SlideShare a Scribd company logo
1 of 72
1.1 INTRODUCTION 
CHAPTER 1 
INTRODUCTION 
~ 1 ~ 
1.1 INTRODUCTION 
A computer network or data network is a telecommunication network that allows 
computers to exchange data. In computer networks, networked computing devices 
pass data to each other along data connections. The connections (network links) 
between nodes are established using either cable media or wireless media. The best-known 
computer network is the Internet. Network computer devices that originate, 
route and terminate the data are called network nodes. Nodes can include hosts such 
as servers and personal computers, as well as networking hardware. Two devices are 
said to be networked when a device is able to exchange informa tion with another 
device. Computer networks support applications such as World Wide Web, shared use 
of application and storage servers, printers, and fax machines, and use of email and 
instant messaging applications. Computer networks differ in the physica l media used 
to transmit their signals, the communications protocols to organize network traffic, 
the network’s size, topology and organizational intent. 
Fig. 1.1 Computer Network
1.2 WIRED NETWORK 
Today, computer networks are the core of modern communication. Computer 
networks, and the technologies that make communication between networked 
computers possible ,continue to drive computer hardware, software, and peripherals 
industries. The expansion of related industries is mirrored by growth in the numbers 
and types of people using networks, from the researcher to the home user.The 
network can be of different types depending on the topologies used, geographical 
scale, and organizational scope. But the networks can be broadly classified into two 
categories. They are 
1.2 Wired Network 
1.3 Wireless Network 
~ 2 ~ 
1.2 WIRED NETWORK 
A wired network connects devices to the network or other network using cables. The 
most common wired networks use cables connected to Ethernet ports on the network 
on one end and to a computer or other device on the opposite end. Wired networks 
provide users with plenty of security and the ability to move lots of data very quickly. 
A widely adopted family of communication media used in local area network (LAN) 
technology is collectively known as Ethernet. The media and protocol standards that 
enable communication between networked devices over Ethernet are defined by IEEE 
802.3. Ethernet transmit data over both copper and fiber cables. Wired networks are 
typically faster than wireless, and they can be very affordable. However the cost of 
Ethernet cable can add up- the more computers on your network and the farther apart 
they are, the more expensive your network will be. The most common wired networks 
are formed using Ethernet. Ethernet is a physical and data link layer technology for 
local area networks (LANs). When first widely deployed in 1980’s, Ethernet 
supported a maximum data rate of 10 megabits per second. Later fast Ethernet 
standards increased this maximum data rate to 100 Mbps. Gigabit Ethernet further 
extended this to a data rate of 1000 Mbps. Ethernet follows a simple set of rules that 
govern its basic operation. The basic terms used with Ethernet technology are: 
 Medium: Ethernet devices attach to a common medium that provides a path 
along which the electronic signals will travel. This medium has been coaxial 
copper cable, but today it is more a twisted pair or fiber optic cabling.
1.3 WIRELESS NETWORK 
 Segment: This refers to a single shared medium as an Ethernet segment. 
 Node: Devices that attach to that segment are stations or nodes. 
 Frame: The nodes communicate in short messages called frames, which are 
variably sized chunks of information. 
The Ethernet protocol specifies a set of rules for constructing frames. Each frame 
must include a destination address and a source address, which identify the recipient 
and the sender of the message. The address uniquely identifies the node. No two 
Ethernet devices ever have the same address. One interesting thing about Ethernet 
addressing is the implementation of a broadcast address. A frame with a destination 
address equal to the broadcast address is intended for every node on the network, and 
every node will receive and process this type of frame. 
The Ethernet standards comprise several wiring and signaling variants of the OSI 
physical layer in use with Ethernet. The original 10BASE5 Ethernet used coaxial 
cable as a shared medium. The Ethernet standard has grown to encompass new 
technologies as computer networking has matured, but the mechanics of operation for 
every Ethernet network today originate from Metcalfe’s original design. The original 
Ethernet described communication over a single cable shared by all devices on the 
network. Once a device is attached to this cable, it had the ability to communicate 
with any other device attached. This allows the network to expand to accommodate 
new devices without requiring any modification to those already on the network. In 
addition to computers, Ethernet is now used to interconnect appliances and 
other personal devices. It is used in industrial applications and is quickly replacing 
legacy data transmission systems in the world's telecommunications networks. 
~ 3 ~ 
1.3 WIRELESS NETWORK 
Wireless Networking is a technology in which two or more computers communicate 
with each other using standard network protocols but without using cables. The 
transmission takes place with the help of radio waves at physical level. It is also 
known as Wi-Fi or WLAN. In this type of network, devices can easily two using radio 
frequency. The IEEE standard for wireless network is 802.11.
A) INFRASTRUCTURE NETWORKS 
Convenience offered by Wireless Networks 
 Mobility: This is one of the obvious advantages of the wireless networks. 
Mobile users can connect to the existing networks while roaming freely. 
 Simplicity: We can translate simplicity into rapid development. It is easy to 
install a wireless infrastructure, compared to a wired network. 
 Flexibility: Wireless network coverage area can reach where wire cannot go. 
It is very useful for moving vehicles or for the places where running cable is 
not possible. 
There are two types of Wireless Operating modes: 
A) Infrastructure Mode 
B) Ad-hoc Mode or Infrastructure less Mode 
~ 4 ~ 
A) Infrastructure Networks 
In infrastructure based network, communication takes place only between the wireless 
nodes and the access points. There is no direct communication between the wireless 
nodes. The access point is used to control the medium access as well as it acts as a 
bridge between wireless and wired networks. In this network, fixed base stations are 
used. When the node goes out of the range of base station another base station come 
into range. The example of infrastructure based network is cellular networks. It is 
centralized system which is controlled by the controller like router. The main problem 
in this system is that if the controller fails, whole system will crash. 
Fig. 1.2 Infrastructure Network
1.4 MANET 
~ 5 ~ 
B) Infrastructure less Networks 
The infrastructure less network does not need any infrastructure to work. In this 
network each node can communicate directly with other nodes. No access point is 
required for controlling medium access. In this network, all the nodes need to act as 
routers and all nodes are capable of movement and can be connected dynamically in 
an arbitrary manner [6] 
1.4 MANET 
MANET stands for Mobile Ad hoc Network. It is a robust infrastructure less wireless 
network. It can be formed either by mobile nodes or by both fixed and mobile nodes. 
Nodes are randomly connected with each other and forming arbitrary topology. They 
can act as both routers and hosts. They have ability to self-configure makes this 
technology suitable for provisioning communication to, for example, disaster-hit areas 
where there is no communication infrastructure or in emergency search and rescue 
operations where a network connection is urgently required. In MANET routing 
protocols for both static and dynamic topology are used. An ad hoc network is a 
wireless network describe by the nonexistence of a centralized and fixed 
infrastructure. The absence of an infrastructure in ad hoc networks poses great 
challenges in the functionality of these networks. Therefore, we refer to a wireless ad 
hoc network with mobile nodes as a Mobile Ad Hoc Network. In a MANET, mobile 
nodes have the capability to accept and route traffic from their intermediate nodes 
towards the destination i.e., they can act as both routers and hosts. More frequent 
connection tearing and re-associations place an energy constraint on the mobile nodes. 
As MANETs are illustrated by limited bandwidth and node mobility, there is a 
demand to take into account, the energy efficiency of the nodes, topological changes 
and unreliable communication in the design. Moreover more importance has to be 
given to the routing protocols used for the communication between the nodes as it is 
the one of the important thing which has a huge impact on the performance of the 
mobilead-hocnetwork.
1.4.1 TYPES OF MOBILE AD-HOC NETWORK 
Table 1.1 Characteristics of Mobile Ad-hoc Network 
Mobile Ad-hoc Network Characteristics 
 Autonomous and infrastructure less 
~ 6 ~ 
 Multi-hop routing 
 Dynamic network topology 
 Device heterogeneity 
 Energy constrained operation 
 Bandwidth constrained variable capacity links 
 Limited physical security 
 Network scalability 
 Self-creation, self-organization and self-administration 
1.4.2 Types Of Mobile Ad-Hoc Network 
Vehicular ad-hoc networks (VANET) are used for communication among vehicles 
and between vehicles and roadside equipment. Intelligent vehicular ad-hoc networks 
are a kind of artificial intelligence that helps vehicles to behave in intelligent manners 
during vehicle-to-vehicle collisions, accidents etc. internet based Mobile Ad-hoc 
Networks (iMANET) are ad-hoc networks that link mobile nodes and fixed internet-gateway 
nodes. 
Table 1.2 Mobile Ad-hoc Network Types 
Technology 
Bitrate Frequency Range(meters) Powe r 
consumption 
IEEE 
802.11b 
1,2,5.5 and 11 
Mbit/s 
2.4 GHz 25-100indoor 
100-500 
outdoor 
30 mW 
IEEE 
802.11g 
Up to 54 Mbit/s 2.4 GHz 25-50 indoor 79 mW 
IEEE 
802.11a 
6,9,12,24,36,49 
and 54 Mbit/s 
5 GHz 10-40 indoor 40mW,250 
mW 
IEEE 
802.15.1 
1 Mbit/s 2.4 GHz 10-100 1mW
1.4.2 APPLICATIONS OF MOBILE AD-HOC NETWORK 
~ 7 ~ 
IEEE 
802.15.3 
110-480 Mbit/s 3-10 GHz 10 100mW, 
250mW 
IEEE 
802.15.4 
20, 40 or 250 
Kbit/s 
868 MHz,915 
MHz or 2.4 GHz 
10-100 1 mW 
HiperLAN2 Up to 54 Mbit/s 5 GHz 30-150 200mW 
or 1W 
IrDA Up to 4 Mbit/s Infrared(850nm) 10 Distance 
based 
Home RF 1 Mbit/s (v 1.0) 
10Mbit/s(v 2.0) 
2.4 GHz 50 100 mW 
IEEE 
802.16 
IEEE 
802.16a 
IEEE 
802.16e 
(Broadband 
Wireless) 
32-134 Mbit/s 
Up to 75 Mbit/s 
Up to 15 Mbit/s 
10-66 GHz 
<11 GHz 
<6 GHz 
2-5 km 
7-10 km 
2-5 km 
Complex 
power control 
1.4.4 Applications of Mobile Ad-hoc Network 
There is no clear picture of what these networks will be used for. The suggestion 
varies from document sharing at conference to infrastructure enhancement and 
military applications. In areas where no infrastructure is available, an ad-hoc network 
could be used by a group of wireless mobile hosts. Other examples include business 
associates wishing to share files or a class of students needs to interact during a 
lecture. If each mobile host wishing to communicate is equipped with a wireless local 
area network interface, the group of mobile hosts can form an ad-hoc network. Access 
to internet and access to the resources in the network such as printer, will probably be 
supported.
TABLE 1.4.5 MOBILE AD-HOC NETWORK APPLICATIONS 
Table 1.3 Mobile Ad-hoc Network Applications 
Application Possible Scenarios 
Tactical networks  Military communication 
~ 8 ~ 
 Automated battlefield 
Emergency services  Search and rescue operation 
 Disaster recovery 
 Policing and fire fighting 
 Supporting doctors and nurses in 
the hospital 
Commercial and civilian environment  E-commerce 
 Dynamic database access, mobile 
offices 
 Vehicular services: taxi cab 
network, road or accident guidance 
 Sports stadium, trade fair, shopping 
malls 
Home and enterprise networking  Home/office wireless networking 
 Conference, meeting rooms 
 Personal area networks 
 Network at construction site 
Education  Universities and campus setting 
 Virtual class rooms 
 Ad-hoc communication during 
meetings or lectures 
Entertainment  Multi user games 
 Wireless P2P networking 
 Outdoor internet access 
 Robotic pets 
 Theme parks
1.5 ROUTING PROTOCOLS FOR MANET 
Sensor networks  Home appliances 
~ 9 ~ 
 Body area network 
 Data tracking of environment 
conditions 
Coverage extension  Extending cellular network access 
 Linking up with the internet, 
intranet etc. 
1.5 ROUTING PROTOCOLS FOR MANET 
Routing protocol specifies the rules which govern the communication between 
numbers of nodes for exchange of information. It helps to find the shortest route from 
source to destination. There are mainly two types of routing protocol. These are as 
following: 
 Table Driven routing protocol (Proactive) 
 On-demand Routing Protocol (Reactive) 
 Hybrid Routing Protocol 
1.5.1 Table Driven Routing Protocol 
Table Driven protocol contains fresh list of the routes from source to destination. In 
this type of protocol, one node contains more than one table for each node in the 
network. All the nodes are updated regularly. If the topology frequently changes, then 
updated information propagates to every node of the network and update table. 
Because every node has information about network topology, Table Driven Routing 
Protocols present several problems like periodically updating the network topology 
increases bandwidth overhead, periodically updating route tables keeps the nodes 
awake and quickly exhaust their batteries. 
1.5.1.1 Destination Sequenced Distance Vector (DSDV) 
Destination Sequenced Distance Vector is a loop free routing protocol in which the 
shortest-path calculation is based on the Bellman-Ford algorithm. Data packets are 
transmitted between the nodes using routing tables stored at each node. Each routing
1.5.1.1 DESTINATION SEQUENCED DISTANCE VECTOR (DSDV) 
table contains all the possible destinations from a node to any other node in the 
network and also the number of hops to each destination. The protocol has three main 
attributes: to avoid loops, to resolve the count to infinity problem, and to reduce high 
routing overhead. Each node issues a sequence number that is attached to every new 
routing-table update message and uses two different types of routing-table updates to 
minimize the number of control messages disseminated in the network. Each node 
keeps statistical data concerning the average settling time of a message that the node 
receives from any neighbouring node. The data is used to reduce the number of 
rebroadcasts of possible routing entries that may arrive at a node from different paths 
but with the same sequence number. DSDV takes into account only bidirectional links 
between nodes. 
DSDV routing-table construction starts with the condition that every node in the 
network periodically exchange control messages with its neighbours to set up multi 
hop paths to any other node in the network, in accordance with the Bellman-Form 
algorithm. Each individual route to every destination is tagged with a destination 
sequence number, which is issued by the destination node. Any route to a destination 
with a higher destination sequence number replaces the same route with a smaller 
destination sequence number in the node’s routing table, regardless of the number of 
hops to this destination. Every node immediately advertises any significant change in 
its routing table, such as a link failure to its neighbouring node(s), but waits for a 
certain amount of time to advertise other changes. This time, has called the “settling 
time”, is calculated by maintaining, for every destination, a running, weighted average 
of the most recent updates of the routes. By implementing this advertising scheme, 
DSDV tries to minimize the number of route updates transmitted by a node. Thus, 
when a node receives a route update for a destination from one of its neighbouring 
nodes, and a few seconds later, it receives a second update from a different 
neighbouring node for the same destination with the same destination sequence 
number, but a lower number of hops, the node does not immediately broadcast the 
change in its routing table. This is highly possible in a MANET, in which the network 
topology changes very dynamically. If this kind of policy were not in place, the node 
would have to advertise two route updates within a short period, causing its 
neighbouring nodes to broadcast new route updates to its neighbouring nodes. For this 
purpose, each node maintains a table with the dest ination address, the last settling 
~ 10 ~
1.5.1.2 OPTIMIZED LINK STATE ROUTING (OLSR) 
time and the average settling time of this address. The node uses the information in 
this table to check the stability of the route to a destination. 
DSDV does not provide security mechanism to address security vulnerabilities 
observed in MANETs. DSDV is vulnerable to any malicious node that disseminates 
false routing updates due to periodic exchange of routing-update massages. Thus, an 
attack to replace the destination sequence number in a route-update packet may have a 
severe impact on the performance of the network. DSDV has certain advantages that 
cannot be overlooked. First, the simplicity of the protocol is very similar to the classic 
Distance Vector, with only small modifications to avoid loops, with the use of 
destination sequence numbers. DSDV also presents low latency, as every node always 
has a route to any destination in the network. However, DSDV does not scale well in 
networks with high mobility, as the broken links create a “storm” of route updates. 
This situation may severely degrade network performance, in which the available 
bandwidth is limited. Another disadvantage of DSDV is that it does not support a 
sleeping mode, as every node in the network must periodically broadcast changes or 
full updates of its routing table. Those frequent and periodic route updates in the 
network will also result in high-energy consumption. Also DSDV does not support 
multicasting routing. 
1.5.1.2 Optimized Link State Routing (OLSR) 
Optimized Link State Routing is based on the link state algorithm and has been 
modified and optimized to efficiently operate MANET routing. The main concept of 
the protocol is to adapt the changes of the network without creating control messages 
overhead due to the protocol flooding nature. Thus, the designers of OSLR decided to 
have only a subset of the nodes, named Multipoint Relays (MPRs), in the network 
responsible for broadcasting control messages and generating link state information. 
A second optimization is that every MPR may choose to broadcast link state 
information only between itself and the nodes that have selected it as an MPR. 
Optimized Link State Routing is also designed to combine two separate sets of 
functions. The core set of functions consists of all the protocol functions in play whe n 
the protocol operates in a pure MANET, running OLSR as the Layer 3 protocol. A 
second set of functions provides the additional necessary functions when a node has 
more than one network’s devices and participates in more than one routing domain. 
~ 11 ~
1.5.1.2 OPTIMIZED LINK STATE ROUTING (OLSR) 
In OSLR, only multipoint relays (MPR) are designated for link state updates and 
packet forwarding. In a typical flooding-based approach, a node broadcasts a message 
either if it is the originator or if it has not received this message before. Thus, the 
number of messages transmitted in the network is almost as large as the number of the 
nodes in the network. Figure 1.9aa shows a typical flooding scenario. Figure 1.9b 
shows the flooding in the entire network when using MPRs. 
Fig: 1.3a Pure Flooding & 1.3b MPR Flooding 
It is clear that the number of broadcasted messages can be greatly reduced by the 
MPRs’ implementation. The set that consists of the nodes that are multipoint Relays is 
called MPR set. Each node N in the network selects an MPR set that processes and 
forwards every link state packet that node N originates. The neighbouring nodes of N 
that are not in the MPR set process this packet, but do not further broadcast it. A node 
N also maintains a subset of neighbours, named MPR selectors, which is the set of the 
neighbours that have selected N as one of their MPRs. Each node may have one or 
more MPRs. A condition for the selection of an MPR node is the assurance of 
bidirectional links between it and its selectors. Each node in a network maintains a 
routing table that enables a source node to send data packets to a destination node. 
Four different types of information are used for the construction, calculation and 
maintenance of routing information. Every node in the network obtains all the 
information necessary for the construction of its routing table with a periodic 
transmission of messages. The node, upon receiving this information, updates and 
recalculates its routing table. When a link breaks or if the network topology changes 
~ 12 ~
1.5.1.3 COMPARISON OF PROACTIVE ROUTING PROTOCOLS BASED ON 
QUALITATIVE METRICS 
due to a change in a node position in the network, no messages other than those 
defined above are required for the update of the routing table. 
OLSR does not provide security mechanism to ensure that nodes do not intentionally 
provide false routing information. OLSR designers assume that there are already 
additional security mechanisms in place at the lower layers of the network. However, 
any persistent attack to any of the MPRs will result in flooding false link state 
information to other nodes. The main advantages of OLSR are low latency and high 
data delivery ratio because each node in the network maintains an up-to-date routing 
table with all the destinations in the network. Thus, no additional connection se t-up 
time is required for a node to send data packets to another node in the network. This 
proactive nature of OLSR makes it a very attractive solution in networks where low 
latency and high data delivery ratio are the main concerns. However, the main 
disadvantage of this protocol comes from its proactive nature and the flooding 
mechanism, despite the use of the MPRs. OLSR may introduce high routing 
overhead, consuming a large portion of the available bandwidth. OLSR does not 
support multicasting routing. 
