SlideShare a Scribd company logo
1 of 37
Dissertation Seminar 
0n 
Implementation of Sinkhole 
Attack in DSR Protocol In MANET 
By 
Miss.Anuprita P. Gawande 
Under The Guidance Of 
Prof.Dr.D.J.Pethe
Outline : 
•Introduction
Introduction : 
What is Ad Hoc Network? 
•In Latin, ad hoc means "for this," further 
meaning "for this purpose only.” 
•All nodes are mobile and can be connected 
dynamically in an arbitrary manner. 
•No default router available. 
•Potentially every node becomes a router: must 
be able to forward traffic on behalf of others.
Working Of Ad-hoc Network:- 
Start 
Nodes send signal to find the number of other nodes within range 
Synchronizing between nodes 
Sender node send messages to receiving node 
receiving node ready 
Communication begins 
Termination Process 
Stop 
Receiving node 
Send back 
Ready signal 
Is Wait for 
sometime 
Yes No
What is mean by Mobile Ad-hoc Network? 
Mobile Ad-hoc Network is a collection of 
independent mobile nodes that can communicate to 
each other via radio waves.
• Host movement frequent 
• Topology change frequent 
A 
B 
A 
B 
• No cellular infrastructure. Multi-hop wireless links 
• Data must be routed via intermediate nodes
MANET 
• Do not need backbone infrastructure support 
• Are easy to deploy 
• Useful when infrastructure is absent, 
destroyed or impractical 
• Infrastructure may not be present in a disaster 
area or war zone
Where MANETs are used? 
• For military and rescue use. 
• Information distribution for 
meetings, seminars etc. 
• Internet / intranet hot spots in 
public transportation. 
• Localized advertising and shopping. 
• New mobile devices are invented 
constantly and used various ways.
Characteristics of MANET: 
• Dynamic topology 
• Variable capacity links 
• Energy-constrained mobile nodes 
•Weakened physical security 
• Bandwidth Constraint
MANET Features: 
• Autonomous Terminal 
• Distributed Operation 
• Multihop Routing 
• Light weight Terminal
Behavior Based Attack in MANET:- 
• Passive Attack 
• Active Attack 
• Location Based Attack 
• Denial Of Service 
• Impersonation 
• Eavesdropping 
• Sybil Attack
Why traditional routing protocols are 
not suitable for MANETs? 
• No pre-existing infrastructure. 
• No centralized administration. 
• Dynamic topologies. 
• Variable capacity links. 
• Energy-constrained nodes. 
• Limited physical security.
Types Of Protocols:-
MANET Routing Protocols 
• Reactive Protocols 
– Determine route if and when needed 
– Example: DSR (dynamic source routing) 
• Proactive Protocols 
– Traditional distributed shortest-path protocols 
– Example: DSDV (destination sequenced distance 
vector) 
• Hybrid Protocols 
– Adaptive; Combination of proactive and reactive 
– Example : ZRP (zone routing protocol)
Dynamic Source Routing (DSR): 
Source S initiates a route discovery by flooding Route 
Request (RREQ) 
Each node appends its own identifier when 
forwarding RREQ 
Destination D on receiving the first RREQ, sends a 
Route Reply (RREP) 
RREP sent on route obtained by reversing the route 
appended in RREQ 
RREP includes the route from S to D, on which RREQ 
was received by D 
S routes data using “source route” mechanism
B 
A 
S E 
F 
H 
J 
M 
D 
C 
G 
I 
K 
Z 
Y 
N 
Represents a node that has received RREQ for D from S 
L
B 
A 
S E 
F 
H 
J 
D 
C 
G 
I 
K 
Represents transmission of RREQ 
Z 
Y 
Broadcast transmission 
M 
N 
L 
[S] 
[X,Y] Represents list of identifiers appended to RREQ
B 
A 
S E 
F 
H 
J 
M 
D 
C 
G 
I 
K 
Z 
Y 
• Node H receives packet RREQ from two neighbors: 
potential for collision 
N 
L 
[S,E] 
[S,C]
B 
A 
S E 
F 
H 
J 
Z 
M 
D 
C 
G 
I 
K 
Y 
N 
• Node C receives RREQ from G and H, but does not forward 
it again, because node C has already forwarded RREQ once 
L 
[S,C,G] 
[S,E,F]
B 
A 
S E 
F 
H 
[S,E,F,J] 
J 
D 
C 
G 
I 
K 
Z 
Y 
M 
• Nodes J and K both broadcast RREQ to node D 
• Since nodes J and K are hidden from each other, their 
transmissions may collide 
N 
L 
[S,C,G,K]
B 
A 
S E 
F 
H 
J 
D 
C 
G 
I 
K 
Z 
Y 
• Node D does not forward RREQ, because node D 
is the intended target of the route discovery 
M 
N 
L 
[S,E,F,J,M]
B 
A 
S E 
F 
H 
J 
D 
C 
G 
I 
K 
Z 
Y 
M 
N 
L 
RREP [S,E,F,J,D] 
Represents RREP control message
B 
A 
S E 
F 
H 
J 
D 
C 
G 
I 
K 
Z 
Y 
M 
N 
L 
DATA [S,E,F,J,D] 
Packet header size grows with route length
B 
A 
S E 
F 
H 
J 
D 
C 
G 
I 
K 
Z 
Y 
M 
N 
L 
RERR [J-D] 
J sends a route error to S along route J-F-E-S when its 
attempt to forward the data packet S (with route SEFJD) on 
J-D fails
 Each node caches a new route it learns by any 
means 
 When node S finds route [S,E,F,J,D] to node D, 
node S also learns route [S,E,F] to node F 
 When node K receives Route Request [S,C,G] 
destined for node, node K learns route 
[K,G,C,S] to node S
 When node F forwards Route Reply RREP 
[S,E,F,J,D], node F learns route [F,J,D] to node D 
 When node E forwards Data [S,E,F,J,D] it learns 
