manet

Upload: adilnasir

Post on 02-Mar-2016

13 views

Category:

Documents


0 download

DESCRIPTION

MANET

TRANSCRIPT

  • 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA

    Performance Analysis of DOA and AODV Routing Protocols with Black

    Hole Attack in MANET P. R. Jasmine Jeni 1 A. V imala Juliet 2 R.Parthasarath/ A.Messiah Bose 4

    1 Professor, Madha Engineering College 2 Professor SRM University 3 Assistant

    Professor Madha Engineering College, 4 Chemtrols Industries L td.

    Chennai, India

    Abstract- The collection of mobile nodes without infrastructure known as the mobile adhoc network has its nodes that moves independently towards all directions in the network thereby changing the network topology frequently. In MANET, whenever the node that is identified as source need to transfer data to the receiving node which resides out of coverage area, source node uses intermediate nodes. We use DOA protocol for the purpose of connectivity in such large scale networks for better data transmission. In such case, if a malicious node enters into the MANET, packet loss occur leading to performance degradation. The secure transfer of information via large scale wireless network is a challenging issue. In this paper we analyzed two routing protocols used in large scale network; the DOA and AODV routing protocols and injected them using black hole attack and evaluated its quality parameters like packet delivery ratio and average end to end delay. The network was simulated using NS2 and the performances of the protocols were compared for its efficiency.

    Keywords- Blackhole attack; DOA; AODV; MANET.

    I. INTRODUCTION

    The communication between neighboring nodes in an Mobile Ad hoc N etwork [I] takes place via wireless links and all the nodes in between the communicating nodes perform similar to a router. The routers or the intermediate node in the wireless network is used to forward the data packets on their way to the destination from the source node. The topology of the network changes due to the movement of nodes in the wireless network. Due to the mobile nature of nodes in MANET, and the frequent change in network topology, the need for effective routing protocol is mandatory to maintain the communication among the network as well as between nodes in the network. Routing protocol is the tool, most essential to establish communication between the nodes willing to send data packet otherwise known as the source, the node expected to

    receive the data packet also known as the destination. The routing protocol has control packets comprising the fields like the IP address, destination 10, hop counts etc. that are essential for route discovery. The misapplication of any of these field leads to the malfunction of the routing protocol in the network. The exchange in information regarding the change of network topology that occurs due to the mobility of node becomes an easy rival for malicious attackers to intrude into the network. The possible threats occur mainly due to the misbehavior of nodes and due to the external attackers or the intruders. The malfunction of nodes due to several application problems thereby transmitting erroneous control and data packets to the neighboring nodes brings in threat in the form of eves dropping. The external attackers inject black hole there by a malicious node diverts the intended packets by intimating the network which having a shortest path to reach its destination. The black hole attack is more crucial in wireless network as it diverts the data packets and eventually discards them and never allows them to reach the destination. This paper describes our analysis on black hole attack over mobile Adhoc networks that use DOA and AODV routing protocols. The effect of the black hole attack on the network and the impact aftermath is analyzed. The performance of the network is compared for both routing protocols for its rate of delivery of data packets and Average end-end delay using N S2 simulator. The application for Mobile Ad hoc N etwork includes personal area network, military environments, civilian environments and emergency operations etc. , that are more crucial and required to be away from attacks.

    A. Types of Attacks in MANET The attacks in MAN ET [3] can be

    categorized into Passive and Active attacks. The Passive attacks are done to steal information of network such as, eavesdropping attacks and

    978-1-4673-6240-5/32 $ 31.00 2013 IEEE 178

  • 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA

    traffic analysis attacks, Passive attackers swap the data from the network even without disturbing the function of a network and modification of the swapped data. In active attacks too, replication, alteration and termination of exchanged data is done by attackers. The attacks in ad-hoc networks can also be categorized to internal attacks and External attacks. The Internal attacks are usually carried out by any authorized node in the network, and the external attacks are performed by unauthorized nodes that are used to participate in the network. Another classification of attacks is related to protocol stacks, for instance, network layer attacks viz black hole attack, denial of service attack, sinkhole attack and warm hole attack.