1.5.1.3 Comparison of Proactive Routing Protocols Based on Qualitative Metrics 
All the above proactive protocols are loop- free. OSLR, as a modification of the link 
state algorithm, does not introduce any loops into the routing process, except for 
oscillations when the link costs depend on the amount of traffic carried by the link. In 
the MANET scheme, however, link cost depends on the number of hops from a 
source to a destination, thus avoiding oscillations. DSDV solves the pathologies that 
the Distance Vector algorithm introduces, by the use of destination sequence 
numbers. DSDV does not suffer from any kind of loops in the network. The proactive 
behaviour of these protocols is guaranteed by the periodic exchange of control 
messages. At any given time, every node has at least one route to any possible 
destination in the network. We say “possible destination” because the physical 
existence of a node in the network does not necessarily mean that the node is active or 
that a route to the node exists, because the node may be out of the transmitting range 
of all other nodes in the network. 
~ 13 ~
1.5.1.3 COMPARISON OF PROACTIVE ROUTING PROTOCOLS BASED ON 
QUALITATIVE METRICS 
None of the above protocols addresses the security vulnerabilities that are obvious in 
wireless networks. The proper function of these protocols is based on an assumption 
that all the nodes exist and operate in a secure environment where link-and physical- 
Layer security mechanisms are in place. DSDV is more secure than OLSR, as OLSR 
functionality is based on the proper behaviour of the MPRs. DSDV do not support 
unidirectional links. However, in wireless communication, unidirectional links will 
exist and should be supported to take advantage of any possible paths from a source 
node to a destination node. In MANETs, especially, there is no such “luxury” as 
ignoring any possible paths, as routing protocols should take advantage of any link to 
calculate routes in the network. OLSR designers take into account these limitations of 
the wireless network and support both bidirectional and unidirectional links. As for 
the “sleep mode” operation, only OLSR considers some extensions in its current 
existing design to support such an operation. In a wireless ad-hoc network, in which 
nodes depend mainly on batteries for their energy source, the sleep mode is a serious 
attribute that should be supported by any routing protocol. Multicasting is not 
considered by any of the above protocols. In real situations in tactical 
communications, data will be destined to a group of nodes, rather than to an 
individual node. Unicasting will decrease the bandwidth available for user data when 
the same message has to be delivered to multiple nodes. We have also added three 
additional metrics, to point out the differences in the design and implementation of the 
three protocols. The way that all the above protocols calculate their routes from a 
source node to a destination node follows the shortest distance approach, which 
computes the smallest number of hops between the source and the destination. 
Table 1.4 Comparison of Proactive Protocols 
Qualitative Metrics DSDV OLSR 
Loop Free Yes Yes 
Proactive Behaviour Yes Yes 
Security No No 
Support for 
No Yes 
Unidirectional 
~ 14 ~
1.5.2 ON-DEMAND ROUTING PROTOCOL 
Links 
Sleep mode No Yes 
Multicasting No No 
Routing Flat Flat 
Nodes with special tasks No Yes 
Routing Metric Shortest Distance Shortest Distance 
1.5.2 On-demand Routing Protocol 
It is a lazy approach in which a node does not contain the information of the all the 
nodes and maintains table only on demand. To find the path, route discovery process 
is follow. Reactive routing protocols are bandwidth efficient. In this, routes are built 
as and when they are required. This is achieved by sending route requests across the 
network. But it offers high latency when finding routes and also there is a possibility 
of network clog when flooding is excessive. 
There are many types of protocol are available in MANET. The efficiency of a routing 
protocol is determined by its battery power consumption of a participating node and 
routing of traffic into the network. Ad hoc routing protocols includes: 
1.5.2.1 Ad-hoc On-demand Distance Vector Protocol 
AODV is an on-demand routing protocol used in ad hoc networks. This protocol is 
like any other on-demand routing protocol which facilitates a smooth adaptation to 
changes in the link conditions. In case when a link fails, messages are sent only to the 
affected nodes. With this information, it enables the affected nodes invalidate all the 
routes through the failed link. AODV has low memory overhead, builds unicast routes 
from source to the destination and network utilization is less. There is least routing 
traffic in the network since routes are built on demand. When two nodes are in an ad 
hoc network wish to establish a connection between each other, it will enable them 
build multi hop routes between the mobile nodes involved. AODV needs to keep track 
of the following information for each route table entry: 
 Destination IP Address: IP address for the destination node. 
 Destination Sequence Number: Sequence number for this destination. 
~ 15 ~
1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL 
 Hop Count: Number of hops to the destination. 
 Next Hop: The neighbor, which has been designated to forward packets to the 
~ 16 ~ 
destination for this route entry. 
 Lifetime: The time for which the route is considered valid. 
 Active neighbor list: Neighbor nodes that are actively using this route entry. 
 Request buffer: Makes sure that a request is only processed once. 
It is loop free protocol which uses Destination Sequence Numbers (DSN) to avoid 
counting to infinity. This one is the distinguishing feature of this protocol. Requesting 
nodes in a network send Destination Sequence Numbers (DSNs) together with all 
routing information to the destination. It selects the optimal route based on the 
sequence number. 
AODV defines three messages: Route Requests (RREQs), Route Errors (RERRs) and 
Route Replies (RREPs). These messages are used to discover and maintain routes 
across the network from source to destination by use of UDP packets. Whenever there 
is need to create a new route to the destination, the node which is requesting 
broadcasts Route Requests. A Route is determined when this message reaches the 
next hop node (intermediate node with routing information to the destina tion) or the 
destination itself and the RREP has reached the originator of the request. Routes from 
the originator of the RREQ to all the nodes that receive this message are cached in 
these nodes. When a link failure occurs, Route Errors (RERRs) message is generated 
[21]. 
Fig 1.4 AODV Route Discovery Process
1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL 
Fig. 1.5 Best path with minimum Hop Count 
Nodes N1 broadcasts RREQ packets to its neighbor nodes and update its table. Then 
these nodes further forwards packets to its neighbor until the destination find outs and 
fresh route find out. Each node maintains its sequence number and broadcast ID. For 
every RREQ the node initiates broadcast ID which is incremented and together with 
the node's IP address uniquely identifies an RREQ. At last that route will be the final 
route that has the minimum hop count from source to destination. AODV uses mainly 
two mechanisms to avoid high routing overhead caused by its flooding nature. The 
first mechanism involves a binary exponential back off to minimize congestion in the 
network. The second one involves an expanding ring search technique in which the 
originator node starts broadcasting a RREQ message and the TTL value is set to a 
minimum default value. If the originator node does not receive a RREP message 
within a certain time interval, it exponentially increments the time interval and 
increases the diameter of the searching ring. The maximum value for the ring 
diameter is set by default to 35, which is, for AODV, the maximum value of the 
network diameter. The two main advantages of AODV are its reactive nature, which 
reduces the routing overhead in the network and the use of destination sequence 
numbers that address routing loops and the “count to infinity” problem. However, 
control message overhead can be introduced when every intermediate node originates 
~ 17 ~
1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL 
a RREP message, to satisfy a route discovery request if it has a valid route to the 
destination, causing a RREP messages “storm”. Another disadvantage of AODV is 
that the propagation of periodic HELLO messages from a node, to maintain 
connectivity with its neighbouring nodes, will lead to bandwidth consumption. In 
conclusion, the simple design, the low routing overhead and the ring searching 
technique make AODV an attractive solution for networks in which the available 
bandwidth is limited and nodes can form organized groups. Security weaknesses can 
be addressed by either modifying the protocol with the proposed security extensions, 
or by applying security mechanisms at the lower layers. 
The advantage with AODV compared to classical routing protocols like distance 
vector and link-state is that AODV has greatly reduced the number of routing 
messages in the network. AODV achieves this by using a reactive approach. This is 
probably necessary in an ad-hoc network to get reasonably performance when the 
topology is changing often. AODV is also routing in the more traditional sense 
compared to for instance source routing based proposals like DSR. The advantage 
with a more traditional routing protocol in an ad-hoc network is that connections from 
the ad-hoc network to a wired network like the Internet is most likely easier. The 
sequence numbers that AODV uses represents the freshness of a route and is 
increased when something happens in the surrounding area. The sequence prevents 
loops from being formed, but can however also be the cause for new problems. What 
happens for instance when the sequence numbers no longer are synchronized in the 
network. This can happen when the network becomes partitioned, or the sequence 
numbers wrap around. AODV only support one route for each destination. It should 
however be fairly easy to modify AODV, so that it supports several routes per 
destination. Instead of requesting a new route when an old route becomes invalid, the 
next stored route to that destination could be tried. The probability for that route to 
still be valid should be rather high. Although the Triggered Route Replies are 
reduced in number by only sending the Triggered Route Replies to affected senders, 
they need to traverse the whole way from the failure to the senders. This distance can 
be quite high in numbers of hops. AODV sends one Triggered RREP for every active 
neighbor in the active neighbor list for all entries that have been affected of a link 
failure. This can mean that each active neighbor can receive several triggered RREPs 
informing about the same link failure, but for d ifferent destinations, if a large fraction 
of the network traffic is routed through the same node and this node goes down. An 
~ 18 ~
1.5.2.2 DYNAMIC SOURCE ROUTING - DSR 
aggregated solution would be more appropriate here. AODV uses hello messages at 
the IP- level. This means that AODV does not need support from the link layer to 
work properly. It is however questionable if this kind of protocol can operate with 
good performance without support from the link layer. The hello messages add a 
significant overhead to the protocol. AODV does not support unidirectional links. 
When a node receives a RREQ, it will setup a reverse route to the source by using the 
node that forwarded the RREQ as next hop. This means that the route reply, in most 
cases is unicasted back the same way as the route request used. Unidirectional link 
support would make it possible to utilize all links and not only the bi-directional 
links. It is however questionable if unidirectional links are desirable in a real 
environment. The acknowledgements in the MAC protocol IEEE 802.11 would for 
instance not work with unidirectional links. 
1.5.2.2 Dynamic Source Routing - DSR 
Dynamic Source Routing belongs to the class of reactive protocols and allows nodes 
to dynamically discover a route across multiple network hops to any destination. 
Source routing means that each packet in its header carries the complete ordered list 
of nodes through which the packet must pass. DSR uses no periodic routing messages 
(e.g. no router advertisements), thereby reducing network bandwidth overhead, 
conserving battery power and avoiding large routing updates throughout the ad-hoc 
network. Instead DSR relies on support from the MAC layer (the MAC layer should 
inform the routing protocol about link failures). The two basic modes of operation in 
DSR are route discovery and route maintenance. Route discovery is the mechanism 
whereby a node X wishing to send a packet to Y, obtains the source route to Y. Node 
X requests a route by broadcasting a Route Request (RREQ) packet. Every node 
receiving this RREQ searches through its route cache for a route to the requested 
destination. DSR stores all known routes in its route cache. If no route is found, it 
forwards the RREQ further and adds its own address to the recorded hop sequence. 
This request propagates through the network until either the destination or a node with 
a route to the destination is reached. When this happen a Route Reply (RREP) is 
unicasted back to the originator. This RREP packet contains the sequence of network 
hops through which it may reach the target. In Route Discovery, a node first sends a 
RREQ with the maximum propagation limit (hop limit) set to zero, prohibiting its 
neighbors from rebroadcasting it. At the cost of a single broadcast packet, t his 
~ 19 ~
1.5.2.2 DYNAMIC SOURCE ROUTING - DSR 
mechanism allows a node to query the route caches of all its neighbors. Nodes can 
also operate their network interface in promiscuous mode, disabling the interface 
address filtering and causing the network protocol to receive all packets that the 
interface overhears. These packets are scanned for useful source routes or route error 
messages and then discarded. The route back to the originator can be retrieved in 
several ways. The simplest way is to reverse the hop record in the packet. However 
this assumes symmetrical links. To deal with this, DSR checks the route cache of the 
replying node. If a route is found, it is used instead. Another way is to piggyback the 
reply on a RREQ targeted at the originator. This means that DSR can compute correct 
routes in the presence of asymmetric (unidirectional) links. Once a route is found, it is 
stored in the cache with a time stamp and the route maintenance phase begins. Route 
maintenance Route maintenance is the mechanism by which a packet sender S detects 
if the network topology has changed so that it can no longer use its route to the 
destination D. This might happen because a host listed in a source route, move out of 
wireless transmission range or is turned off making the route unusable. A failed link is 
detected by either actively monitoring acknowledgements or passively by running in 
promiscuous mode, overhearing that a packet is forwarded by a neighboring node. 
When route maintenance detects a problem with a route in use, a route error packet is 
sent back to the source node. When this error packet is received, the hop in error is 
removed from this hosts route cache, and all routes that contain this hop are truncated 
at this point. DSR uses the key advantage of source routing. Intermediate nodes do not 
need to maintain up-to-date routing information in order to route the packets they 
forward. There is also no need for periodic routing advertisement messages, which 
will lead to reduce network bandwidth overhead, particularly during periods when 
little or no significant host movement is taking place. Battery power is also conserved 
on the mobile hosts, both by not sending the advertisements and by not needing to 
receive them; a host could go down to sleep instead. This protocol has the advantage 
of learning routes by scanning for information in packets that are received. However, 
each packet carries a slight overhead containing the source route of the packet. This 
overhead grows when the packet has to go through more hops to reach the destination. 
So the packets sent will be slightly bigger, because of the overhead. Running the 
interfaces in promiscuous mode is a serious security issue. Since the address filtering 
of the interface is turned off and all packets are scanned for information. A potential 
intruder could listen to all packets and scan them for useful information such as 
~ 20 ~
1.5.2.3 Comparison of Reactive Routing Protocols Based on Qualitative Metrics 
passwords and credit card numbers. Applications have to provide the security by 
encrypting their data packets before transmission. The routing protocols are prime 
targets for impersonation attacks and must therefore also be encrypted. One way to 
achieve this is to use IP-sec. DSR also has support for unidirectional links by the use 
of piggybacking the source route a new request. This can increase the performance in 
scenarios where we have a lot of unidirectional links. We must however have a MAC 
protocol that also supports this. 
1.5.2.3 Comparison of Reactive Routing Protocols Based on 
Qualitative Metrics 
All the above reactive protocols are loop-free. None addresses security vulnerabilities 
that exist in a wireless ad-hoc network. However, there are certain proposals for 
providing secure routing at Layer 3 for all the above protocols. Although security is a 
major concern in communications, we find that the proposed security mechanisms 
will increase processing time, power consumption, and latency. Note that reactive 
routing protocols already suffer from high latency in the network. Only DSR in its 
current state, without any modification, can support both bidirectional and 
unidirectional links. However, DSR will introduce high routing overhead as routing 
information is stored at the data packets’ header. Thus, DSR will not scale well in 
large networks if communicating nodes are located at opposite edges of the network. 
None of the three protocols supports the “sleep mode,” another important factor for 
power preservation, especially in battery-powered mobile nodes. AODV will 
consume more power than DSR due to the exchange of periodic HELO messages. 
Only AODV supports multicasting, another important attribute of a routing protocol. 
None of these protocols depends on any kind of node with special or crucial tasks. All 
nodes in the network have the same tasks and play the same role in the routing 
process. This is important, because the lack of “critical” nodes guarantees the 
inexistence of any single point of failure in the network. 
Finally, given qualitative metrics and the attributes of the three protocols, we suggest 
that AODV and DSR would be good candidates for the routing protocol in tactical 
mobile ad-hoc wireless networks. Therefore, we choose both AODV and DSR for 
further evaluation in our simulation. 
~ 21 ~
1.5.3 HYBRID ROUTING PROTOCOLS 
Table 1.5 Comparison of Reactive protocols. 
Qualitative Metrics AODV DSR 
Loop Free Yes Yes 
Reactive Behaviour Yes Yes 
Security No No 
Support for 
No No 
Unidirectional Links 
Sleep Mode No No 
Multicasting Yes No 
Routing scheme Flat Flat 
Nodes with special tasks No No 
Routing Metric Shortest Path Shortest Path 
1.5.3 Hybrid Routing Protocols 
Hybrid routing protocols are designed to combine the benefits of both proactive as 
well as reactive routing protocols and aims at achieving best performance with least 
degradation in the network. The hybrid routing protocols used for mobile ad-hoc 
network are: 
1.5.3.1 Zone Routing Protocol (ZRP) 
Zone Routing Protocol is a distributed routing protocol that combines both a proactive 
and a reactive scheme for route discovery and maintenance. The basic idea of the 
protocol is the creation of areas, or zones, where every node proactively maintains 
one route or multiple routes to any destination inside the zone and reactively obtains 
routing information for any node outside of the zone. The zone diameter may be 
defined in advance, before nodes form the network, or it may be optimized by every 
node, based on ZRP traffic measurements. The radius of a node’s zone plays a 
significant role in the proper behaviour of the protocol. If the network consists of a 
large number of nodes with medium to low mobility or the demand for routes is high, 
a large value for the radius is preferable to avoid the frequent dissemination of routing 
requests and reply messages. On the other hand, if the network consists of a small 
number of nodes with high mobility or the demand for routes is small, the radius 
value should also be small to avoid overhead of periodic routing update messages. 
ZRP consists of two main protocols. The Intrazone Routing Protocol (IARP) is 
responsible for finding and maintaining valid routes in the internal zones between any 
source/destination pair at all times. Any proactive routing protocol that we studied in 
the previous sections, such as DSDV, can be used as the ZRP IARP. The Interzone 
Routing Protocol (IERP) is responsible for finding any available route outside of the 
~ 22 ~
1.5.3.1 ZONE ROUTING PROTOCOL (ZRP) 
node’s internal zone. The scope behind this implementation is to reduce routing 
overhead and delay and to respond better in the topological changes of the network. 
ZRP is a loop- free protocol and provides support for unidirectional links, hierarchical 
routing, and interconnection with other non-ZRP routing domains when every node’s 
network interface is assigned a unique IP address. The route discovery process in ZRP 
depends on the location of the destination node. If the destination node is located 
inside the source node’s intra zone, the protocol acts like any other proactive protocol, 
thus ensuring that there is always a route to any destination in the intra zone. When 
the destination node is located outside of the source’s intra zone, the source node 
initiates a route discovery process and the IERP is assigned to accomplish this task. 
To avoid large-scaled dissemination of routing request messages ZRP employs a third 
protocol, the Border cast Resolution Protocol (BRP) which is a sub- layer of the IERP 
protocol. The BRP identifies the nodes that are located in the source node’s zone 
perimeter and forwards the route request messages only to those peripheral nodes. 
There is a possibility of collisions when multiple nodes transmit the RREP messages 
back to the source. However, the border-casting scheme minimizes the propagation of 
RREQ messages within a small region, except when the source/destination pair is 
located at opposite edges of the network. When a peripheral node does not have a 
route to the destination node, it originates a RREQ message and border-casts the 
message to its peripheral nodes. That procedure continues until a route to the 
destination is found. Route maintenance takes place when a node in an active route 
detects a link failure in the route: the node employs a local reconfiguration of the path 
by searching for an alternate route to the destination. If such a route exists, the node 
originates an update message to inform all other nodes in the path and the source node 
of a change in the path. The source node may continue sending data packets in the 
new non-optimized route. If the source node wants to obtain a new optimal route, it 
regenerates a RREQ message, as previously discussed. ZRP does not employ any 
security mechanisms to ensure secure routing. 
However, any security mechanisms that have been proposed for other routing 
protocols can be applied to ZRP as well. Every node in the network can be in a 
promiscuous mode, overhearing transmissions from its neighbours and gathering 
statistical data on its neighbour’s behaviour. Again, in this case, there is a trade-off 
between processing time, latency, and security. ZRP seems to employ the best 
characteristics of both reactive and proactive protocols. It avoids flooding the network 
~ 23 ~
1.5.3.2 GREEDY PERIMETER STATELESS ROUTING (GPSR) 
with large-scaled Route Request messages, as reactive protocols do, and the periodic 
exchange of HELLO messages in the proactive scheme. Thus, ZRP reduces routing 
overhead in an inexpensive way. The only visible drawback of the protocol is, 
perhaps, that its performance depends heavily on the zone radius. For tactical 
communications, however, the zone radius can be set up in advance, before the 
establishment of the network, as the data traffic, the estimated velocity of the nodes, 
and the number of the nodes in the network is known prior. 
