv protocol.
-
7/30/2019 Implimentation and Results
6/14
Fig.6pdr graph for sending and receiving Packets on DSDV with prevention of black
hole attack
Analysis of Packet Delivery Ratio: For analysis of packet delivery ratio from resultant graphs
of sending and receiving packet we can see that from above figures fig.4,fig.5 and fig 6 of
dsdv,blackholedsdv and prevented dsdv respectively that without presence of any selfish node
the total no of sent and received packet reaches around 12000 packet and there is limited drop
but when attack occurs the packet dropping increase which is shown in fig 5 as the diffrence in
sending and receiving packet is more. Finally in fig6 when we have implemented friendship
mechnism even if attack is there than also there is a limited packet drop in prevented dsdv
protocol using friendship mechanism.
Throughput of dropping packets:
-
7/30/2019 Implimentation and Results
7/14
Throughput of dropping packets for DSDV Protocol: Figure 7 shows the throughput of
dropping packet with respect to time under normalized DSDV protocol.
Fig.7 Throughput of dropping packet w.r.t. time under DSDV protocol without black hole attack
Throughput of dropping packets for blackholedsdv Protocol: Figure 8 shows the throughput
of dropping packet with respect to time under attacked DSDV protocol.
Fig.8 Throughput of dropping packet w.r.t. time under blackholeDSDV protocol with black hole
attack
-
7/30/2019 Implimentation and Results
8/14
Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 9 shows the
throughput of dropping packet with respect to time with implemented friendship mechanism
under prevented DSDV protocol.
Fig.9 Throughput of dropping packet w.r.t. time under preventeddsdv protocol with black hole
attack
-
7/30/2019 Implimentation and Results
9/14
Analysis of Throughput of dropping packet: For analysis of Throughput of dropping packet
w.r.t. time we can see that from above figures fig.7,fig.8 and fig 9 of dsdv,blackholedsdv and
prevented dsdv respectively that without presence of any selfish node the throughput of dropping
is more as compare to normalized dsdv and prevented dsdv .Thus we can say that when we
implemented friendship mechanism under blackhole attack the rate of dropping degraded which
can be verified from figure 9.Hence if the rate of packet dropping is decreased than there will be
less no of packet which will be dropped.
End to end delay:
End-End Delay for DSDV Protocol: Figure 10 shows the End to End delay with respect to time
under DSDV protocol.
Fig 10End to end delay of packets on DSDV without black hole attack
Throughput of dropping packets for blackholedsdv Protocol: Figure 11 shows the End to
End delay with respect to time under BlackholeDSDV protocol.
-
7/30/2019 Implimentation and Results
10/14
Fig 11 End to end delay of packets on DSDV with black hole attack
Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 12 shows the
End to End delay with respect to time under Blackhole attack in dsdv protocol with friendship
mechanism.
-
7/30/2019 Implimentation and Results
11/14
Fig 12 End to end delay of packets on DSDV with friendship mechanism.
Analysis of End to End Delay: For analysis of End to End delay we can refer figures
fig.10,fig.11 and fig 12 of dsdv,blackholedsdv and prevented dsdv respectively. As we increases
security the delay increases hence if we compare above mentioned graphs the attacked dsdv has
very less e2e delay whereas when we have applied trust mechanism for friendship application
among nodes the delay increeases which shouls be because when we increase the security the
delay between source and destination for packet to be transferred increases.
.
Conclusion:
In this project simulation is done under Black hole attack using DSDV protocol in
wireless mobile ad-hoc networks a node for examining the friendship of a node .For this purpose
it is modified & implemented into a new DSDV routing protocol which behaves like a Black
hole. we simulated different scenarios, where each one has one or two Black hole nodes that use
the modified M DSDV protocol. In different scenarios the location of the Black hole nodes is
to evaluate the impact. Moreover, it changed the number of nodes in different topologies. The
packet loss is measured. Similarly other parameters like throughput and end- to -end delay due to
Black hole attack is calculated and results are produced in the form of graphs using trace graph
The main advantage of this work is that it enlightens the vulnerabilities of the DSDV protocol
and it let very easy to find a friendship node and malicious node. Besides the study will help us
to overcome the DSDV protocol flaws so that it could be made more robust against the attack.
-
7/30/2019 Implimentation and Results
12/14
Also the paper presents the overall measurement of the impact when a network is under the
Black hole attack and helps in designing the topology which is more robust.
The limitation of the simulation is that the measurement of the impact on
MANETs becomes difficult when the mobility of the nodes increases too much. The possible
application of this project is that the study can help to determine the impact on other routing
protocols and other layers also. Another application of this work is determining the impact on
sensor and mesh networks under Black hole attack or other attacks as well.
FUTURE SCOPE
This work can enhance the strength of next generation network designers and administrators to
accommodate all their challenges for determination of network worm into common hierarchy
and can eliminate the possibilities of wormhole, black hole and their occurrence in MANET.
This work and the simulations gave various results to actuate the problem of network worms and
respective attacks occurrence and to motivate the friendship node to update.
-
7/30/2019 Implimentation and Results
13/14
APPENDIX
A .PUBLICATIONS:
1.A Novel Paradigm: Friendship Etiquette in MANET by Nivedita Shirke ,a research
scholar,Shri Satya Sai Institute of science and technology, Sehore and Gajendra Singh Chandel,
an assistant professor, Shri Satya Sai Institute of science and technology, Sehore at IJERT, vol.2,issue 1, January 2013.
2. Implementation of friendship mechanism to enhance security in MANET by NiveditaShirke ,a research scholar,Shri Satya Sai Institute of science and technology, Sehore and
Gajendra Singh Chandel, an assistant professor, Shri Satya Sai Institute of science and
technology, Sehore,proceeding in VSRD international journal, august 2013.
-
7/30/2019 Implimentation and Results
14/14
14