    II. THEORETICAL BACKGROUND

    A. Overview of DSR protocol The Dynamic source routing [4 ] protocol is

    one of the flat on demand routing protocol that is suitable for smaller wireless networks. There are two schemes in DSR routing protocol for discovery of routes and maintenance of routes. A source fmds a route to its destination for transmission of data packet by initiating the route discovery scheme. The routes are listed and stored in the route cache mechanism for the purpose of route discovery and maintenance. All previous routes are stored to the cache and are used to acknowledge the establishment of routes. The neighboring node searches its route caches for existing routes, upon receipt of the route request message from the source node. If existing route is not available, it then transmits the route request to its neighbor. Upon reaching the destination, the route reply is broadcast and intimates the source that a route is established. The figure 1 a and 1 b explains in detail about the working ofDSR routing protocol.

    Figure lao Transmission of route request

    The routing protocol carries the control packet and the data packet. The control packet consists of the list of nodes through which the data packet passes through, there by generating a loop free route to the destination.

    Figure lb. Transmission of route reply The header field in the data packet carries the

    entire information pertaining to the route there by avoiding the need for the intermediate nodes to register or store the route information. All the routing information is continuously updated and maintained at the mobile nodes. If the intermediate node in the wireless network effectively uses the route cache information thereby reducing the overhead. The main advantage of DSR routing protocol is that it need not transmit a periodic hello message informing its neighbors of its presence in the network.

    B. Overview of AODV AODV [2] is a routing protocol used in

    wireless Adhoc network that is capable of both unicast and multicast routing. AODV can be used in large network to provide loop free routing in wireless Adhoc networks. AODV keeps intimating its neighbors in the network by broadcasting a hello message and provides message about its availability. The two functions during its operation in a network is the path discovery and the path maintenance. The figure 2a and 2b explains the basic working of AODV routing protocol.

    Figure 2a. Propagation of RREQ to destination

    179

  • 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA

    Figure 2b. Route reply path to source

    When a node requires establishing a path to reach its destination node, a Route Request (RREQ) message is transmitted to its neighboring nodes. Each route request message carries a time to live parameter that describes the number of hops the request message has to be transmitted. After the receipt of the route request message by the neighboring nodes it checks the destination address of the RREQ and if the destination address matches with the address of the receiving node, it then sends a RREP message (Route Reply) to the source node. When the destination address does not tally the neighboring node's node address, the neighboring node will broadcast the route request to all the other nodes in the network until attaining the destination. The new route established by the intermediate node will be immediately intimated to the source node by means of a route reply. The source node upon receipt of the route reply message will send the data packet to the destination. The unused control packets in the intermediate nodes are discarded and the routing table is updated. The route once established remains active until there is data transfer from the source to the destination.

    C. Overview of DOA As described by Rendong Bai and Mukesh

    Singhal in their concept DOA [3] routing protocol constituting the DSR over AODV is a hierarchical routing protocol that is well suitable for larger wireless networks. DOA is a type of hybrid protocol making the network to enjoy the benefits of both DSR routing scheme and AODV routing scheme simultaneously in a network. This enhances the network to improve its performance during scalability. DOA uses the DSR routing protocol for a set value of segment length as the complete network is grouped into cluster based topology. In segmental grouping of nodes, the nodes are grouped and classified to inter segmental and intra segmental nodes based on their location in

    the group or the cluster. When the number of nodes in the segment is large, AODV is used because of its performance efficiency on larger networks. The DOA consists of three parameters that are similar to other routing protocols namely the Route Discovery (Intersegment and Intra segment), the Route Maintenance and the Route Repair schemes.