1.5.3.2 Greedy Perimeter Stateless Routing (GPSR) 
Greedy Perimeter Stateless Routing is a hybrid protocol whose functionality depends 
on knowledge of the geographic location of the nodes in network. That knowledge 
can be obtained by integrating a GPS device into the communication device or by 
other available means. Every node in the network must know its own location and the 
location of its neighbouring nodes. Thus, every node periodically broadcasts its 
address and its location in x and y coordinates to all of its neighbouring nodes. Data-packet 
forwarding decisions are based on the locations of both the source and the 
destination node. An address-to-location look-up algorithm is implemented to map a 
node address to its location. A periodic exchange of beacons, which encapsulate the 
node address and location, is similar to the behaviour of proactive protocols. The 
absence of any periodic route table information is closer to the philosophy of reactive 
protocols. GPSR employs two algorithms to forward data packets from a source to a 
destination node: the greedy forwarding algorithm and the perimeter forwarding, 
algorithm. The objective of the protocol’s design is to minimize routing overhead and 
increase the packet delivery ratio in a network, by effectively responding to network 
topology changes without the dissemination of large scaled control messages. GPSR 
makes use only of bidirectional links between a node and its neighbours and does not 
support hierarchical routing. In most cases, GPSR uses greedy forwarding for data 
packet delivery from a source or any intermediate node to the next node. The greedy 
forwarding algorithm needs to know the locations of a node’s neighbours and the 
location of the destination node. According to this algorithm, the next-hop decision is 
based on the distance between the next node and the destination node. 
~ 24 ~
1.5.3.2 GREEDY PERIMETER STATELESS ROUTING (GPSR) 
Figure 1.6 Greedy Forwarding in GPSR 
Each node forwards data packets to the next node that has the shortest distance to the 
destination node amongst other nodes in the node’s “neighbourhood”. We define a 
node’s “neighbourhood” as the nodes within transmission range of a node. Figure 
1.12 shows greedy forwarding in GPSR. The curved dotted lines denote a node’s 
transmission range. 
However, greedy forwarding does not cover a case in which the distance between an 
intermediate node and the destination is the lowest as compared to distances from the 
intermediate node’s neighbours and the destination node. The shorter-distance 
neighbour then uses greedy forwarding to forward the data packet to the destination. 
However, there is always a possibility in mobile wireless networks that a destination 
node will be unreachable by any other node in the network. In that case, the data 
packet travels around the perimeter trying to find a path to the destination. If a path 
does not exist, the perimeter-forwarding algorithm never allows the packet to travel 
twice across the same link in the same direction. If a node “sees” that the only 
possible way to forward a data packet is to use a previous link toward the same 
direction, it drops the packet. This function ensures the loop- free behaviour of the 
protocol. GPSR does not address any security vulnerabilities that exist in a mobile 
wireless network. Any attack on the location- finding algorithm will have severe 
consequences for the protocol’s performance because the proper behaviour of the 
protocol is built on its knowledge of the location of destination nodes. GPSR presents 
~ 25 ~
1.5.3.3 COMPARISON OF HYBRID PROTOCOLS BASED ON QUALITATIVE 
METRICS 
certain advantages over other protocols we have studied. First, it does not use any 
type of control messages, such as route requests and error messages. Second, it does 
not flood the network with any other type of control messages, except those between a 
node and its neighbours, for location- finding purposes. Perhaps the only visible 
drawback of GPSR is its dependence on “external” devices, such as GPS, that 
increase the implementation cost. For tactical implementation, this cost may be 
affordable. Any malfunction of the GPS device will degrade the protocol’s 
performance and may lead to network crash. 
1.5.3.3 Comparison of Hybrid Protocols Based on Qualitative Metrics 
Both ZRP and GPSR are loop- free protocols. ZRP ensures loop- free “behaviour” by 
employing loop- free protocols inside inter and intra-zones. On the other hand, 
GPSR’s perimeter- forwarding algorithm never allows a packet to travel twice across 
the same link toward the same direction. ZRP’s proactive behaviour is more obvious 
than that of GPSR, in which nodes broadcast periodic beacons to their neighbours for 
location-update purposes. ZRP seems to present higher routing overhead depending 
on the zone radius. ZRP behaves like any other proactive protocol for the large value 
of this radius. However, one can optimize the value of the zone radius to meet the 
needs of the wireless network. If low latency is the main concern, reflecting lower 
data rates, the zone radius value should be high at least a zone_radius >1. None of the 
above protocols addresses the security vulnerabilities of wireless networks. A possible 
solution is again monitoring the behaviour of the nodes in the network, or employing 
security mechanisms at the link or physical Layers. GPSR seems to be more 
vulnerable than ZRP, as GPRS functionality is built on accurate location 
advertisements by the nodes in the network. Any malfunction of the GPS devices will 
degrade the protocol’s performance. Only ZRP provides support for unidirectional 
links, hierarchical routing, and interconnection with other non-ZRP routing domains. 
These are important attributes for a routing protocol for MANETs as they provide the 
means for extending an existing network with MANET technology, or 
interconnecting a MANET with other mobile and fixed networks. As for the “sleep 
mode” operation, none of these protocols directly supports such an operation. The 
ZRP ‘‘sleep mode” depends on the routing protocols that operate in the intra and inter 
zones. If OLSR is the routing protocol for the intra-zones, then ZRP can at least 
partially support this mode. GPSR does not support multicasting. Routing decisions 
~ 26 ~
1.6 SECURITY OF MOBILE ADHOC NETWORK 
are solely based on the location of the destination node. On the other hand, ZRP 
depends on the “underlying” routing protocols within the inter and intra-zones. 
Table 1.6 Comparison of Hybrid Routing Protocols 
Qualitative Metrics ZRP GPSR 
~ 27 ~ 
Loop Free 
Yes Yes 
Security 
No No 
Support for Unidirectional 
Links 
Yes Yes 
Sleep Mode 
Partly No 
Multicasting 
Partly No 
Routing scheme 
Flat and hierarchical Flat 
Nodes with special tasks 
No No 
Routing Metric 
Shortest path Shortest path 
1.6 SECURITY OF MOBILE ADHOC NETWORK 
In a MANET, a collection of mobile hosts with wireless network interfaces form a 
temporary network without the aid of any fixed infrastructure or centralized 
administration. Without some form of network- level or link-layer security, a 
MANET routing protocol is vulnerable to many forms of attack. It may be relatively 
simple to snoop network traffic, replay transmissions, manipulate packet headers, and 
redirect routing messages, within a wireless network without appropriate security 
provisions. While these concerns exist within wired infrastructures and routing 
protocols as well, maintaining the "physical" security of the transmission media is 
harder in practice with MANETs. Sufficient security protection to prohibit disruption 
of modification of protocol operation is desired. The success MANET strongly 
depends on whether its security can be trusted. However, the characteristics of 
MANET pose the challenges and opportunities in achieving the security goals. We 
have a variety of attacks that target the weakness of MANET. For example, the
1.6.1 ATTACKS ON MOBILE AD-HOC NETWORK 
routing messages are an essential component of mobile network communications. 
There is possibility that the intermediate node (malicious node) attacks can target the 
routing discovery or maintenance phase by not following the specifications of the 
routing protocols. There are also some attacks that target some particular routing 
protocols, such as DSR, or AODV. The attacks such as Black Hole attack, Gray hole 
attack, Wormhole attack have been identified in various published papers. Currently 
routing security is one of the hottest research areas in MANET. 
A significant amount of research has been devoted to study security issues as well as 
countermeasures to various attacks in MANET. However, I believe that there is still 
much research work needed to be done in the area. The aim of the study is to detect 
the multiple Black Hole nodes using AODV protocol in MANET. The black hole 
node is responsible for dropping a number from packets after advertising itself as the 
valid path to source node. The detection of the cooperative black hole nodes will 
provide more security to MANET. The Route discovery and route maintenance 
phases in the AODV protocol will be secured more. 
1.6.1 Attacks on Mobile Ad-hoc Network 
The attacks in mobile ad-hoc network are done in order to interrupt the 
communication or to steal the information. The attacks in mobile ad hoc networks can 
be broadly classified into two distinct categories viz. Active attacks and Passive 
attacks. An active attack is that attack which any data or information is inserted into 
the network so that information and operation may harm. It involves modification, 
fabrication and disruption and affects the operation of the network. Example of active 
attacks is impersonation, spoofing. A passive attack obtains data exchanged in the 
network without disturbing the communications operation. The passive attacks are 
difficult to detection. In its, operations are not affected. The operations supposed to 
be accomplished by a malicious node ignored and attempting to recover valuable data 
during listens to the channel. Some of the most common attacks on mobile ad-hoc 
networks include: 
1.6.1.1 Denial of Service Attack 
A denial-of-service attack is characterized by an explicit attempt by attackers to 
prevent legitimate users of a service from using that service. Examples include 
~ 28 ~
1.6.1.1 DENIAL OF SERVICE ATTACK 
 Attempts to "flood" a network, thereby preventing legitimate network traffic. 
 Attempts to disrupt connections between two machines, thereby preventing access 
~ 29 ~ 
to a service. 
 Attempts to prevent a particular individual from accessing a service. 
 Attempts to disrupt service to a specific system or person. 
Denial-of-service attacks can essentially disable your computer or your 
network. Denial-of-service attacks come in a variety of forms and aim at a variety of 
services. There are three basic types of attack: 
 consumption of scarce, limited, or non-renewable resources 
 destruction or alteration of configuration information 
 physical destruction or alteration of network components 
Denial-of-service attacks are most frequently executed against network connectivity. 
The goal is to prevent hosts or networks from communicating on the network. An 
intruder may also be able to consume all the available bandwidth on your network by 
generating a large number of packets directed to your network. Typically, these 
packets are ICMP ECHO packets, but in principle they may be anything. Further, the 
intruder need not be operating from a single machine; he may be able to coordinate or 
co-opt several machines on different networks to achieve the same effect. In addition 
to network bandwidth, intruders may be able to consume other resources that your 
systems need in order to operate. For example, in many systems, a limited number of 
data structures are available to hold process information (process identifiers, process 
table entries, process slots, etc.). An intruder may be able to consume these data 
structures by writing a simple program or script that does nothing but repeatedly 
create copies of itself. For example, consider the following Fig. 3. Assume a shortest 
path exists from S to X and C and X cannot hear each other, that nodes B and C 
cannot hear each other, and that M is a malicious node attempting a denial of service 
attack. Suppose S wishes to communicate with X and that S has an unexpired route to 
X in its route cache. S transmits a data packet toward X with the source route S --> A 
--> B --> M --> C --> D --> X contained in the packet’s header. When M receives the 
packet, it can alter the source route in the packet’s header, such as deleting D from the 
source route. Consequently, when C receives the altered packet, it attempts to forward 
the packet to X. Since X cannot hear C, the transmission is unsuccessful.
1.6.1.2 WORMHOLE ATTACK 
Fig: 1.7 Denial of service attack 
~ 30 ~ 
1.6.1.2 Wormhole Attack 
It is a network layer attack. In wormhole attack, a malicious node receives packets at 
one location in the network and tunnels them to another location in the network,. 
Fig: 1.8 Wormhole attack
1.6.1.2 WORMHOLE ATTACK 
where these packets are resent into the network. This tunnel between two colluding 
attackers is referred to as a wormhole. It could be established through wired link 
between two colluding attackers or through a single long-range wireless link. In this 
form of attack the attacker may create a wormhole even for packets not addressed to 
itself because of broadcast nature of the radio channel. For example in Fig. 1, X and Y 
are two malicious nodes that encapsulate data packets and falsified the route lengths 
Suppose node S wishes to form a route to D and initiates route discovery. When X 
receives a route request from S, X encapsulates the route request and tunnels it to Y 
through an existing data route, in this case {X --> A --> B --> C --> Y}. When Y 
receives the encapsulated route request for D then it will show that it had only 
travelled {S --> X --> Y --> D}. Neither X nor Y update the packet header. After 
route discovery, the destination finds two routes from S of unequal length: one is of 4 
and another is of 3. If Y tunnels the route reply back to X, S would falsely consider 
the path to D via X is better than the path to D via A. Thus, tunnelling can prevent 
honest intermediate nodes from correctly incrementing the metric used to measure 
path lengths. Though no harm is done if the wormhole is used properly for efficient 
relaying of packets, it puts the attacker in a powerful position compared to other 
nodes in the network, which the attacker could use in a manner that could 
compromise the security of the network. The wormhole attack is particularly 
dangerous for many ad hoc network routing protocols in which the nodes that hear a 
packet transmission directly from some node consider themselves to be in range of 
(and thus a neighbour of) that node. 
~ 31 ~ 
1.6.1.3 Byzantine Attack 
In this attack, a compromised intermediate node or a set of compromised intermediate 
nodes works in collusion and carries out attacks such as creating routing loops, 
forwarding packets on non-optimal paths and selectively dropping packets which 
results in disruption or degradation of the routing services. It is hard to detect 
byzantine failures. The network would seem to be operating normally in the 
viewpoint of the nodes, though it may actually be showing Byzantine behaviour.
1.6.1.4 BLACK HOLE ATTACK 
~ 32 ~ 
1.6.1.4 Black hole Attack 
. 
Fig: 1.9 Black hole attack 
In this attack, an attacker uses the routing protocol to advertise itself as having the 
shortest path to the node whose packets it wants to intercept. An attacker listen the 
requests for routes in a flooding based protocol. When the attacker receives a request 
for a route to the destination node, it creates a reply consisting of an extremely short 
route. If the malicious reply reaches the initiating node before the reply from the 
actual node, a fake route gets created. Once the malicious device has been able to 
insert itself between the communicating nodes, it is able to do anything with the 
packets passing between them. It can drop the packets between them to perform a 
denial-of-service attack, or alternatively use its place on the route as the first step in a 
man-in-the-middle attack 
For example, in Fig. 1.9, source node S wants to send data packets to destination node 
D and initiates the route discovery process. We assume that node 2 is a malicious 
node and it claims that it has route to the destination whenever it receives route 
request packets, and immediately sends the response to node S. If the response from 
the node 2 reaches first to node S then node S thinks that the route discovery is 
complete, ignores all other reply messages and begins to send data packets to node 2. 
As a result, all packets through the malicious node is consumed or lost.
1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL 
~ 33 ~ 
1.6.1.5 Gray-hole attack 
This attack is also known as routing misbehavior attack. It leads to messages 
dropping. It has two phases. In the first phase a valid route to destination is advertise 
by nodes itself. In second phase, with a certain probability nodes drops intercepted 
packets. 
1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL 
AODV (Ad hoc On Demand Distance Vector) is an important on-demand routing 
protocol that creates routes only when desired by the source node. When a node 
requires a route to a destination, it broadcasts a route request (RREQ) packet to its 
neighbors, which then forward the request to their neighbors, and so on, until either 
the destination or an intermediate node with a “fresh enough” route to the destination 
is located. 
Fig. 1.10 Routing Discovery Process in AODV protocol
1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL 
In this process the intermediate node can reply to the RREQ (Route Request) packet 
only if it has a fresh enough route to the destination. Once the RREQ (Route Request) 
reaches the destination or an intermediate node with a fresh enough route, the 
destination or intermediate node responds by unicasting a route reply (RREP) packet 
back to the neighbor from which it first received the RREQ (Route Request). After 
selecting and establishing a route, it is maintained by a route maintenance procedure 
until either the destination becomes inaccessible along every path from the source or 
the route is no longer desired. A RERR (Route Error) message is used to notify other 
nodes that the loss of that link has occurred. A black hole problem means that a 
malicious node utilizes the routing protocol to claim itself of being the shortest path 
to the destination node, but drops the routing packets but does not forward packets 
to its neighbors. Imagine a malicious node ‘M’. 
Fig. 1.11 Black Hole Attack in AODV protocol 
~ 34 ~
1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL 
When node ‘A’ broadcasts a RREQ packet, nodes ‘B’ ‘D’ and ‘M’ receive it. Node ‘M’, 
being a malicious node, does not check up with its routing table for the requested 
route to node ‘E’. Hence, it immediately sends back a RREP packet, claiming a route 
to the destination. Node ‘A’ receives the RREP from ‘M’ ahead of the RREP from ‘B’ 
and ‘D’. Node ‘A’ assumes that the route through ‘M’ is the shortest route and sends 
any packet to the destination through it. When the node ‘A’ sends data to ‘M’, it 
absorbs all the data and thus behaves like a ‘Black hole’. 
In AODV (Ad hoc On Demand Distance Vector), the sequence number is used to 
determine the freshness of routing information contained in the message from the 
originating node. When generating RREP (Route Request) message, a destination 
node compares its current sequence number, and the sequence number in the RREQ 
(Route Request) packet plus one, and then selects the larger one as RREPs (Route 
Request) sequence number. Upon receiving a number of RREP (Route Request), the 
source node selects the one with greatest sequence number in order to construct a 
route. But, in the presence of black hole when a source node broadcasts the RREQ 
(Route Request) message for any destination, the black hole node immediately 
responds with an RREP (Route Request) message that includes the highest sequence 
number and this message is perceived as if it is coming from the destination or from 
a node which has a fresh enough route to the destination. The source then starts to 
send out its packets to the black hole trusting that these packets will reach the 
destination. Thus the black hole will attract all the packets from the source and 
instead of forwarding those packets to the destination it will simply discard those. 
Thus the packets attracted by the black hole node will not reach the destination. 
1.8 CONCLUDING REMARKS 
In this chapter, we described various aspects related to wired and wireless networks. 
The routing protocols for MANET have been discussed to understand the working of 
MANET. In the last section we describe the various security threats to MANET and it 
is concluded that MANET networks are an easy target from security point of view and 
a secure mechanism is required to protect the network from various attacks. 
~ 35 ~
LITERATURE REVIEW 
CHAPTER 2 
LITERATURE REVIEW 
Mohammad Al-Shurman et. al [2004], proposed two solutions to black hole attacks 
prevalent in mobile ad-hoc network. The first solution is to find multiple paths to send 
data from source to destination. The source sends ping packets along these different 
routes with different packet Id’s and sequence number. The source checks the RREP’s 
from different routes and try to find a secure route having a hop that is shared in more 
than one route to the destination. This method ensures secure route to destination but 
at the expense of the time delay caused due to waiting for another RREP from an 
alternate route. The second method explores the possibility of using the sequence 
number for identifying the fake replies from genuine replies. In this, two additional 
tables are used to record sequence number of last sent packet and last received packet. 
These tables are updated whenever a packet is sent or received and the destination 
node sends RREP packet along with last packet sequence number. This solution 
ensures faster delivery of packets. First solution is more secure but delay is large 
while the second solution is quick in delivering the packets but a malicious node can 
listen to the channel and can update its tables for the last sequence number. 
Jeroen Hoebeke Et. Al [2005], discussed about application of mobile ad-hoc 
networks and the challenges being faced while using them. In this paper, a complete 
introduction has been given about the wireless networks. Moreover this paper 
provides an insight into the potential applications of ad-hoc networks and discusses 
the technological challenges being faced by network and protocol designers. Most 
prominent of the challenges are routing, resource and service discovery and security. 
Different attacks pertaining to security are deletion, fabrication, replication and 
redirection of data packets. But despite challenges, mobile ad-hoc network opens a 
new business opportunity for service providers. 
Giovanni Vigna et. Al [2005], demonstrated an effective intrusion detection tool that 
can be used to for detecting attacks in mobile ad-hoc network while using limited 
~ 36 ~
LITERATURE REVIEW 
amount of resources. The tool monitors network packets to detect attacks within its 
range. This tool is based on State Transition Analysis Technique (STAT). 
AODVSTAT sensors can be used in standalone mode to detect attacks in 
neighborhood only or distributed mode, in which update messages are exchanged 
between sensors to detect attacks in distributed manner. This scheme works well for 
detecting both single hop as well as distributed attacks in mobile ad-hoc networks 
while imposing a very small overhead on nodes. 
Mehdi Medadian et. al [2009], proposed a novel approach for countering the black 
hole attack. The approach is based on using negotiations with neighbors who claim to 
have a route to destination. In this approach, any node uses a set of rules to decide the 
honesty of the reply’s sender. During packet transferring, the activities of a node are 
logged by its neighbors. These neighbors send their opinion about a node. When a 
node receives replies from all neighbors, it is able to decide whether the replier is a 
malicious node or a legitimate node. The opinion send by neighbors is based on the 
number of packets sent to a particular node and number of packets forwarded by it. 
The method yields better percentage of packets received in presence of cooperative 
black hole attack. 
Payal N. Raj and Prashant B. Swadas [2009], proposed DPRAODV (detection, 
prevention and reactive AODV) to prevent the black hole attack by informing the 
other nodes about the malicious node. As the value of RREP sequence number is 
found to be higher than the threshold value, the node is suspected to be malicious and 
it adds the node to the black list. As the node detected an anomaly, it sends a new 
control packet, ALARM to its neighbors. The ALARM packet has the black list node 
as a parameter so that, the neighboring nodes know that RREP packet from the node 
is to be discarded. Further, if any node receives the RREP packet, it looks over the 
list, if the reply is from the blacklisted node; no processing is done for the same. The 
threshold value is the average of the difference of destination sequence number in 
each time slot between the sequence number in the routing table and the RREP 
packet. The purposed solution not only detects the black hole attack, but tries to 
prevent it further, by updating threshold which reflects the real changing environment. 
Other nodes are also updated about the malicious act by an ALARM packet, and they 
react to it by isolating the malicious node from network. 
~ 37 ~
LITERATURE REVIEW 
Songbai Lu et. al [2009], proposed a method that is effective and secure against the 
black hole attack in mobile ad-hoc network. This method is works on the basis of 
direct verification of the destination node using random number exchange. In this 
method, the source node sends verification packet SRREQ (Secure Route Request) to 
destination node along opposite direction route of RREP (Route Reply) received 
while the verification packet contains random number. This packet is forwarded using 
different routing paths. At the destination end, upon receiving two or more SRREQ 
(Secure Route Request) packets, their contents are checked. If content are same, 
verification confirm packet SRREP (Secure Route Reply) is sent to source along 
different routing paths. On the source end, upon receiving two or more SRREP 
(Secure Route Reply) packets, their contents are checked for match. If they match, the 
route is added to the routing table and warning message regarding malicious nodes, is 
propagated throughout the network. This scheme can effectively prevent black hole 
attack and also maintain a high routing efficiency. 
Harris Simaremare and Riri Fitri Sari [2011], proposed two different approaches 
viz. AODV-UI (based on reverse request method) and PHR-AODV (Path Hoping on 
Reverse AODV) and subjected these approaches to various attacks faced by mobile 
ad-hoc networks. These approaches aim at improving performance as well as security 
and various metrics viz. packet delivery ratio, end to end delay and packet lost, are 
used. AODV-UI method works like AODV but with an exception that if one route is 
lost, route discovery process is not started. Rather the alternate route found earlier in 
route discovery is selected. This enhances the performance as there is no need to 
search for routes again and again. PHR-AODV method determines multipath for 
sending data to destination and checks whether the path is broken or not. If broken, 
path is deleted from the list and new path is selected. AODV-UI performs better in 
terms of packets lost, end to end delay and packet delivery ratio. But in presence of 
black hole nodes, PHR-AODV performs better. 
Praveen Joshi [2011], discussed security concerns in routing protocols in MANET 
(Mobile Ad hoc Network). In this paper, elaborate study has been done on the 
various attacks encountered in mobile ad hoc network and the protocols used for this 
type of network. The various routing protocols used can be broadly classified into 
proactive and reactive routing protocols. The attacks associated with ad hoc routing 
~ 38 ~
LITERATURE REVIEW 
protocols can be dynamic topology of ad hoc networks, noise and signal interference 
with wireless channel, and implicit trust relationships between neighbors. 
Cryptography, authentication, digital signatures can be used to prevent malicious 
attacks. Moreover intrusion detection systems and cooperation enforcement 
mechanisms can be used for this purpose. This paper provides an insight into the 
various attacks and the counter mechanisms employed against the malicious attacks. 
Priyanka Goyal et. Al [2011], describes the elementary problems of ad hoc network 
by providing its background. The most common challenges involved are limited 
bandwidth, less computational and battery power and security. It presents an overview 
of the routing protocols being used and their issues. Moreover desired security goals 
such as availability, confidentiality, integrity, authorization etc. have been discussed. 
The general trend is towards mesh architecture and improvements to be made to 
capacity and bandwidth. Thus it ensures smaller, cheaper and more capable ad-hoc 
networks. 
Sunil Tane ja et. al [2011], demonstrated the performance based comparison of the 
two most widely used routing protocols, AODV (Ad hoc On Demand Distance 
Vector) & DSR (Dynamic Source Routing), used in mobile ad-hoc networks. Both 
these protocols have their own advantages. DSR (Dynamic Source Routing) does not 
uses periodic routing messages like AODV (Ad hoc On Demand Distance Vector), 
thereby reducing network bandwidth overhead. Moreover the routes are maintained 
only between nodes that need to communicate. Thus route maintenance overhead is 
reduced. AODV (Ad hoc On Demand Distance Vector) routing protocol favors least 
congested route instead of the shortest route and supports both unicast and multicast 
communication. Despite these benefits, AODV (Ad hoc On Demand Distance 
Vector) is better performer when the medium is denser. Denser mediums are the 
choice for a number of applications therefore AODV (Ad hoc On Demand Distance 
Vector) is better choice and thus enjoys a preference than DSR (Dynamic Source 
Routing) over mobile ad-hoc networks. 
A.S. Bhandare et. al [2011], discussed two routing protocols namely AODV (Ad hoc 
On Demand Distance Vector) & DSR (Dynamic Source Routing) and proposed a 
method called Intrusion Detection using Anomaly Detection to provide security 
~ 39 ~
LITERATURE REVIEW 
against single and multiple black hole attacks in mobile ad-hoc network. This scheme 
works on the principle of differentiating malicious nodes from reliable nodes by 
monitoring and detecting anomaly activities of an intruder based on the normal 
activities that are to be carried out. This scheme is based on the host based intrusion 
detection as there is no central control over the device that monitors traffic flow. A set 
of parameters viz. single hop count, maximum destination sequence number, life- long 
route, destination IP (Internet Protocol) address and timestamp, are used to 
differentiate a fake reply from a legitimate reply. This method is easy to deploy and 
works on the principle of self-protection. 
Jaydip Sen et. al [2011], proposed a novel method to defend mobile ad-hoc network 
against cooperative black hole attack using AODV (Ad hoc On Demand Distance 
Vector) routing protocol. The method used ensures reasonable throughput level in the 
network. The proposed algorithm uses DRI (Data Routing Information) table and 
cross checking mechanism to ensure security against black hole attack. The 
experimental results show that the proposed scheme improves the packet delivery 
ratio and can further be enhanced to defend mobile ad-hoc network against resource 
consumption attack. 
Pramod Kumar Singh et. al [2012], proposed a scheme that can be effective in 
dealing with the malicious nodes which act as black holes in MANET (Mobile Ad hoc 
Network). The proposed method uses promiscuous mode to detect malicious node and 
propagates the information of malicious node to all other nodes in the network. The 
source node floods a RREQ (Route Request) packet in the network and wa its for 
RREP (Route Reply) packet to have a new route to the destination node. If the RREP 
(Route Reply) is received from the intermediate node, the node receiving RREP 
(Route Reply) packet, switches its promiscuous mode and sends a hello message to 
destination. If the intermediate node forwards the message to destination, the node is 
safe. Otherwise the node is a malicious one. This scheme does not require extra 
processing power and database. 
Humaira Ehsan et. al [2012], elaborated various kinds of attacks in MANET and 
simulation of these attacks was done using ns-2 simulator. Various attacks namely 
black hole attack, selfish node behavior, RREQ flooding and selective forwarding 
~ 40 ~
LITERATURE REVIEW 
attack are used draw major inferences about the impact of these attacks on the 
network. If the attacker node is on the route between the source and the destination, 
then the malicious node would have a major role in performance degradation. 
Moreover, if the attacker node is in one part of the network, while the communication 
between source and destination takes palace in another part of the network, then the 
impact of the attacker node would be minimal. 
Fidel Thachil and K C Shet [2012], proposed a method to detect and mitigate 
malicious nodes from mobile ad-hoc network. The detection and mitigation of 
malicious nodes from the network is based on trust factor being calculated by every 
node for its neighboring nodes. This trust value is calculated by a ratio between the 
number of packet received by the node and number of packets dropped by it. Each 
node has a certain trust value. A threshold value is specified below which a node 
would be considered malicious and as a result the node will be deleted from the 
reliable routes and information regarding the malicious node is broadcasted 
throughout the network. This method works far better than pure AODV (Ad hoc On 
Demand Distance Vector) and ensures efficient packet delivery even in the presence 
of malicious nodes. 
Kundan Munjal et. al [2012], proposed a novel approach for detecting cooperative 
black hole nodes in the network and propagating information regarding malicious 
nodes throughout the network. For experimentation, three different scenarios are 
tested. In first, no malicious node is present, so the route is considered reliable for 
sending data. In second case, two cooperating malicious nodes are detected and 
information regarding them is propagated throughout the network. In third case, on 
finding a node to be reliable, information regarding its reliability is spread through the 
network. The proposed network works well in all scenarios and achieves success 
against black hole attack. Thus it ensures reliable route from source to destination. 
But the algorithm requires improvements in end-to-end delay as well as routing 
overhead. 
Rutvij H. Jhaveri et. al [2012], proposed a novel approach of using intermediate 
nodes to find and isolate malicious nodes based on the sequence number. In AODV, 
the RREP packets are sent back to source node in reverse path through which RREQ 
~ 41 ~
LITERATURE REVIEW 
packet was received by destination node. If sequence number is higher in the table of 
the node, packet is accepted otherwise discarded. But in the proposed method, apart 
from checking the sequence number from RREP packet received, a PEAK value is 
calculated by intermediate node using parameters viz. routing table sequence number, 
RREP sequence number and number of replies during a time interval. Maximum 
possible value of sequence number is the PEAK value and if a RREP packet received 
has a sequence number higher than the PEAK value, the packet is labeled “don’t 
consider” and forwarded along the reverse path. In this way, the malicious node is 
detected as well as other nodes are informed about this node. So this node is not 
considered while selecting a route to the destination. 
Nidhi Sharma & Alok Sharma [2012], presented a couple of solutions that can be 
used as a strategy against the black hole attack in MANET (Mobile Ad hoc Network). 
First solution is to have multiple routes to destination and unicast ping packet to 
destination using multiple routes (assigning different packet ID’s and sequence 
number). Upon checking the replies received from different routes, decision is made 
regarding the selection of a route for communication. In the second approach, 
sequence number is used for the verification of legitimate node. Two extra tables are 
maintained to record sequence number of the forwarded packets and sequence number 
of the received packets. If there is a mismatch between sequence number of received 
RREP (Route Reply) and the sequence number of the table, the route discovery 
process is started while alarming the whole network about the node. The scheme does 
not add overhead as sequence number itself is included in every packet in base 
protocol. 
Gundeep Singh Bindra et. al [2012], proposed a novel solution of maintaining an 
Extended Data Routing Information (EDRI) table at each node, for detection of 
cooperating black hole and gray hole nodes. This scheme also focuses on node’s 
previous malicious instances and renew packet, further request & reply packets are 
used apart from the RREQ & RREP packets. The EDRI table considers the gray 
behavior of nodes and a counter is used to keep track of how many times a node has 
been caught. This not only ensures safety against black hole nodes but also gray 
behavior nodes. The only limitation is that only consecutive cooperating black hole 
nodes can be identified using this scheme. 
~ 42 ~
LITERATURE REVIEW 
M. Jhansi et. al [2012], proposed a new method of detecting cooperative black hole 
attack in MANET. This method uses extra bits of information to store the information 
regarding the number of packets received by a node and the number of packets further 
transferred by it. Two bits are used. 1st bit “first” stands for information on routing 
data packet from the node while the second bit “through” stands for information on 
routing data packet through the node. Moreover a cross check is done on the 
intermediate node generating RREP (Route Reply) by making it to provide its next 
hop node and its DRI (Data Routing Information) table. The DRI entry is checked by 
source node and data is routed depending on a positive match. Otherwise FRq 
(Further request) message is send to NHN (Next Hop Node) to check the reliability of 
the intermediate node. This method can be applied to identify multiple black hole 
nodes cooperating with each other and to discover secure paths from source to 
destination. 
Vaishali Mohite & Lata Ragha [2012], implemented a novel method to find a secure 
route from source to destination by avoiding cooperative malicious nodes. This 
method uses data routing information and two additional tables namely RRT 
(Receiving Record Table) & SRT (Self Record Table). These additional tables hold 
information regarding the node that sent the reply packet and the information about 
the current node to be sent to the node that sent the packet respectively. These tables 
are helpful in keeping the history of the packets sent/received at each node so as to 
make detection of an inside attacker easier. This method proves out to be effective 
against cooperative attacks. 
Meenakshi Patel & Sanjay Sharma [2013], projected a novel automatic security 
mechanism using SVM (Support Vector Machine) to defend against malicious attack 
occurring in AODV (Ad hoc On Demand Distance Vector). This method uses three 
metrics viz. Packet Delivery Rate (PDR), Packet Modification Rate (PMR) and 
Packet Misroute Rate (PMISR), to decide the behavior of a node. The information 
required by the metrics is gathered from all the nodes in the network. These metrics 
are checked against a threshold, below which the node is considered malicious. The 
projected scheme is simple and provides fast and quick response to suspicious or 
compromised node. 
~ 43 ~
LITERATURE REVIEW 
Jaspal Kumar et. al [2013], analyzed the effect of black hole attack on the routing 
protocols and have used AODV (Ad hoc On Demand Distance Vector) and Improved 
AODV (Ad hoc On Demand Distance Vector) protocol. IAODV (Improved Ad hoc 
On Demand Distance Vector) supports multipath where route discovery is necessary 
only when all routes expire whereas in case of AODV (Ad hoc On Demand Distance 
Vector), route discovery starts as RERR (Route Error) message is received from the 
only route being used for transmission. IAODV (Improved Ad hoc On Demand 
Distance Vector) falls into hybrid category of routing protocol whereas AODV (Ad 
hoc On Demand Distance Vector) is a reactive routing protocol. Experimental results 
show that IAODV (Improved Ad hoc On Demand Distance Vector) is less affected by 
black hole attack than AODV (Ad hoc On Demand Distance Vector). Moreover 
packet delivery ratio of IAODV (Improved Ad hoc On Demand Distance Vector) is 
improved at an increased routing overhead which can be avoided considering that 
tackling black hole attack in the network, is a challenging task. 
Rutvij H. Jhaveri [2013], presented a method to avoid malicious nodes from 
participating in the information exchange between two nodes and also reducing the 
network load. This method works on R-AODV (Reverse AODV), which states that a , 
a PEAK value is calculated by intermediate node using parameters viz. routing table 
sequence number, RREP sequence number and number of replies during a time 
interval. Maximum possible value acceptable as a sequence number is the PEAK 
value and if a RREP packet received has a sequence number higher than the PEAK 
value, the packet is simply discarded. In this way, only genuine RREP are received at 
the source. Thus it reduces the network traffic. This method increases the packet 
delivery ratio with acceptable routing overhead. 
Sisily Sibichen et. al [2013], demonstrated the use of authentication keys in providing 
security in mobile adhoc networks. Moreover the proposed method makes use of the 
spanning tree to allow the communication between member nodes of the network. In 
this method, each of the node has its own certificate and this certificate is signed by 
trusted third party. This certificate is the basis of all the communication between the 
nodes as the receiving nodes checks this certificate for authenticity before forwarding 
the received packet. Once the certificates are exchanged, the nodes start exchanging 
secret keys which are used for the encryption and decryption of the messages. This 
~ 44 ~
LITERATURE REVIEW 
method not only makes the communication between nodes secure but also results in 
increase in throughput and Packet Delivery Ratio (PDR). 
Sanjay K. Dhurandhe r et. al [2013], analyzed the most common problem with 
MANET viz. black hole attack and proposed a modified GAODV protocol to be used 
as a countermeasure against black hole attack as well as gray hole attack. This 
technique uses two extra packets namely check confirm and reply confirm, to find a 
secure route from source to destination node. When reply from an intermediate node 
is received, it is checked whether the sending node has an entry in black hole table. If 
not, it sends confirm packet to destination. If intermediate node is a black hole, it 
discards the packet. Upon receiving the confirm packet, the des tination sends reply 
confirm packet to the source. If this confirm reply packet is received within a 
stipulated time, the source starts sending packets to the destination or stores the 
intermediate nodes in black hole table and rebroadcasts RREQ packets to find a route 
to destination. This method shows promising results in detecting collaborative black 
hole nodes. Also the proposed method offers 90% DDR (Data Delivery Ratio) for 
dynamic topology and with 0.9 times end to end delay of conventional AODV. 
~ 45 ~ 
CONCLUDING REMARKS 
In this chapter various techniques defined in various papers have been discussed. The 
techniques employed against the black hole attack are using Data Routing Information 
(DRI) table, Intrusion Detection Systems, segregation based on the input from the 
neighbors of a node. All the papers discussed have certain merits over each other and 
there is a tradeoff between various metrics in each of the techniques defined in the 
different papers discussed.
THEORETICAL DEVELOPMENT 
CHAPTER 3 
THEORETICAL DEVELOPMENT 
3.1 PROBLEM FORMULATION 
In MANET inside and outside attacks are possible, which degrade the performance of 
the network. In Inside attacks, a node within the network become malicious node and 
it launched attacks on network. In outside attacks, a malicious node which is outside 
the network, it becomes the member of the networks and then launches attack on 
network. Black hole attack is the most common active type of attack. When black 
hole attack is triggered in the network, throughput of the network reduces and delay 
increases at a steady rate. The black hole attack is even worse if the multiple black 
hole nodes exist in the network. 
A significant amount of research has been devoted to study security issues as well as 
countermeasures to various attacks in MANET. However, there is still much research 
work needed to be done in the area. The aim of the study is to detect the Black Hole 
attack using AODV protocol in MANET. This thesis work focuses on finding a secure 
route for communication by detecting and isolating all the malicious nodes in mobile 
Ad hoc network. The detection of the cooperative black hole nodes will provide more 
security and stability to MANET. 
~ 46 ~ 
3.2 Objectives 
Following are the various objectives of this research work 
 To study black hole attack in MANET and its consequences. 
 To implement a new scheme to detect malicious nodes in the network which are 
responsible for triggering the black hole attack in the network. 
 Testing the new scheme against parameters like throughput and end-to-end delay.
THEORETICAL DEVELOPMENT 
3.3 Methodology/Planning of work 
Figure: 3.1 Methodology used 
~ 47 ~
5.1 SIMULATION ENVIRONMENT 
CHAPTER 4 
SIMULATION ENVIRONMENT 
4.1 SIMULATION ENVIRONMENT 
Simulation is the execution of a system model in time that gives information about a 
system being investigated. Events occur at discrete points of time. When the numbers 
of such events are finite, we call it discrete event. A discrete event simulator consists 
of a bunch of events and a central simulator object that executes these events in order. 
The act of simulating something generally entails representing certain key 
characteristics or behaviors of a selected physical or abstract system. The simulator 
used in this thesis work to simulate the ad-hoc routing protocols is Network Simulator 
2. 
~ 48 ~ 
4.1.1 Network Simulator 
Network Simulator is the result of an ongoing effort of research and development that 
is administrated by researchers at Berkeley. It is a discrete event simulator targeted at 
Fig.4.1 Network Simulator 2
4.1.1 NETWORK SIMULATOR 
networking at networking research. NS-2 is an object-oriented, discrete event network 
simulator developed at UC Berkeley. It is written in C++ and OTcl (Object-Oriented 
Tcl) and primarily uses OTcl as command and configuration language. NS is basically 
written in C++, with an OTcl interpreter as a frontend. 