    As both DSR and AODV protocols are together used in a network, it is also termed as DSR over AODV . But generally DSR protocol is used within the cluster where number of nodes is less and AODV is used for longer routes. Even though way point routing can use other existing routing protocols, the hierarchical merging of DSR and AODV is tactically used to handle the inter segmental nodes and the intra segmental nodes thereby reducing the overheads caused in larger networks in a highly variable network topology. Similar to DSR and AODV , DOA is also an on demand routing protocol. In addition to the control messages that are available in traditional routing protocols, DOA also uses Route Activate message that can be utilized to establish a return route from the end node to the start node of a segment.

    D. Blackhole Attack

    A Black hole attack is a kind of attack in which the packet is denied of its services without being relayed. In Black hole attack, a malicious node feeds in a false route reply and begins the process of route discovery with high sequence number pretending it as the destination node or an immediate neighbor to the genuine destination node. Assuming this malicious node as its real neighbor, the source node forwards all its data packets that were originally intended for the genuine destination to this malicious node. Due to the miscarriage of data packets by the malicious node, the source and the genuine destination node will not be able to establish communication among themselves. In black hole attack [3] , the malicious node upon receipt of the route request packet from the neighboring node, immediately sends the reply packet with high sequence number to the source node. Upon receipt of the reply packet from the malicious node, the source transmits the data packet through the selected path. The malicious node receives the data packet and declines the data packet without forwarding it to the destination.

    In this research work, we injected a black hole (malicious node) in the network and analyzed the performance of the network with AODV and DOA routing protocols. In figure 3 we present the algorithm used in this work.

    180

  • 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA

    Let Bn denote black hole node SNi, . . . SNn be the number of source

    nodes SNi broadcasts and receives hello

    messages Begin Ni broadcast RREQ message For every SNi to SNn If Bn receives RREQ message

    Bn responds SNi with high sequence number

    SNi sends the data packet Bn drops the data packet

    End

    Figure 3. Algorithm for the black hole attack

    III. SIMULATIO N RESUL TS

    We compared the performance of DOA and AODV routing protocols with black hole attack against the performance of the routing protocols without Black hole attacks. The simulation is done to analyze the performance of the network by varying the number of nodes. The metrics used to evaluate the performance are given below.

    TABLE I: SIMULATION PARAMETERS

    Area 100m X 100m

    Number of nodes 20, 30, 40, 50

    No of black hole node One

    Traffic Constant Bit Rate

    Simulation time 100 seconds

    Item size 70 bytes

    Item to send 500

    Start time I sec

    Routing Protocol DOA and AODV

    Antenna Omni Directional

    MAC IEEE 802.l5.4

    Mobility Random Way point

    A. Packet Delivery Ratio The packet delivery ratio is defined as the

    ratio of number of packets received by the destination to that of the number of packets sent by the source.

    120

    100

    80

    l II: 60 Cl 0..

    40

    20

    o

    r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-r- - r-'-- - L-

    20 30 40 50 Number of Nodes

    I AODV

    I BAODV

    IDOA

    IBDOA

    Figure 4. Packet delivery ratio analysis

    The figure 4 shows the results obtained from the working of AODV and DOA routing protocol with and without black hole attack. The PDR in DOA with black hole attack performs well similar to the DOA without black hole attack without showing any significant loss. The PDR in AODV is much affected during attack. Even though the PDR of DOA with black hole attack is less, the overall PDR of the network with DOA without black hole attack is far better. Hence we conclude that there is a little impact of black hole attack on the network with DOA.

    B. Average End to End Delay The network with DOA and AODV injected

    with blackhole attack had an eventual effect on the End-to-End delay. The time taken by the packet is computed by calculating the time taken by the packet to reach the destination form its source. The average end to end delay is decreased during blackhole attack in the network. Since black hole node responds with high sequence number, the average end to end delay had been reduced in both the routing protocols during attack.

    18 1

  • 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA

    3

    2..5 -- > !II 2 'i c "C AODV c LI.I 1.5 0 BAODV ..

    "C c .DOA LI.I 1 BDOA