It supports a class hierarchy in C++, called Compiled hierarchy and a similar one 
within the OTcl interpreter, called interpreter hierarchy. There is a one-one 
correspondence between classes of these two hierarchies. The root of the hierarchy is 
Class Tcl Object. Users create new simulator objects through interpreter that are 
instantiated within the interpreter. The interpreted hierarchy is automatically 
established through methods defined in the Tcl class. User instantiated objects are 
mirrored through methods defined in class Tcl Object. The simulator can be viewed as 
doing two different things. While on one hand, detailed simulations of protocols are 
required, it is also required that the user is able to vary the parameters or 
configurations and quickly explore the changing scenarios. For the first case, we need 
a system programming language like C++ that efficiently handles bytes, packet 
headers and implement algorithms efficiently. But for the second case, iteration time 
is more important than the runtime of the part of the task. This is accomplished by a 
scripting language like Tcl. A major component of NS besides network objects is 
event scheduler. For example, a packet can be considered as an event with scheduled 
time and pointer to an object that handles an event. All the network components that 
need to spend some time handling packets use the event scheduler by issuing an event 
for a packet. A switching component or timer use event scheduler. Simulation results 
are usually got using files called Trace files. When the simulation is over, NS 
produces one or more text based output files that contain simulation data as specified 
in the input script.it can be viewed using a nice graphical tool called Network 
Animator or NAM in short. NS is mainly used for simulating local and wide area 
networks. It simulates a wide variety of IP networks. It implements network protocols 
such as TCP and UDP, traffic source behavior such as FTP, CBR and VBR, Router 
queue management mechanisms such as Drop tail and CBQ. The NS projects is now 
part of the VINT project that develops tools for simulation results display, analysis 
and converters that convert network topologies generated by well-known generators 
to NS formats. The current version of network simulator does not support mobile 
wireless environment. 
~ 49 ~
4.1.1 NETWORK SIMULATOR 
TABLE 4.1 Simulation Parameters 
Parameter Value 
Terrain Area 800 m x 800 m 
Simulation Time 50 s 
MAC Type 802.11 
Application Traffic CBR 
Routing Protocol AODV 
Data Payload 512 Bytes/Packet 
Pause Time 2.0 s 
Number of Nodes 15 
Number of Sources 1 
No. of Adversaries 1 to 3 
Number of nodes: This parameter in the above table is used to represent number of 
nodes that are used for conducting the simulation. 
Pause time: this parameter represents the time interval for which the nodes can be 
paused in the network during simulation. 
Traffic type: Network traffic can be of two types viz. Variable Bit Rate (VBR) and 
Constant Bit Rate (CBR). The CBR traffic can suffer a maximum delay of T. 
Simulation time : Simulation time is the duration of time for which the simulation is 
carried out. 
~ 50 ~ 
4.2 Quantitative Metrics 
There are a number of quantitative metrics that can be used for evaluating the 
performance of a routing protocol for mobile wireless ad-hoc networks. In this thesis, 
we follow the general ideas described in RFC 2501, and we use four quantitative 
metrics. The packet delivery ratio and average end-to-end delay are most important 
for best-effort traffic. The other two qualitative metrics used in this thesis are and 
throughput.
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final
Vikash file full_final

More Related Content

What's hot

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013vasanthimuniasamy
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
Computer Networks
Computer NetworksComputer Networks
Computer Networksguestf10d8f
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligiesAli Kamran
 
Network and technologies
Network and technologiesNetwork and technologies
Network and technologiesAkeem Coulibaly
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module IAjit Nayak
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introductionAbdul-Hamid Donde
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standardsAdeel Khurram
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 

What's hot (20)

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013
 
Classnote1
Classnote1Classnote1
Classnote1
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
A computer network
A computer networkA computer network
A computer network
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligies
 
Network and technologies
Network and technologiesNetwork and technologies
Network and technologies
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 

Similar to Vikash file full_final

2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...ssuser036308
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 

Similar to Vikash file full_final (20)

2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 
Lan
LanLan
Lan
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Vikash file full_final

  • 1. 1.1 INTRODUCTION CHAPTER 1 INTRODUCTION ~ 1 ~ 1.1 INTRODUCTION A computer network or data network is a telecommunication network that allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections. The connections (network links) between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as servers and personal computers, as well as networking hardware. Two devices are said to be networked when a device is able to exchange informa tion with another device. Computer networks support applications such as World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. Computer networks differ in the physica l media used to transmit their signals, the communications protocols to organize network traffic, the network’s size, topology and organizational intent. Fig. 1.1 Computer Network
  • 2. 1.2 WIRED NETWORK Today, computer networks are the core of modern communication. Computer networks, and the technologies that make communication between networked computers possible ,continue to drive computer hardware, software, and peripherals industries. The expansion of related industries is mirrored by growth in the numbers and types of people using networks, from the researcher to the home user.The network can be of different types depending on the topologies used, geographical scale, and organizational scope. But the networks can be broadly classified into two categories. They are 1.2 Wired Network 1.3 Wireless Network ~ 2 ~ 1.2 WIRED NETWORK A wired network connects devices to the network or other network using cables. The most common wired networks use cables connected to Ethernet ports on the network on one end and to a computer or other device on the opposite end. Wired networks provide users with plenty of security and the ability to move lots of data very quickly. A widely adopted family of communication media used in local area network (LAN) technology is collectively known as Ethernet. The media and protocol standards that enable communication between networked devices over Ethernet are defined by IEEE 802.3. Ethernet transmit data over both copper and fiber cables. Wired networks are typically faster than wireless, and they can be very affordable. However the cost of Ethernet cable can add up- the more computers on your network and the farther apart they are, the more expensive your network will be. The most common wired networks are formed using Ethernet. Ethernet is a physical and data link layer technology for local area networks (LANs). When first widely deployed in 1980’s, Ethernet supported a maximum data rate of 10 megabits per second. Later fast Ethernet standards increased this maximum data rate to 100 Mbps. Gigabit Ethernet further extended this to a data rate of 1000 Mbps. Ethernet follows a simple set of rules that govern its basic operation. The basic terms used with Ethernet technology are:  Medium: Ethernet devices attach to a common medium that provides a path along which the electronic signals will travel. This medium has been coaxial copper cable, but today it is more a twisted pair or fiber optic cabling.
  • 3. 1.3 WIRELESS NETWORK  Segment: This refers to a single shared medium as an Ethernet segment.  Node: Devices that attach to that segment are stations or nodes.  Frame: The nodes communicate in short messages called frames, which are variably sized chunks of information. The Ethernet protocol specifies a set of rules for constructing frames. Each frame must include a destination address and a source address, which identify the recipient and the sender of the message. The address uniquely identifies the node. No two Ethernet devices ever have the same address. One interesting thing about Ethernet addressing is the implementation of a broadcast address. A frame with a destination address equal to the broadcast address is intended for every node on the network, and every node will receive and process this type of frame. The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet. The original 10BASE5 Ethernet used coaxial cable as a shared medium. The Ethernet standard has grown to encompass new technologies as computer networking has matured, but the mechanics of operation for every Ethernet network today originate from Metcalfe’s original design. The original Ethernet described communication over a single cable shared by all devices on the network. Once a device is attached to this cable, it had the ability to communicate with any other device attached. This allows the network to expand to accommodate new devices without requiring any modification to those already on the network. In addition to computers, Ethernet is now used to interconnect appliances and other personal devices. It is used in industrial applications and is quickly replacing legacy data transmission systems in the world's telecommunications networks. ~ 3 ~ 1.3 WIRELESS NETWORK Wireless Networking is a technology in which two or more computers communicate with each other using standard network protocols but without using cables. The transmission takes place with the help of radio waves at physical level. It is also known as Wi-Fi or WLAN. In this type of network, devices can easily two using radio frequency. The IEEE standard for wireless network is 802.11.
  • 4. A) INFRASTRUCTURE NETWORKS Convenience offered by Wireless Networks  Mobility: This is one of the obvious advantages of the wireless networks. Mobile users can connect to the existing networks while roaming freely.  Simplicity: We can translate simplicity into rapid development. It is easy to install a wireless infrastructure, compared to a wired network.  Flexibility: Wireless network coverage area can reach where wire cannot go. It is very useful for moving vehicles or for the places where running cable is not possible. There are two types of Wireless Operating modes: A) Infrastructure Mode B) Ad-hoc Mode or Infrastructure less Mode ~ 4 ~ A) Infrastructure Networks In infrastructure based network, communication takes place only between the wireless nodes and the access points. There is no direct communication between the wireless nodes. The access point is used to control the medium access as well as it acts as a bridge between wireless and wired networks. In this network, fixed base stations are used. When the node goes out of the range of base station another base station come into range. The example of infrastructure based network is cellular networks. It is centralized system which is controlled by the controller like router. The main problem in this system is that if the controller fails, whole system will crash. Fig. 1.2 Infrastructure Network
  • 5. 1.4 MANET ~ 5 ~ B) Infrastructure less Networks The infrastructure less network does not need any infrastructure to work. In this network each node can communicate directly with other nodes. No access point is required for controlling medium access. In this network, all the nodes need to act as routers and all nodes are capable of movement and can be connected dynamically in an arbitrary manner [6] 1.4 MANET MANET stands for Mobile Ad hoc Network. It is a robust infrastructure less wireless network. It can be formed either by mobile nodes or by both fixed and mobile nodes. Nodes are randomly connected with each other and forming arbitrary topology. They can act as both routers and hosts. They have ability to self-configure makes this technology suitable for provisioning communication to, for example, disaster-hit areas where there is no communication infrastructure or in emergency search and rescue operations where a network connection is urgently required. In MANET routing protocols for both static and dynamic topology are used. An ad hoc network is a wireless network describe by the nonexistence of a centralized and fixed infrastructure. The absence of an infrastructure in ad hoc networks poses great challenges in the functionality of these networks. Therefore, we refer to a wireless ad hoc network with mobile nodes as a Mobile Ad Hoc Network. In a MANET, mobile nodes have the capability to accept and route traffic from their intermediate nodes towards the destination i.e., they can act as both routers and hosts. More frequent connection tearing and re-associations place an energy constraint on the mobile nodes. As MANETs are illustrated by limited bandwidth and node mobility, there is a demand to take into account, the energy efficiency of the nodes, topological changes and unreliable communication in the design. Moreover more importance has to be given to the routing protocols used for the communication between the nodes as it is the one of the important thing which has a huge impact on the performance of the mobilead-hocnetwork.
  • 6. 1.4.1 TYPES OF MOBILE AD-HOC NETWORK Table 1.1 Characteristics of Mobile Ad-hoc Network Mobile Ad-hoc Network Characteristics  Autonomous and infrastructure less ~ 6 ~  Multi-hop routing  Dynamic network topology  Device heterogeneity  Energy constrained operation  Bandwidth constrained variable capacity links  Limited physical security  Network scalability  Self-creation, self-organization and self-administration 1.4.2 Types Of Mobile Ad-Hoc Network Vehicular ad-hoc networks (VANET) are used for communication among vehicles and between vehicles and roadside equipment. Intelligent vehicular ad-hoc networks are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents etc. internet based Mobile Ad-hoc Networks (iMANET) are ad-hoc networks that link mobile nodes and fixed internet-gateway nodes. Table 1.2 Mobile Ad-hoc Network Types Technology Bitrate Frequency Range(meters) Powe r consumption IEEE 802.11b 1,2,5.5 and 11 Mbit/s 2.4 GHz 25-100indoor 100-500 outdoor 30 mW IEEE 802.11g Up to 54 Mbit/s 2.4 GHz 25-50 indoor 79 mW IEEE 802.11a 6,9,12,24,36,49 and 54 Mbit/s 5 GHz 10-40 indoor 40mW,250 mW IEEE 802.15.1 1 Mbit/s 2.4 GHz 10-100 1mW
  • 7. 1.4.2 APPLICATIONS OF MOBILE AD-HOC NETWORK ~ 7 ~ IEEE 802.15.3 110-480 Mbit/s 3-10 GHz 10 100mW, 250mW IEEE 802.15.4 20, 40 or 250 Kbit/s 868 MHz,915 MHz or 2.4 GHz 10-100 1 mW HiperLAN2 Up to 54 Mbit/s 5 GHz 30-150 200mW or 1W IrDA Up to 4 Mbit/s Infrared(850nm) 10 Distance based Home RF 1 Mbit/s (v 1.0) 10Mbit/s(v 2.0) 2.4 GHz 50 100 mW IEEE 802.16 IEEE 802.16a IEEE 802.16e (Broadband Wireless) 32-134 Mbit/s Up to 75 Mbit/s Up to 15 Mbit/s 10-66 GHz <11 GHz <6 GHz 2-5 km 7-10 km 2-5 km Complex power control 1.4.4 Applications of Mobile Ad-hoc Network There is no clear picture of what these networks will be used for. The suggestion varies from document sharing at conference to infrastructure enhancement and military applications. In areas where no infrastructure is available, an ad-hoc network could be used by a group of wireless mobile hosts. Other examples include business associates wishing to share files or a class of students needs to interact during a lecture. If each mobile host wishing to communicate is equipped with a wireless local area network interface, the group of mobile hosts can form an ad-hoc network. Access to internet and access to the resources in the network such as printer, will probably be supported.
  • 8. TABLE 1.4.5 MOBILE AD-HOC NETWORK APPLICATIONS Table 1.3 Mobile Ad-hoc Network Applications Application Possible Scenarios Tactical networks  Military communication ~ 8 ~  Automated battlefield Emergency services  Search and rescue operation  Disaster recovery  Policing and fire fighting  Supporting doctors and nurses in the hospital Commercial and civilian environment  E-commerce  Dynamic database access, mobile offices  Vehicular services: taxi cab network, road or accident guidance  Sports stadium, trade fair, shopping malls Home and enterprise networking  Home/office wireless networking  Conference, meeting rooms  Personal area networks  Network at construction site Education  Universities and campus setting  Virtual class rooms  Ad-hoc communication during meetings or lectures Entertainment  Multi user games  Wireless P2P networking  Outdoor internet access  Robotic pets  Theme parks
  • 9. 1.5 ROUTING PROTOCOLS FOR MANET Sensor networks  Home appliances ~ 9 ~  Body area network  Data tracking of environment conditions Coverage extension  Extending cellular network access  Linking up with the internet, intranet etc. 1.5 ROUTING PROTOCOLS FOR MANET Routing protocol specifies the rules which govern the communication between numbers of nodes for exchange of information. It helps to find the shortest route from source to destination. There are mainly two types of routing protocol. These are as following:  Table Driven routing protocol (Proactive)  On-demand Routing Protocol (Reactive)  Hybrid Routing Protocol 1.5.1 Table Driven Routing Protocol Table Driven protocol contains fresh list of the routes from source to destination. In this type of protocol, one node contains more than one table for each node in the network. All the nodes are updated regularly. If the topology frequently changes, then updated information propagates to every node of the network and update table. Because every node has information about network topology, Table Driven Routing Protocols present several problems like periodically updating the network topology increases bandwidth overhead, periodically updating route tables keeps the nodes awake and quickly exhaust their batteries. 1.5.1.1 Destination Sequenced Distance Vector (DSDV) Destination Sequenced Distance Vector is a loop free routing protocol in which the shortest-path calculation is based on the Bellman-Ford algorithm. Data packets are transmitted between the nodes using routing tables stored at each node. Each routing
  • 10. 1.5.1.1 DESTINATION SEQUENCED DISTANCE VECTOR (DSDV) table contains all the possible destinations from a node to any other node in the network and also the number of hops to each destination. The protocol has three main attributes: to avoid loops, to resolve the count to infinity problem, and to reduce high routing overhead. Each node issues a sequence number that is attached to every new routing-table update message and uses two different types of routing-table updates to minimize the number of control messages disseminated in the network. Each node keeps statistical data concerning the average settling time of a message that the node receives from any neighbouring node. The data is used to reduce the number of rebroadcasts of possible routing entries that may arrive at a node from different paths but with the same sequence number. DSDV takes into account only bidirectional links between nodes. DSDV routing-table construction starts with the condition that every node in the network periodically exchange control messages with its neighbours to set up multi hop paths to any other node in the network, in accordance with the Bellman-Form algorithm. Each individual route to every destination is tagged with a destination sequence number, which is issued by the destination node. Any route to a destination with a higher destination sequence number replaces the same route with a smaller destination sequence number in the node’s routing table, regardless of the number of hops to this destination. Every node immediately advertises any significant change in its routing table, such as a link failure to its neighbouring node(s), but waits for a certain amount of time to advertise other changes. This time, has called the “settling time”, is calculated by maintaining, for every destination, a running, weighted average of the most recent updates of the routes. By implementing this advertising scheme, DSDV tries to minimize the number of route updates transmitted by a node. Thus, when a node receives a route update for a destination from one of its neighbouring nodes, and a few seconds later, it receives a second update from a different neighbouring node for the same destination with the same destination sequence number, but a lower number of hops, the node does not immediately broadcast the change in its routing table. This is highly possible in a MANET, in which the network topology changes very dynamically. If this kind of policy were not in place, the node would have to advertise two route updates within a short period, causing its neighbouring nodes to broadcast new route updates to its neighbouring nodes. For this purpose, each node maintains a table with the dest ination address, the last settling ~ 10 ~
  • 11. 1.5.1.2 OPTIMIZED LINK STATE ROUTING (OLSR) time and the average settling time of this address. The node uses the information in this table to check the stability of the route to a destination. DSDV does not provide security mechanism to address security vulnerabilities observed in MANETs. DSDV is vulnerable to any malicious node that disseminates false routing updates due to periodic exchange of routing-update massages. Thus, an attack to replace the destination sequence number in a route-update packet may have a severe impact on the performance of the network. DSDV has certain advantages that cannot be overlooked. First, the simplicity of the protocol is very similar to the classic Distance Vector, with only small modifications to avoid loops, with the use of destination sequence numbers. DSDV also presents low latency, as every node always has a route to any destination in the network. However, DSDV does not scale well in networks with high mobility, as the broken links create a “storm” of route updates. This situation may severely degrade network performance, in which the available bandwidth is limited. Another disadvantage of DSDV is that it does not support a sleeping mode, as every node in the network must periodically broadcast changes or full updates of its routing table. Those frequent and periodic route updates in the network will also result in high-energy consumption. Also DSDV does not support multicasting routing. 1.5.1.2 Optimized Link State Routing (OLSR) Optimized Link State Routing is based on the link state algorithm and has been modified and optimized to efficiently operate MANET routing. The main concept of the protocol is to adapt the changes of the network without creating control messages overhead due to the protocol flooding nature. Thus, the designers of OSLR decided to have only a subset of the nodes, named Multipoint Relays (MPRs), in the network responsible for broadcasting control messages and generating link state information. A second optimization is that every MPR may choose to broadcast link state information only between itself and the nodes that have selected it as an MPR. Optimized Link State Routing is also designed to combine two separate sets of functions. The core set of functions consists of all the protocol functions in play whe n the protocol operates in a pure MANET, running OLSR as the Layer 3 protocol. A second set of functions provides the additional necessary functions when a node has more than one network’s devices and participates in more than one routing domain. ~ 11 ~
  • 12. 1.5.1.2 OPTIMIZED LINK STATE ROUTING (OLSR) In OSLR, only multipoint relays (MPR) are designated for link state updates and packet forwarding. In a typical flooding-based approach, a node broadcasts a message either if it is the originator or if it has not received this message before. Thus, the number of messages transmitted in the network is almost as large as the number of the nodes in the network. Figure 1.9aa shows a typical flooding scenario. Figure 1.9b shows the flooding in the entire network when using MPRs. Fig: 1.3a Pure Flooding & 1.3b MPR Flooding It is clear that the number of broadcasted messages can be greatly reduced by the MPRs’ implementation. The set that consists of the nodes that are multipoint Relays is called MPR set. Each node N in the network selects an MPR set that processes and forwards every link state packet that node N originates. The neighbouring nodes of N that are not in the MPR set process this packet, but do not further broadcast it. A node N also maintains a subset of neighbours, named MPR selectors, which is the set of the neighbours that have selected N as one of their MPRs. Each node may have one or more MPRs. A condition for the selection of an MPR node is the assurance of bidirectional links between it and its selectors. Each node in a network maintains a routing table that enables a source node to send data packets to a destination node. Four different types of information are used for the construction, calculation and maintenance of routing information. Every node in the network obtains all the information necessary for the construction of its routing table with a periodic transmission of messages. The node, upon receiving this information, updates and recalculates its routing table. When a link breaks or if the network topology changes ~ 12 ~
  • 13. 1.5.1.3 COMPARISON OF PROACTIVE ROUTING PROTOCOLS BASED ON QUALITATIVE METRICS due to a change in a node position in the network, no messages other than those defined above are required for the update of the routing table. OLSR does not provide security mechanism to ensure that nodes do not intentionally provide false routing information. OLSR designers assume that there are already additional security mechanisms in place at the lower layers of the network. However, any persistent attack to any of the MPRs will result in flooding false link state information to other nodes. The main advantages of OLSR are low latency and high data delivery ratio because each node in the network maintains an up-to-date routing table with all the destinations in the network. Thus, no additional connection se t-up time is required for a node to send data packets to another node in the network. This proactive nature of OLSR makes it a very attractive solution in networks where low latency and high data delivery ratio are the main concerns. However, the main disadvantage of this protocol comes from its proactive nature and the flooding mechanism, despite the use of the MPRs. OLSR may introduce high routing overhead, consuming a large portion of the available bandwidth. OLSR does not support multicasting routing. 1.5.1.3 Comparison of Proactive Routing Protocols Based on Qualitative Metrics All the above proactive protocols are loop- free. OSLR, as a modification of the link state algorithm, does not introduce any loops into the routing process, except for oscillations when the link costs depend on the amount of traffic carried by the link. In the MANET scheme, however, link cost depends on the number of hops from a source to a destination, thus avoiding oscillations. DSDV solves the pathologies that the Distance Vector algorithm introduces, by the use of destination sequence numbers. DSDV does not suffer from any kind of loops in the network. The proactive behaviour of these protocols is guaranteed by the periodic exchange of control messages. At any given time, every node has at least one route to any possible destination in the network. We say “possible destination” because the physical existence of a node in the network does not necessarily mean that the node is active or that a route to the node exists, because the node may be out of the transmitting range of all other nodes in the network. ~ 13 ~
  • 14. 1.5.1.3 COMPARISON OF PROACTIVE ROUTING PROTOCOLS BASED ON QUALITATIVE METRICS None of the above protocols addresses the security vulnerabilities that are obvious in wireless networks. The proper function of these protocols is based on an assumption that all the nodes exist and operate in a secure environment where link-and physical- Layer security mechanisms are in place. DSDV is more secure than OLSR, as OLSR functionality is based on the proper behaviour of the MPRs. DSDV do not support unidirectional links. However, in wireless communication, unidirectional links will exist and should be supported to take advantage of any possible paths from a source node to a destination node. In MANETs, especially, there is no such “luxury” as ignoring any possible paths, as routing protocols should take advantage of any link to calculate routes in the network. OLSR designers take into account these limitations of the wireless network and support both bidirectional and unidirectional links. As for the “sleep mode” operation, only OLSR considers some extensions in its current existing design to support such an operation. In a wireless ad-hoc network, in which nodes depend mainly on batteries for their energy source, the sleep mode is a serious attribute that should be supported by any routing protocol. Multicasting is not considered by any of the above protocols. In real situations in tactical communications, data will be destined to a group of nodes, rather than to an individual node. Unicasting will decrease the bandwidth available for user data when the same message has to be delivered to multiple nodes. We have also added three additional metrics, to point out the differences in the design and implementation of the three protocols. The way that all the above protocols calculate their routes from a source node to a destination node follows the shortest distance approach, which computes the smallest number of hops between the source and the destination. Table 1.4 Comparison of Proactive Protocols Qualitative Metrics DSDV OLSR Loop Free Yes Yes Proactive Behaviour Yes Yes Security No No Support for No Yes Unidirectional ~ 14 ~
  • 15. 1.5.2 ON-DEMAND ROUTING PROTOCOL Links Sleep mode No Yes Multicasting No No Routing Flat Flat Nodes with special tasks No Yes Routing Metric Shortest Distance Shortest Distance 1.5.2 On-demand Routing Protocol It is a lazy approach in which a node does not contain the information of the all the nodes and maintains table only on demand. To find the path, route discovery process is follow. Reactive routing protocols are bandwidth efficient. In this, routes are built as and when they are required. This is achieved by sending route requests across the network. But it offers high latency when finding routes and also there is a possibility of network clog when flooding is excessive. There are many types of protocol are available in MANET. The efficiency of a routing protocol is determined by its battery power consumption of a participating node and routing of traffic into the network. Ad hoc routing protocols includes: 1.5.2.1 Ad-hoc On-demand Distance Vector Protocol AODV is an on-demand routing protocol used in ad hoc networks. This protocol is like any other on-demand routing protocol which facilitates a smooth adaptation to changes in the link conditions. In case when a link fails, messages are sent only to the affected nodes. With this information, it enables the affected nodes invalidate all the routes through the failed link. AODV has low memory overhead, builds unicast routes from source to the destination and network utilization is less. There is least routing traffic in the network since routes are built on demand. When two nodes are in an ad hoc network wish to establish a connection between each other, it will enable them build multi hop routes between the mobile nodes involved. AODV needs to keep track of the following information for each route table entry:  Destination IP Address: IP address for the destination node.  Destination Sequence Number: Sequence number for this destination. ~ 15 ~
  • 16. 1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL  Hop Count: Number of hops to the destination.  Next Hop: The neighbor, which has been designated to forward packets to the ~ 16 ~ destination for this route entry.  Lifetime: The time for which the route is considered valid.  Active neighbor list: Neighbor nodes that are actively using this route entry.  Request buffer: Makes sure that a request is only processed once. It is loop free protocol which uses Destination Sequence Numbers (DSN) to avoid counting to infinity. This one is the distinguishing feature of this protocol. Requesting nodes in a network send Destination Sequence Numbers (DSNs) together with all routing information to the destination. It selects the optimal route based on the sequence number. AODV defines three messages: Route Requests (RREQs), Route Errors (RERRs) and Route Replies (RREPs). These messages are used to discover and maintain routes across the network from source to destination by use of UDP packets. Whenever there is need to create a new route to the destination, the node which is requesting broadcasts Route Requests. A Route is determined when this message reaches the next hop node (intermediate node with routing information to the destina tion) or the destination itself and the RREP has reached the originator of the request. Routes from the originator of the RREQ to all the nodes that receive this message are cached in these nodes. When a link failure occurs, Route Errors (RERRs) message is generated [21]. Fig 1.4 AODV Route Discovery Process
  • 17. 1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL Fig. 1.5 Best path with minimum Hop Count Nodes N1 broadcasts RREQ packets to its neighbor nodes and update its table. Then these nodes further forwards packets to its neighbor until the destination find outs and fresh route find out. Each node maintains its sequence number and broadcast ID. For every RREQ the node initiates broadcast ID which is incremented and together with the node's IP address uniquely identifies an RREQ. At last that route will be the final route that has the minimum hop count from source to destination. AODV uses mainly two mechanisms to avoid high routing overhead caused by its flooding nature. The first mechanism involves a binary exponential back off to minimize congestion in the network. The second one involves an expanding ring search technique in which the originator node starts broadcasting a RREQ message and the TTL value is set to a minimum default value. If the originator node does not receive a RREP message within a certain time interval, it exponentially increments the time interval and increases the diameter of the searching ring. The maximum value for the ring diameter is set by default to 35, which is, for AODV, the maximum value of the network diameter. The two main advantages of AODV are its reactive nature, which reduces the routing overhead in the network and the use of destination sequence numbers that address routing loops and the “count to infinity” problem. However, control message overhead can be introduced when every intermediate node originates ~ 17 ~
  • 18. 1.5.2.1 AD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL a RREP message, to satisfy a route discovery request if it has a valid route to the destination, causing a RREP messages “storm”. Another disadvantage of AODV is that the propagation of periodic HELLO messages from a node, to maintain connectivity with its neighbouring nodes, will lead to bandwidth consumption. In conclusion, the simple design, the low routing overhead and the ring searching technique make AODV an attractive solution for networks in which the available bandwidth is limited and nodes can form organized groups. Security weaknesses can be addressed by either modifying the protocol with the proposed security extensions, or by applying security mechanisms at the lower layers. The advantage with AODV compared to classical routing protocols like distance vector and link-state is that AODV has greatly reduced the number of routing messages in the network. AODV achieves this by using a reactive approach. This is probably necessary in an ad-hoc network to get reasonably performance when the topology is changing often. AODV is also routing in the more traditional sense compared to for instance source routing based proposals like DSR. The advantage with a more traditional routing protocol in an ad-hoc network is that connections from the ad-hoc network to a wired network like the Internet is most likely easier. The sequence numbers that AODV uses represents the freshness of a route and is increased when something happens in the surrounding area. The sequence prevents loops from being formed, but can however also be the cause for new problems. What happens for instance when the sequence numbers no longer are synchronized in the network. This can happen when the network becomes partitioned, or the sequence numbers wrap around. AODV only support one route for each destination. It should however be fairly easy to modify AODV, so that it supports several routes per destination. Instead of requesting a new route when an old route becomes invalid, the next stored route to that destination could be tried. The probability for that route to still be valid should be rather high. Although the Triggered Route Replies are reduced in number by only sending the Triggered Route Replies to affected senders, they need to traverse the whole way from the failure to the senders. This distance can be quite high in numbers of hops. AODV sends one Triggered RREP for every active neighbor in the active neighbor list for all entries that have been affected of a link failure. This can mean that each active neighbor can receive several triggered RREPs informing about the same link failure, but for d ifferent destinations, if a large fraction of the network traffic is routed through the same node and this node goes down. An ~ 18 ~
  • 19. 1.5.2.2 DYNAMIC SOURCE ROUTING - DSR aggregated solution would be more appropriate here. AODV uses hello messages at the IP- level. This means that AODV does not need support from the link layer to work properly. It is however questionable if this kind of protocol can operate with good performance without support from the link layer. The hello messages add a significant overhead to the protocol. AODV does not support unidirectional links. When a node receives a RREQ, it will setup a reverse route to the source by using the node that forwarded the RREQ as next hop. This means that the route reply, in most cases is unicasted back the same way as the route request used. Unidirectional link support would make it possible to utilize all links and not only the bi-directional links. It is however questionable if unidirectional links are desirable in a real environment. The acknowledgements in the MAC protocol IEEE 802.11 would for instance not work with unidirectional links. 1.5.2.2 Dynamic Source Routing - DSR Dynamic Source Routing belongs to the class of reactive protocols and allows nodes to dynamically discover a route across multiple network hops to any destination. Source routing means that each packet in its header carries the complete ordered list of nodes through which the packet must pass. DSR uses no periodic routing messages (e.g. no router advertisements), thereby reducing network bandwidth overhead, conserving battery power and avoiding large routing updates throughout the ad-hoc network. Instead DSR relies on support from the MAC layer (the MAC layer should inform the routing protocol about link failures). The two basic modes of operation in DSR are route discovery and route maintenance. Route discovery is the mechanism whereby a node X wishing to send a packet to Y, obtains the source route to Y. Node X requests a route by broadcasting a Route Request (RREQ) packet. Every node receiving this RREQ searches through its route cache for a route to the requested destination. DSR stores all known routes in its route cache. If no route is found, it forwards the RREQ further and adds its own address to the recorded hop sequence. This request propagates through the network until either the destination or a node with a route to the destination is reached. When this happen a Route Reply (RREP) is unicasted back to the originator. This RREP packet contains the sequence of network hops through which it may reach the target. In Route Discovery, a node first sends a RREQ with the maximum propagation limit (hop limit) set to zero, prohibiting its neighbors from rebroadcasting it. At the cost of a single broadcast packet, t his ~ 19 ~
  • 20. 1.5.2.2 DYNAMIC SOURCE ROUTING - DSR mechanism allows a node to query the route caches of all its neighbors. Nodes can also operate their network interface in promiscuous mode, disabling the interface address filtering and causing the network protocol to receive all packets that the interface overhears. These packets are scanned for useful source routes or route error messages and then discarded. The route back to the originator can be retrieved in several ways. The simplest way is to reverse the hop record in the packet. However this assumes symmetrical links. To deal with this, DSR checks the route cache of the replying node. If a route is found, it is used instead. Another way is to piggyback the reply on a RREQ targeted at the originator. This means that DSR can compute correct routes in the presence of asymmetric (unidirectional) links. Once a route is found, it is stored in the cache with a time stamp and the route maintenance phase begins. Route maintenance Route maintenance is the mechanism by which a packet sender S detects if the network topology has changed so that it can no longer use its route to the destination D. This might happen because a host listed in a source route, move out of wireless transmission range or is turned off making the route unusable. A failed link is detected by either actively monitoring acknowledgements or passively by running in promiscuous mode, overhearing that a packet is forwarded by a neighboring node. When route maintenance detects a problem with a route in use, a route error packet is sent back to the source node. When this error packet is received, the hop in error is removed from this hosts route cache, and all routes that contain this hop are truncated at this point. DSR uses the key advantage of source routing. Intermediate nodes do not need to maintain up-to-date routing information in order to route the packets they forward. There is also no need for periodic routing advertisement messages, which will lead to reduce network bandwidth overhead, particularly during periods when little or no significant host movement is taking place. Battery power is also conserved on the mobile hosts, both by not sending the advertisements and by not needing to receive them; a host could go down to sleep instead. This protocol has the advantage of learning routes by scanning for information in packets that are received. However, each packet carries a slight overhead containing the source route of the packet. This overhead grows when the packet has to go through more hops to reach the destination. So the packets sent will be slightly bigger, because of the overhead. Running the interfaces in promiscuous mode is a serious security issue. Since the address filtering of the interface is turned off and all packets are scanned for information. A potential intruder could listen to all packets and scan them for useful information such as ~ 20 ~
  • 21. 1.5.2.3 Comparison of Reactive Routing Protocols Based on Qualitative Metrics passwords and credit card numbers. Applications have to provide the security by encrypting their data packets before transmission. The routing protocols are prime targets for impersonation attacks and must therefore also be encrypted. One way to achieve this is to use IP-sec. DSR also has support for unidirectional links by the use of piggybacking the source route a new request. This can increase the performance in scenarios where we have a lot of unidirectional links. We must however have a MAC protocol that also supports this. 1.5.2.3 Comparison of Reactive Routing Protocols Based on Qualitative Metrics All the above reactive protocols are loop-free. None addresses security vulnerabilities that exist in a wireless ad-hoc network. However, there are certain proposals for providing secure routing at Layer 3 for all the above protocols. Although security is a major concern in communications, we find that the proposed security mechanisms will increase processing time, power consumption, and latency. Note that reactive routing protocols already suffer from high latency in the network. Only DSR in its current state, without any modification, can support both bidirectional and unidirectional links. However, DSR will introduce high routing overhead as routing information is stored at the data packets’ header. Thus, DSR will not scale well in large networks if communicating nodes are located at opposite edges of the network. None of the three protocols supports the “sleep mode,” another important factor for power preservation, especially in battery-powered mobile nodes. AODV will consume more power than DSR due to the exchange of periodic HELO messages. Only AODV supports multicasting, another important attribute of a routing protocol. None of these protocols depends on any kind of node with special or crucial tasks. All nodes in the network have the same tasks and play the same role in the routing process. This is important, because the lack of “critical” nodes guarantees the inexistence of any single point of failure in the network. Finally, given qualitative metrics and the attributes of the three protocols, we suggest that AODV and DSR would be good candidates for the routing protocol in tactical mobile ad-hoc wireless networks. Therefore, we choose both AODV and DSR for further evaluation in our simulation. ~ 21 ~
  • 22. 1.5.3 HYBRID ROUTING PROTOCOLS Table 1.5 Comparison of Reactive protocols. Qualitative Metrics AODV DSR Loop Free Yes Yes Reactive Behaviour Yes Yes Security No No Support for No No Unidirectional Links Sleep Mode No No Multicasting Yes No Routing scheme Flat Flat Nodes with special tasks No No Routing Metric Shortest Path Shortest Path 1.5.3 Hybrid Routing Protocols Hybrid routing protocols are designed to combine the benefits of both proactive as well as reactive routing protocols and aims at achieving best performance with least degradation in the network. The hybrid routing protocols used for mobile ad-hoc network are: 1.5.3.1 Zone Routing Protocol (ZRP) Zone Routing Protocol is a distributed routing protocol that combines both a proactive and a reactive scheme for route discovery and maintenance. The basic idea of the protocol is the creation of areas, or zones, where every node proactively maintains one route or multiple routes to any destination inside the zone and reactively obtains routing information for any node outside of the zone. The zone diameter may be defined in advance, before nodes form the network, or it may be optimized by every node, based on ZRP traffic measurements. The radius of a node’s zone plays a significant role in the proper behaviour of the protocol. If the network consists of a large number of nodes with medium to low mobility or the demand for routes is high, a large value for the radius is preferable to avoid the frequent dissemination of routing requests and reply messages. On the other hand, if the network consists of a small number of nodes with high mobility or the demand for routes is small, the radius value should also be small to avoid overhead of periodic routing update messages. ZRP consists of two main protocols. The Intrazone Routing Protocol (IARP) is responsible for finding and maintaining valid routes in the internal zones between any source/destination pair at all times. Any proactive routing protocol that we studied in the previous sections, such as DSDV, can be used as the ZRP IARP. The Interzone Routing Protocol (IERP) is responsible for finding any available route outside of the ~ 22 ~
  • 23. 1.5.3.1 ZONE ROUTING PROTOCOL (ZRP) node’s internal zone. The scope behind this implementation is to reduce routing overhead and delay and to respond better in the topological changes of the network. ZRP is a loop- free protocol and provides support for unidirectional links, hierarchical routing, and interconnection with other non-ZRP routing domains when every node’s network interface is assigned a unique IP address. The route discovery process in ZRP depends on the location of the destination node. If the destination node is located inside the source node’s intra zone, the protocol acts like any other proactive protocol, thus ensuring that there is always a route to any destination in the intra zone. When the destination node is located outside of the source’s intra zone, the source node initiates a route discovery process and the IERP is assigned to accomplish this task. To avoid large-scaled dissemination of routing request messages ZRP employs a third protocol, the Border cast Resolution Protocol (BRP) which is a sub- layer of the IERP protocol. The BRP identifies the nodes that are located in the source node’s zone perimeter and forwards the route request messages only to those peripheral nodes. There is a possibility of collisions when multiple nodes transmit the RREP messages back to the source. However, the border-casting scheme minimizes the propagation of RREQ messages within a small region, except when the source/destination pair is located at opposite edges of the network. When a peripheral node does not have a route to the destination node, it originates a RREQ message and border-casts the message to its peripheral nodes. That procedure continues until a route to the destination is found. Route maintenance takes place when a node in an active route detects a link failure in the route: the node employs a local reconfiguration of the path by searching for an alternate route to the destination. If such a route exists, the node originates an update message to inform all other nodes in the path and the source node of a change in the path. The source node may continue sending data packets in the new non-optimized route. If the source node wants to obtain a new optimal route, it regenerates a RREQ message, as previously discussed. ZRP does not employ any security mechanisms to ensure secure routing. However, any security mechanisms that have been proposed for other routing protocols can be applied to ZRP as well. Every node in the network can be in a promiscuous mode, overhearing transmissions from its neighbours and gathering statistical data on its neighbour’s behaviour. Again, in this case, there is a trade-off between processing time, latency, and security. ZRP seems to employ the best characteristics of both reactive and proactive protocols. It avoids flooding the network ~ 23 ~
  • 24. 1.5.3.2 GREEDY PERIMETER STATELESS ROUTING (GPSR) with large-scaled Route Request messages, as reactive protocols do, and the periodic exchange of HELLO messages in the proactive scheme. Thus, ZRP reduces routing overhead in an inexpensive way. The only visible drawback of the protocol is, perhaps, that its performance depends heavily on the zone radius. For tactical communications, however, the zone radius can be set up in advance, before the establishment of the network, as the data traffic, the estimated velocity of the nodes, and the number of the nodes in the network is known prior. 1.5.3.2 Greedy Perimeter Stateless Routing (GPSR) Greedy Perimeter Stateless Routing is a hybrid protocol whose functionality depends on knowledge of the geographic location of the nodes in network. That knowledge can be obtained by integrating a GPS device into the communication device or by other available means. Every node in the network must know its own location and the location of its neighbouring nodes. Thus, every node periodically broadcasts its address and its location in x and y coordinates to all of its neighbouring nodes. Data-packet forwarding decisions are based on the locations of both the source and the destination node. An address-to-location look-up algorithm is implemented to map a node address to its location. A periodic exchange of beacons, which encapsulate the node address and location, is similar to the behaviour of proactive protocols. The absence of any periodic route table information is closer to the philosophy of reactive protocols. GPSR employs two algorithms to forward data packets from a source to a destination node: the greedy forwarding algorithm and the perimeter forwarding, algorithm. The objective of the protocol’s design is to minimize routing overhead and increase the packet delivery ratio in a network, by effectively responding to network topology changes without the dissemination of large scaled control messages. GPSR makes use only of bidirectional links between a node and its neighbours and does not support hierarchical routing. In most cases, GPSR uses greedy forwarding for data packet delivery from a source or any intermediate node to the next node. The greedy forwarding algorithm needs to know the locations of a node’s neighbours and the location of the destination node. According to this algorithm, the next-hop decision is based on the distance between the next node and the destination node. ~ 24 ~
  • 25. 1.5.3.2 GREEDY PERIMETER STATELESS ROUTING (GPSR) Figure 1.6 Greedy Forwarding in GPSR Each node forwards data packets to the next node that has the shortest distance to the destination node amongst other nodes in the node’s “neighbourhood”. We define a node’s “neighbourhood” as the nodes within transmission range of a node. Figure 1.12 shows greedy forwarding in GPSR. The curved dotted lines denote a node’s transmission range. However, greedy forwarding does not cover a case in which the distance between an intermediate node and the destination is the lowest as compared to distances from the intermediate node’s neighbours and the destination node. The shorter-distance neighbour then uses greedy forwarding to forward the data packet to the destination. However, there is always a possibility in mobile wireless networks that a destination node will be unreachable by any other node in the network. In that case, the data packet travels around the perimeter trying to find a path to the destination. If a path does not exist, the perimeter-forwarding algorithm never allows the packet to travel twice across the same link in the same direction. If a node “sees” that the only possible way to forward a data packet is to use a previous link toward the same direction, it drops the packet. This function ensures the loop- free behaviour of the protocol. GPSR does not address any security vulnerabilities that exist in a mobile wireless network. Any attack on the location- finding algorithm will have severe consequences for the protocol’s performance because the proper behaviour of the protocol is built on its knowledge of the location of destination nodes. GPSR presents ~ 25 ~
  • 26. 1.5.3.3 COMPARISON OF HYBRID PROTOCOLS BASED ON QUALITATIVE METRICS certain advantages over other protocols we have studied. First, it does not use any type of control messages, such as route requests and error messages. Second, it does not flood the network with any other type of control messages, except those between a node and its neighbours, for location- finding purposes. Perhaps the only visible drawback of GPSR is its dependence on “external” devices, such as GPS, that increase the implementation cost. For tactical implementation, this cost may be affordable. Any malfunction of the GPS device will degrade the protocol’s performance and may lead to network crash. 1.5.3.3 Comparison of Hybrid Protocols Based on Qualitative Metrics Both ZRP and GPSR are loop- free protocols. ZRP ensures loop- free “behaviour” by employing loop- free protocols inside inter and intra-zones. On the other hand, GPSR’s perimeter- forwarding algorithm never allows a packet to travel twice across the same link toward the same direction. ZRP’s proactive behaviour is more obvious than that of GPSR, in which nodes broadcast periodic beacons to their neighbours for location-update purposes. ZRP seems to present higher routing overhead depending on the zone radius. ZRP behaves like any other proactive protocol for the large value of this radius. However, one can optimize the value of the zone radius to meet the needs of the wireless network. If low latency is the main concern, reflecting lower data rates, the zone radius value should be high at least a zone_radius >1. None of the above protocols addresses the security vulnerabilities of wireless networks. A possible solution is again monitoring the behaviour of the nodes in the network, or employing security mechanisms at the link or physical Layers. GPSR seems to be more vulnerable than ZRP, as GPRS functionality is built on accurate location advertisements by the nodes in the network. Any malfunction of the GPS devices will degrade the protocol’s performance. Only ZRP provides support for unidirectional links, hierarchical routing, and interconnection with other non-ZRP routing domains. These are important attributes for a routing protocol for MANETs as they provide the means for extending an existing network with MANET technology, or interconnecting a MANET with other mobile and fixed networks. As for the “sleep mode” operation, none of these protocols directly supports such an operation. The ZRP ‘‘sleep mode” depends on the routing protocols that operate in the intra and inter zones. If OLSR is the routing protocol for the intra-zones, then ZRP can at least partially support this mode. GPSR does not support multicasting. Routing decisions ~ 26 ~
  • 27. 1.6 SECURITY OF MOBILE ADHOC NETWORK are solely based on the location of the destination node. On the other hand, ZRP depends on the “underlying” routing protocols within the inter and intra-zones. Table 1.6 Comparison of Hybrid Routing Protocols Qualitative Metrics ZRP GPSR ~ 27 ~ Loop Free Yes Yes Security No No Support for Unidirectional Links Yes Yes Sleep Mode Partly No Multicasting Partly No Routing scheme Flat and hierarchical Flat Nodes with special tasks No No Routing Metric Shortest path Shortest path 1.6 SECURITY OF MOBILE ADHOC NETWORK In a MANET, a collection of mobile hosts with wireless network interfaces form a temporary network without the aid of any fixed infrastructure or centralized administration. Without some form of network- level or link-layer security, a MANET routing protocol is vulnerable to many forms of attack. It may be relatively simple to snoop network traffic, replay transmissions, manipulate packet headers, and redirect routing messages, within a wireless network without appropriate security provisions. While these concerns exist within wired infrastructures and routing protocols as well, maintaining the "physical" security of the transmission media is harder in practice with MANETs. Sufficient security protection to prohibit disruption of modification of protocol operation is desired. The success MANET strongly depends on whether its security can be trusted. However, the characteristics of MANET pose the challenges and opportunities in achieving the security goals. We have a variety of attacks that target the weakness of MANET. For example, the
  • 28. 1.6.1 ATTACKS ON MOBILE AD-HOC NETWORK routing messages are an essential component of mobile network communications. There is possibility that the intermediate node (malicious node) attacks can target the routing discovery or maintenance phase by not following the specifications of the routing protocols. There are also some attacks that target some particular routing protocols, such as DSR, or AODV. The attacks such as Black Hole attack, Gray hole attack, Wormhole attack have been identified in various published papers. Currently routing security is one of the hottest research areas in MANET. A significant amount of research has been devoted to study security issues as well as countermeasures to various attacks in MANET. However, I believe that there is still much research work needed to be done in the area. The aim of the study is to detect the multiple Black Hole nodes using AODV protocol in MANET. The black hole node is responsible for dropping a number from packets after advertising itself as the valid path to source node. The detection of the cooperative black hole nodes will provide more security to MANET. The Route discovery and route maintenance phases in the AODV protocol will be secured more. 1.6.1 Attacks on Mobile Ad-hoc Network The attacks in mobile ad-hoc network are done in order to interrupt the communication or to steal the information. The attacks in mobile ad hoc networks can be broadly classified into two distinct categories viz. Active attacks and Passive attacks. An active attack is that attack which any data or information is inserted into the network so that information and operation may harm. It involves modification, fabrication and disruption and affects the operation of the network. Example of active attacks is impersonation, spoofing. A passive attack obtains data exchanged in the network without disturbing the communications operation. The passive attacks are difficult to detection. In its, operations are not affected. The operations supposed to be accomplished by a malicious node ignored and attempting to recover valuable data during listens to the channel. Some of the most common attacks on mobile ad-hoc networks include: 1.6.1.1 Denial of Service Attack A denial-of-service attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include ~ 28 ~
  • 29. 1.6.1.1 DENIAL OF SERVICE ATTACK  Attempts to "flood" a network, thereby preventing legitimate network traffic.  Attempts to disrupt connections between two machines, thereby preventing access ~ 29 ~ to a service.  Attempts to prevent a particular individual from accessing a service.  Attempts to disrupt service to a specific system or person. Denial-of-service attacks can essentially disable your computer or your network. Denial-of-service attacks come in a variety of forms and aim at a variety of services. There are three basic types of attack:  consumption of scarce, limited, or non-renewable resources  destruction or alteration of configuration information  physical destruction or alteration of network components Denial-of-service attacks are most frequently executed against network connectivity. The goal is to prevent hosts or networks from communicating on the network. An intruder may also be able to consume all the available bandwidth on your network by generating a large number of packets directed to your network. Typically, these packets are ICMP ECHO packets, but in principle they may be anything. Further, the intruder need not be operating from a single machine; he may be able to coordinate or co-opt several machines on different networks to achieve the same effect. In addition to network bandwidth, intruders may be able to consume other resources that your systems need in order to operate. For example, in many systems, a limited number of data structures are available to hold process information (process identifiers, process table entries, process slots, etc.). An intruder may be able to consume these data structures by writing a simple program or script that does nothing but repeatedly create copies of itself. For example, consider the following Fig. 3. Assume a shortest path exists from S to X and C and X cannot hear each other, that nodes B and C cannot hear each other, and that M is a malicious node attempting a denial of service attack. Suppose S wishes to communicate with X and that S has an unexpired route to X in its route cache. S transmits a data packet toward X with the source route S --> A --> B --> M --> C --> D --> X contained in the packet’s header. When M receives the packet, it can alter the source route in the packet’s header, such as deleting D from the source route. Consequently, when C receives the altered packet, it attempts to forward the packet to X. Since X cannot hear C, the transmission is unsuccessful.
  • 30. 1.6.1.2 WORMHOLE ATTACK Fig: 1.7 Denial of service attack ~ 30 ~ 1.6.1.2 Wormhole Attack It is a network layer attack. In wormhole attack, a malicious node receives packets at one location in the network and tunnels them to another location in the network,. Fig: 1.8 Wormhole attack
  • 31. 1.6.1.2 WORMHOLE ATTACK where these packets are resent into the network. This tunnel between two colluding attackers is referred to as a wormhole. It could be established through wired link between two colluding attackers or through a single long-range wireless link. In this form of attack the attacker may create a wormhole even for packets not addressed to itself because of broadcast nature of the radio channel. For example in Fig. 1, X and Y are two malicious nodes that encapsulate data packets and falsified the route lengths Suppose node S wishes to form a route to D and initiates route discovery. When X receives a route request from S, X encapsulates the route request and tunnels it to Y through an existing data route, in this case {X --> A --> B --> C --> Y}. When Y receives the encapsulated route request for D then it will show that it had only travelled {S --> X --> Y --> D}. Neither X nor Y update the packet header. After route discovery, the destination finds two routes from S of unequal length: one is of 4 and another is of 3. If Y tunnels the route reply back to X, S would falsely consider the path to D via X is better than the path to D via A. Thus, tunnelling can prevent honest intermediate nodes from correctly incrementing the metric used to measure path lengths. Though no harm is done if the wormhole is used properly for efficient relaying of packets, it puts the attacker in a powerful position compared to other nodes in the network, which the attacker could use in a manner that could compromise the security of the network. The wormhole attack is particularly dangerous for many ad hoc network routing protocols in which the nodes that hear a packet transmission directly from some node consider themselves to be in range of (and thus a neighbour of) that node. ~ 31 ~ 1.6.1.3 Byzantine Attack In this attack, a compromised intermediate node or a set of compromised intermediate nodes works in collusion and carries out attacks such as creating routing loops, forwarding packets on non-optimal paths and selectively dropping packets which results in disruption or degradation of the routing services. It is hard to detect byzantine failures. The network would seem to be operating normally in the viewpoint of the nodes, though it may actually be showing Byzantine behaviour.
  • 32. 1.6.1.4 BLACK HOLE ATTACK ~ 32 ~ 1.6.1.4 Black hole Attack . Fig: 1.9 Black hole attack In this attack, an attacker uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. An attacker listen the requests for routes in a flooding based protocol. When the attacker receives a request for a route to the destination node, it creates a reply consisting of an extremely short route. If the malicious reply reaches the initiating node before the reply from the actual node, a fake route gets created. Once the malicious device has been able to insert itself between the communicating nodes, it is able to do anything with the packets passing between them. It can drop the packets between them to perform a denial-of-service attack, or alternatively use its place on the route as the first step in a man-in-the-middle attack For example, in Fig. 1.9, source node S wants to send data packets to destination node D and initiates the route discovery process. We assume that node 2 is a malicious node and it claims that it has route to the destination whenever it receives route request packets, and immediately sends the response to node S. If the response from the node 2 reaches first to node S then node S thinks that the route discovery is complete, ignores all other reply messages and begins to send data packets to node 2. As a result, all packets through the malicious node is consumed or lost.
  • 33. 1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL ~ 33 ~ 1.6.1.5 Gray-hole attack This attack is also known as routing misbehavior attack. It leads to messages dropping. It has two phases. In the first phase a valid route to destination is advertise by nodes itself. In second phase, with a certain probability nodes drops intercepted packets. 1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL AODV (Ad hoc On Demand Distance Vector) is an important on-demand routing protocol that creates routes only when desired by the source node. When a node requires a route to a destination, it broadcasts a route request (RREQ) packet to its neighbors, which then forward the request to their neighbors, and so on, until either the destination or an intermediate node with a “fresh enough” route to the destination is located. Fig. 1.10 Routing Discovery Process in AODV protocol
  • 34. 1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL In this process the intermediate node can reply to the RREQ (Route Request) packet only if it has a fresh enough route to the destination. Once the RREQ (Route Request) reaches the destination or an intermediate node with a fresh enough route, the destination or intermediate node responds by unicasting a route reply (RREP) packet back to the neighbor from which it first received the RREQ (Route Request). After selecting and establishing a route, it is maintained by a route maintenance procedure until either the destination becomes inaccessible along every path from the source or the route is no longer desired. A RERR (Route Error) message is used to notify other nodes that the loss of that link has occurred. A black hole problem means that a malicious node utilizes the routing protocol to claim itself of being the shortest path to the destination node, but drops the routing packets but does not forward packets to its neighbors. Imagine a malicious node ‘M’. Fig. 1.11 Black Hole Attack in AODV protocol ~ 34 ~
  • 35. 1.7 BLACK HOLE PROBLEM IN AODV PROTOCOL When node ‘A’ broadcasts a RREQ packet, nodes ‘B’ ‘D’ and ‘M’ receive it. Node ‘M’, being a malicious node, does not check up with its routing table for the requested route to node ‘E’. Hence, it immediately sends back a RREP packet, claiming a route to the destination. Node ‘A’ receives the RREP from ‘M’ ahead of the RREP from ‘B’ and ‘D’. Node ‘A’ assumes that the route through ‘M’ is the shortest route and sends any packet to the destination through it. When the node ‘A’ sends data to ‘M’, it absorbs all the data and thus behaves like a ‘Black hole’. In AODV (Ad hoc On Demand Distance Vector), the sequence number is used to determine the freshness of routing information contained in the message from the originating node. When generating RREP (Route Request) message, a destination node compares its current sequence number, and the sequence number in the RREQ (Route Request) packet plus one, and then selects the larger one as RREPs (Route Request) sequence number. Upon receiving a number of RREP (Route Request), the source node selects the one with greatest sequence number in order to construct a route. But, in the presence of black hole when a source node broadcasts the RREQ (Route Request) message for any destination, the black hole node immediately responds with an RREP (Route Request) message that includes the highest sequence number and this message is perceived as if it is coming from the destination or from a node which has a fresh enough route to the destination. The source then starts to send out its packets to the black hole trusting that these packets will reach the destination. Thus the black hole will attract all the packets from the source and instead of forwarding those packets to the destination it will simply discard those. Thus the packets attracted by the black hole node will not reach the destination. 1.8 CONCLUDING REMARKS In this chapter, we described various aspects related to wired and wireless networks. The routing protocols for MANET have been discussed to understand the working of MANET. In the last section we describe the various security threats to MANET and it is concluded that MANET networks are an easy target from security point of view and a secure mechanism is required to protect the network from various attacks. ~ 35 ~
  • 36. LITERATURE REVIEW CHAPTER 2 LITERATURE REVIEW Mohammad Al-Shurman et. al [2004], proposed two solutions to black hole attacks prevalent in mobile ad-hoc network. The first solution is to find multiple paths to send data from source to destination. The source sends ping packets along these different routes with different packet Id’s and sequence number. The source checks the RREP’s from different routes and try to find a secure route having a hop that is shared in more than one route to the destination. This method ensures secure route to destination but at the expense of the time delay caused due to waiting for another RREP from an alternate route. The second method explores the possibility of using the sequence number for identifying the fake replies from genuine replies. In this, two additional tables are used to record sequence number of last sent packet and last received packet. These tables are updated whenever a packet is sent or received and the destination node sends RREP packet along with last packet sequence number. This solution ensures faster delivery of packets. First solution is more secure but delay is large while the second solution is quick in delivering the packets but a malicious node can listen to the channel and can update its tables for the last sequence number. Jeroen Hoebeke Et. Al [2005], discussed about application of mobile ad-hoc networks and the challenges being faced while using them. In this paper, a complete introduction has been given about the wireless networks. Moreover this paper provides an insight into the potential applications of ad-hoc networks and discusses the technological challenges being faced by network and protocol designers. Most prominent of the challenges are routing, resource and service discovery and security. Different attacks pertaining to security are deletion, fabrication, replication and redirection of data packets. But despite challenges, mobile ad-hoc network opens a new business opportunity for service providers. Giovanni Vigna et. Al [2005], demonstrated an effective intrusion detection tool that can be used to for detecting attacks in mobile ad-hoc network while using limited ~ 36 ~
  • 37. LITERATURE REVIEW amount of resources. The tool monitors network packets to detect attacks within its range. This tool is based on State Transition Analysis Technique (STAT). AODVSTAT sensors can be used in standalone mode to detect attacks in neighborhood only or distributed mode, in which update messages are exchanged between sensors to detect attacks in distributed manner. This scheme works well for detecting both single hop as well as distributed attacks in mobile ad-hoc networks while imposing a very small overhead on nodes. Mehdi Medadian et. al [2009], proposed a novel approach for countering the black hole attack. The approach is based on using negotiations with neighbors who claim to have a route to destination. In this approach, any node uses a set of rules to decide the honesty of the reply’s sender. During packet transferring, the activities of a node are logged by its neighbors. These neighbors send their opinion about a node. When a node receives replies from all neighbors, it is able to decide whether the replier is a malicious node or a legitimate node. The opinion send by neighbors is based on the number of packets sent to a particular node and number of packets forwarded by it. The method yields better percentage of packets received in presence of cooperative black hole attack. Payal N. Raj and Prashant B. Swadas [2009], proposed DPRAODV (detection, prevention and reactive AODV) to prevent the black hole attack by informing the other nodes about the malicious node. As the value of RREP sequence number is found to be higher than the threshold value, the node is suspected to be malicious and it adds the node to the black list. As the node detected an anomaly, it sends a new control packet, ALARM to its neighbors. The ALARM packet has the black list node as a parameter so that, the neighboring nodes know that RREP packet from the node is to be discarded. Further, if any node receives the RREP packet, it looks over the list, if the reply is from the blacklisted node; no processing is done for the same. The threshold value is the average of the difference of destination sequence number in each time slot between the sequence number in the routing table and the RREP packet. The purposed solution not only detects the black hole attack, but tries to prevent it further, by updating threshold which reflects the real changing environment. Other nodes are also updated about the malicious act by an ALARM packet, and they react to it by isolating the malicious node from network. ~ 37 ~
  • 38. LITERATURE REVIEW Songbai Lu et. al [2009], proposed a method that is effective and secure against the black hole attack in mobile ad-hoc network. This method is works on the basis of direct verification of the destination node using random number exchange. In this method, the source node sends verification packet SRREQ (Secure Route Request) to destination node along opposite direction route of RREP (Route Reply) received while the verification packet contains random number. This packet is forwarded using different routing paths. At the destination end, upon receiving two or more SRREQ (Secure Route Request) packets, their contents are checked. If content are same, verification confirm packet SRREP (Secure Route Reply) is sent to source along different routing paths. On the source end, upon receiving two or more SRREP (Secure Route Reply) packets, their contents are checked for match. If they match, the route is added to the routing table and warning message regarding malicious nodes, is propagated throughout the network. This scheme can effectively prevent black hole attack and also maintain a high routing efficiency. Harris Simaremare and Riri Fitri Sari [2011], proposed two different approaches viz. AODV-UI (based on reverse request method) and PHR-AODV (Path Hoping on Reverse AODV) and subjected these approaches to various attacks faced by mobile ad-hoc networks. These approaches aim at improving performance as well as security and various metrics viz. packet delivery ratio, end to end delay and packet lost, are used. AODV-UI method works like AODV but with an exception that if one route is lost, route discovery process is not started. Rather the alternate route found earlier in route discovery is selected. This enhances the performance as there is no need to search for routes again and again. PHR-AODV method determines multipath for sending data to destination and checks whether the path is broken or not. If broken, path is deleted from the list and new path is selected. AODV-UI performs better in terms of packets lost, end to end delay and packet delivery ratio. But in presence of black hole nodes, PHR-AODV performs better. Praveen Joshi [2011], discussed security concerns in routing protocols in MANET (Mobile Ad hoc Network). In this paper, elaborate study has been done on the various attacks encountered in mobile ad hoc network and the protocols used for this type of network. The various routing protocols used can be broadly classified into proactive and reactive routing protocols. The attacks associated with ad hoc routing ~ 38 ~
  • 39. LITERATURE REVIEW protocols can be dynamic topology of ad hoc networks, noise and signal interference with wireless channel, and implicit trust relationships between neighbors. Cryptography, authentication, digital signatures can be used to prevent malicious attacks. Moreover intrusion detection systems and cooperation enforcement mechanisms can be used for this purpose. This paper provides an insight into the various attacks and the counter mechanisms employed against the malicious attacks. Priyanka Goyal et. Al [2011], describes the elementary problems of ad hoc network by providing its background. The most common challenges involved are limited bandwidth, less computational and battery power and security. It presents an overview of the routing protocols being used and their issues. Moreover desired security goals such as availability, confidentiality, integrity, authorization etc. have been discussed. The general trend is towards mesh architecture and improvements to be made to capacity and bandwidth. Thus it ensures smaller, cheaper and more capable ad-hoc networks. Sunil Tane ja et. al [2011], demonstrated the performance based comparison of the two most widely used routing protocols, AODV (Ad hoc On Demand Distance Vector) & DSR (Dynamic Source Routing), used in mobile ad-hoc networks. Both these protocols have their own advantages. DSR (Dynamic Source Routing) does not uses periodic routing messages like AODV (Ad hoc On Demand Distance Vector), thereby reducing network bandwidth overhead. Moreover the routes are maintained only between nodes that need to communicate. Thus route maintenance overhead is reduced. AODV (Ad hoc On Demand Distance Vector) routing protocol favors least congested route instead of the shortest route and supports both unicast and multicast communication. Despite these benefits, AODV (Ad hoc On Demand Distance Vector) is better performer when the medium is denser. Denser mediums are the choice for a number of applications therefore AODV (Ad hoc On Demand Distance Vector) is better choice and thus enjoys a preference than DSR (Dynamic Source Routing) over mobile ad-hoc networks. A.S. Bhandare et. al [2011], discussed two routing protocols namely AODV (Ad hoc On Demand Distance Vector) & DSR (Dynamic Source Routing) and proposed a method called Intrusion Detection using Anomaly Detection to provide security ~ 39 ~
  • 40. LITERATURE REVIEW against single and multiple black hole attacks in mobile ad-hoc network. This scheme works on the principle of differentiating malicious nodes from reliable nodes by monitoring and detecting anomaly activities of an intruder based on the normal activities that are to be carried out. This scheme is based on the host based intrusion detection as there is no central control over the device that monitors traffic flow. A set of parameters viz. single hop count, maximum destination sequence number, life- long route, destination IP (Internet Protocol) address and timestamp, are used to differentiate a fake reply from a legitimate reply. This method is easy to deploy and works on the principle of self-protection. Jaydip Sen et. al [2011], proposed a novel method to defend mobile ad-hoc network against cooperative black hole attack using AODV (Ad hoc On Demand Distance Vector) routing protocol. The method used ensures reasonable throughput level in the network. The proposed algorithm uses DRI (Data Routing Information) table and cross checking mechanism to ensure security against black hole attack. The experimental results show that the proposed scheme improves the packet delivery ratio and can further be enhanced to defend mobile ad-hoc network against resource consumption attack. Pramod Kumar Singh et. al [2012], proposed a scheme that can be effective in dealing with the malicious nodes which act as black holes in MANET (Mobile Ad hoc Network). The proposed method uses promiscuous mode to detect malicious node and propagates the information of malicious node to all other nodes in the network. The source node floods a RREQ (Route Request) packet in the network and wa its for RREP (Route Reply) packet to have a new route to the destination node. If the RREP (Route Reply) is received from the intermediate node, the node receiving RREP (Route Reply) packet, switches its promiscuous mode and sends a hello message to destination. If the intermediate node forwards the message to destination, the node is safe. Otherwise the node is a malicious one. This scheme does not require extra processing power and database. Humaira Ehsan et. al [2012], elaborated various kinds of attacks in MANET and simulation of these attacks was done using ns-2 simulator. Various attacks namely black hole attack, selfish node behavior, RREQ flooding and selective forwarding ~ 40 ~
  • 41. LITERATURE REVIEW attack are used draw major inferences about the impact of these attacks on the network. If the attacker node is on the route between the source and the destination, then the malicious node would have a major role in performance degradation. Moreover, if the attacker node is in one part of the network, while the communication between source and destination takes palace in another part of the network, then the impact of the attacker node would be minimal. Fidel Thachil and K C Shet [2012], proposed a method to detect and mitigate malicious nodes from mobile ad-hoc network. The detection and mitigation of malicious nodes from the network is based on trust factor being calculated by every node for its neighboring nodes. This trust value is calculated by a ratio between the number of packet received by the node and number of packets dropped by it. Each node has a certain trust value. A threshold value is specified below which a node would be considered malicious and as a result the node will be deleted from the reliable routes and information regarding the malicious node is broadcasted throughout the network. This method works far better than pure AODV (Ad hoc On Demand Distance Vector) and ensures efficient packet delivery even in the presence of malicious nodes. Kundan Munjal et. al [2012], proposed a novel approach for detecting cooperative black hole nodes in the network and propagating information regarding malicious nodes throughout the network. For experimentation, three different scenarios are tested. In first, no malicious node is present, so the route is considered reliable for sending data. In second case, two cooperating malicious nodes are detected and information regarding them is propagated throughout the network. In third case, on finding a node to be reliable, information regarding its reliability is spread through the network. The proposed network works well in all scenarios and achieves success against black hole attack. Thus it ensures reliable route from source to destination. But the algorithm requires improvements in end-to-end delay as well as routing overhead. Rutvij H. Jhaveri et. al [2012], proposed a novel approach of using intermediate nodes to find and isolate malicious nodes based on the sequence number. In AODV, the RREP packets are sent back to source node in reverse path through which RREQ ~ 41 ~
  • 42. LITERATURE REVIEW packet was received by destination node. If sequence number is higher in the table of the node, packet is accepted otherwise discarded. But in the proposed method, apart from checking the sequence number from RREP packet received, a PEAK value is calculated by intermediate node using parameters viz. routing table sequence number, RREP sequence number and number of replies during a time interval. Maximum possible value of sequence number is the PEAK value and if a RREP packet received has a sequence number higher than the PEAK value, the packet is labeled “don’t consider” and forwarded along the reverse path. In this way, the malicious node is detected as well as other nodes are informed about this node. So this node is not considered while selecting a route to the destination. Nidhi Sharma & Alok Sharma [2012], presented a couple of solutions that can be used as a strategy against the black hole attack in MANET (Mobile Ad hoc Network). First solution is to have multiple routes to destination and unicast ping packet to destination using multiple routes (assigning different packet ID’s and sequence number). Upon checking the replies received from different routes, decision is made regarding the selection of a route for communication. In the second approach, sequence number is used for the verification of legitimate node. Two extra tables are maintained to record sequence number of the forwarded packets and sequence number of the received packets. If there is a mismatch between sequence number of received RREP (Route Reply) and the sequence number of the table, the route discovery process is started while alarming the whole network about the node. The scheme does not add overhead as sequence number itself is included in every packet in base protocol. Gundeep Singh Bindra et. al [2012], proposed a novel solution of maintaining an Extended Data Routing Information (EDRI) table at each node, for detection of cooperating black hole and gray hole nodes. This scheme also focuses on node’s previous malicious instances and renew packet, further request & reply packets are used apart from the RREQ & RREP packets. The EDRI table considers the gray behavior of nodes and a counter is used to keep track of how many times a node has been caught. This not only ensures safety against black hole nodes but also gray behavior nodes. The only limitation is that only consecutive cooperating black hole nodes can be identified using this scheme. ~ 42 ~
  • 43. LITERATURE REVIEW M. Jhansi et. al [2012], proposed a new method of detecting cooperative black hole attack in MANET. This method uses extra bits of information to store the information regarding the number of packets received by a node and the number of packets further transferred by it. Two bits are used. 1st bit “first” stands for information on routing data packet from the node while the second bit “through” stands for information on routing data packet through the node. Moreover a cross check is done on the intermediate node generating RREP (Route Reply) by making it to provide its next hop node and its DRI (Data Routing Information) table. The DRI entry is checked by source node and data is routed depending on a positive match. Otherwise FRq (Further request) message is send to NHN (Next Hop Node) to check the reliability of the intermediate node. This method can be applied to identify multiple black hole nodes cooperating with each other and to discover secure paths from source to destination. Vaishali Mohite & Lata Ragha [2012], implemented a novel method to find a secure route from source to destination by avoiding cooperative malicious nodes. This method uses data routing information and two additional tables namely RRT (Receiving Record Table) & SRT (Self Record Table). These additional tables hold information regarding the node that sent the reply packet and the information about the current node to be sent to the node that sent the packet respectively. These tables are helpful in keeping the history of the packets sent/received at each node so as to make detection of an inside attacker easier. This method proves out to be effective against cooperative attacks. Meenakshi Patel & Sanjay Sharma [2013], projected a novel automatic security mechanism using SVM (Support Vector Machine) to defend against malicious attack occurring in AODV (Ad hoc On Demand Distance Vector). This method uses three metrics viz. Packet Delivery Rate (PDR), Packet Modification Rate (PMR) and Packet Misroute Rate (PMISR), to decide the behavior of a node. The information required by the metrics is gathered from all the nodes in the network. These metrics are checked against a threshold, below which the node is considered malicious. The projected scheme is simple and provides fast and quick response to suspicious or compromised node. ~ 43 ~
  • 44. LITERATURE REVIEW Jaspal Kumar et. al [2013], analyzed the effect of black hole attack on the routing protocols and have used AODV (Ad hoc On Demand Distance Vector) and Improved AODV (Ad hoc On Demand Distance Vector) protocol. IAODV (Improved Ad hoc On Demand Distance Vector) supports multipath where route discovery is necessary only when all routes expire whereas in case of AODV (Ad hoc On Demand Distance Vector), route discovery starts as RERR (Route Error) message is received from the only route being used for transmission. IAODV (Improved Ad hoc On Demand Distance Vector) falls into hybrid category of routing protocol whereas AODV (Ad hoc On Demand Distance Vector) is a reactive routing protocol. Experimental results show that IAODV (Improved Ad hoc On Demand Distance Vector) is less affected by black hole attack than AODV (Ad hoc On Demand Distance Vector). Moreover packet delivery ratio of IAODV (Improved Ad hoc On Demand Distance Vector) is improved at an increased routing overhead which can be avoided considering that tackling black hole attack in the network, is a challenging task. Rutvij H. Jhaveri [2013], presented a method to avoid malicious nodes from participating in the information exchange between two nodes and also reducing the network load. This method works on R-AODV (Reverse AODV), which states that a , a PEAK value is calculated by intermediate node using parameters viz. routing table sequence number, RREP sequence number and number of replies during a time interval. Maximum possible value acceptable as a sequence number is the PEAK value and if a RREP packet received has a sequence number higher than the PEAK value, the packet is simply discarded. In this way, only genuine RREP are received at the source. Thus it reduces the network traffic. This method increases the packet delivery ratio with acceptable routing overhead. Sisily Sibichen et. al [2013], demonstrated the use of authentication keys in providing security in mobile adhoc networks. Moreover the proposed method makes use of the spanning tree to allow the communication between member nodes of the network. In this method, each of the node has its own certificate and this certificate is signed by trusted third party. This certificate is the basis of all the communication between the nodes as the receiving nodes checks this certificate for authenticity before forwarding the received packet. Once the certificates are exchanged, the nodes start exchanging secret keys which are used for the encryption and decryption of the messages. This ~ 44 ~
  • 45. LITERATURE REVIEW method not only makes the communication between nodes secure but also results in increase in throughput and Packet Delivery Ratio (PDR). Sanjay K. Dhurandhe r et. al [2013], analyzed the most common problem with MANET viz. black hole attack and proposed a modified GAODV protocol to be used as a countermeasure against black hole attack as well as gray hole attack. This technique uses two extra packets namely check confirm and reply confirm, to find a secure route from source to destination node. When reply from an intermediate node is received, it is checked whether the sending node has an entry in black hole table. If not, it sends confirm packet to destination. If intermediate node is a black hole, it discards the packet. Upon receiving the confirm packet, the des tination sends reply confirm packet to the source. If this confirm reply packet is received within a stipulated time, the source starts sending packets to the destination or stores the intermediate nodes in black hole table and rebroadcasts RREQ packets to find a route to destination. This method shows promising results in detecting collaborative black hole nodes. Also the proposed method offers 90% DDR (Data Delivery Ratio) for dynamic topology and with 0.9 times end to end delay of conventional AODV. ~ 45 ~ CONCLUDING REMARKS In this chapter various techniques defined in various papers have been discussed. The techniques employed against the black hole attack are using Data Routing Information (DRI) table, Intrusion Detection Systems, segregation based on the input from the neighbors of a node. All the papers discussed have certain merits over each other and there is a tradeoff between various metrics in each of the techniques defined in the different papers discussed.
  • 46. THEORETICAL DEVELOPMENT CHAPTER 3 THEORETICAL DEVELOPMENT 3.1 PROBLEM FORMULATION In MANET inside and outside attacks are possible, which degrade the performance of the network. In Inside attacks, a node within the network become malicious node and it launched attacks on network. In outside attacks, a malicious node which is outside the network, it becomes the member of the networks and then launches attack on network. Black hole attack is the most common active type of attack. When black hole attack is triggered in the network, throughput of the network reduces and delay increases at a steady rate. The black hole attack is even worse if the multiple black hole nodes exist in the network. A significant amount of research has been devoted to study security issues as well as countermeasures to various attacks in MANET. However, there is still much research work needed to be done in the area. The aim of the study is to detect the Black Hole attack using AODV protocol in MANET. This thesis work focuses on finding a secure route for communication by detecting and isolating all the malicious nodes in mobile Ad hoc network. The detection of the cooperative black hole nodes will provide more security and stability to MANET. ~ 46 ~ 3.2 Objectives Following are the various objectives of this research work  To study black hole attack in MANET and its consequences.  To implement a new scheme to detect malicious nodes in the network which are responsible for triggering the black hole attack in the network.  Testing the new scheme against parameters like throughput and end-to-end delay.
  • 47. THEORETICAL DEVELOPMENT 3.3 Methodology/Planning of work Figure: 3.1 Methodology used ~ 47 ~
  • 48. 5.1 SIMULATION ENVIRONMENT CHAPTER 4 SIMULATION ENVIRONMENT 4.1 SIMULATION ENVIRONMENT Simulation is the execution of a system model in time that gives information about a system being investigated. Events occur at discrete points of time. When the numbers of such events are finite, we call it discrete event. A discrete event simulator consists of a bunch of events and a central simulator object that executes these events in order. The act of simulating something generally entails representing certain key characteristics or behaviors of a selected physical or abstract system. The simulator used in this thesis work to simulate the ad-hoc routing protocols is Network Simulator 2. ~ 48 ~ 4.1.1 Network Simulator Network Simulator is the result of an ongoing effort of research and development that is administrated by researchers at Berkeley. It is a discrete event simulator targeted at Fig.4.1 Network Simulator 2
  • 49. 4.1.1 NETWORK SIMULATOR networking at networking research. NS-2 is an object-oriented, discrete event network simulator developed at UC Berkeley. It is written in C++ and OTcl (Object-Oriented Tcl) and primarily uses OTcl as command and configuration language. NS is basically written in C++, with an OTcl interpreter as a frontend. It supports a class hierarchy in C++, called Compiled hierarchy and a similar one within the OTcl interpreter, called interpreter hierarchy. There is a one-one correspondence between classes of these two hierarchies. The root of the hierarchy is Class Tcl Object. Users create new simulator objects through interpreter that are instantiated within the interpreter. The interpreted hierarchy is automatically established through methods defined in the Tcl class. User instantiated objects are mirrored through methods defined in class Tcl Object. The simulator can be viewed as doing two different things. While on one hand, detailed simulations of protocols are required, it is also required that the user is able to vary the parameters or configurations and quickly explore the changing scenarios. For the first case, we need a system programming language like C++ that efficiently handles bytes, packet headers and implement algorithms efficiently. But for the second case, iteration time is more important than the runtime of the part of the task. This is accomplished by a scripting language like Tcl. A major component of NS besides network objects is event scheduler. For example, a packet can be considered as an event with scheduled time and pointer to an object that handles an event. All the network components that need to spend some time handling packets use the event scheduler by issuing an event for a packet. A switching component or timer use event scheduler. Simulation results are usually got using files called Trace files. When the simulation is over, NS produces one or more text based output files that contain simulation data as specified in the input script.it can be viewed using a nice graphical tool called Network Animator or NAM in short. NS is mainly used for simulating local and wide area networks. It simulates a wide variety of IP networks. It implements network protocols such as TCP and UDP, traffic source behavior such as FTP, CBR and VBR, Router queue management mechanisms such as Drop tail and CBQ. The NS projects is now part of the VINT project that develops tools for simulation results display, analysis and converters that convert network topologies generated by well-known generators to NS formats. The current version of network simulator does not support mobile wireless environment. ~ 49 ~
  • 50. 4.1.1 NETWORK SIMULATOR TABLE 4.1 Simulation Parameters Parameter Value Terrain Area 800 m x 800 m Simulation Time 50 s MAC Type 802.11 Application Traffic CBR Routing Protocol AODV Data Payload 512 Bytes/Packet Pause Time 2.0 s Number of Nodes 15 Number of Sources 1 No. of Adversaries 1 to 3 Number of nodes: This parameter in the above table is used to represent number of nodes that are used for conducting the simulation. Pause time: this parameter represents the time interval for which the nodes can be paused in the network during simulation. Traffic type: Network traffic can be of two types viz. Variable Bit Rate (VBR) and Constant Bit Rate (CBR). The CBR traffic can suffer a maximum delay of T. Simulation time : Simulation time is the duration of time for which the simulation is carried out. ~ 50 ~ 4.2 Quantitative Metrics There are a number of quantitative metrics that can be used for evaluating the performance of a routing protocol for mobile wireless ad-hoc networks. In this thesis, we follow the general ideas described in RFC 2501, and we use four quantitative metrics. The packet delivery ratio and average end-to-end delay are most important for best-effort traffic. The other two qualitative metrics used in this thesis are and throughput.