route [E,F,J,D] to node D 
 A node may also overhear Data to learn routes
B 
A 
S E 
[F,J,D],[F,E,S] 
F 
H 
J 
D 
C 
G 
I 
K 
Z 
M 
N 
L 
[S,E,F,J,D] 
[E,F,J,D] 
[C,S] 
[G,C,S] 
[J,F,E,S] 
[K,G,C,S] 
RREQ 
When Z sends a route request for C, node K 
sends back a route reply [Z,K,G,C] to Z using 
a locally cached route 
RREP
 Uses: 
 Finding alternate routes in case original route breaks 
 Route reply from intermediate nodes 
 Problems: 
 Cached routes may become invalid over time and due 
to host mobility 
 Stale caches can adversely affect performance
 Routes maintained only between nodes who 
need to communicate 
 reduces overhead of route maintenance 
 Route caching can further reduce route 
discovery overhead 
 A single route discovery may yield many routes to 
the destination, due to intermediate nodes replying 
from local caches
 Packet header size grows with route length due 
to source routing 
 Flood of route requests may potentially reach all 
nodes in the network 
 An intermediate node may send Route Reply 
using a stale cached route, thus polluting other 
caches
Analysis Of Problem: 
• MANET nodes are free to move randomly and organize 
themselves arbitrarily, thus the topology may change rapidly and 
unpredictably. 
•Because of its dynamic network topology, it is exposed to 
various network attacks including eavesdropping, selfish nodes, 
data tampering, network congestion etc. 
•When a malicious which can modify the network routing 
packets or generate enormous Artificial traffics takes part in the 
MANET, it makes network delay, energy consumption, finally 
makes the network disabled. 
• MANET routing protocols (AODV, DSR) are vulnerable to the 
attacks like Sinkhole attack, blackhole attack. 
10/12/2014 31
Sinkhole Attack: 
•Sinkhole attack tries to attract the data to itself from 
all neighboring nodes. 
•It generates the fake routing information. 
10/12/2014 Generation Of Bogus RREQ 32
•Sinkhole node attempts to draw all network traffic to itself. Thereafter it alters the 
data packet or drops the packet silently. Sinkhole attack increases network 
overhead, decreases network's life time by boosting energy consumption, finally 
destroy the network. 
•Shows the generation of the bogus RREQ packet. Sinkhole node 2 make the 
bogus RREQ which looks as if it is originated by node 0. Sequence number of 
bogus packet is 999, much higher than original source's, 6. 
10/12/2014 Bogus RREP propagation 33
Impact of Sinkhole Attack On Ad-hoc Network: 
•When there the sinkhole attack occur in Ad-hoc 
network performance of ad-hoc network get 
decreases. 
•It decreases 
•Packet Delivery Ratio. 
•End to end delay 
•Packet loss Ratio. 
10/12/2014 34
System Analysis:- 
What is ns-2? 
ns-2 stands for Network Simulator version 2. 
• ns-2: Is a discrete event simulator for networking 
research 
• Work at packet level. 
• Provide substantial support to simulate bunch of 
protocols like TCP, UDP, FTP, HTTP and DSR. 
• Simulate wired and wireless network. 
• Is primarily Unix based. 
• Use TCL as its scripting language. 
• ns-2 is a standard experiment environment in 
research community. 
10/12/2014 35
NS Environment : 
10/12/2014 36
Simulation Model: 
10/12/2014 37

More Related Content

What's hot

Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocolsRama Raman
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocolMehedi
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layerkachbourimed
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 

What's hot (20)

Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
C0331215
C0331215C0331215
C0331215
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 

Viewers also liked

Viewers also liked (6)

Ad hoc network
Ad hoc networkAd hoc network
Ad hoc network
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Hệ mật mã elgamal
Hệ mật mã elgamalHệ mật mã elgamal
Hệ mật mã elgamal
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 

Similar to implementation of sinkhole attack on DSR protocol

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptxAzmiNizar1
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 

Similar to implementation of sinkhole attack on DSR protocol (20)

Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
Mona
MonaMona
Mona
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
networking
networkingnetworking
networking
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
MANET.ppt
MANET.pptMANET.ppt
MANET.ppt
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
unit-4
unit-4 unit-4
unit-4
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

implementation of sinkhole attack on DSR protocol

  • 1. Dissertation Seminar 0n Implementation of Sinkhole Attack in DSR Protocol In MANET By Miss.Anuprita P. Gawande Under The Guidance Of Prof.Dr.D.J.Pethe
  • 3. Introduction : What is Ad Hoc Network? •In Latin, ad hoc means "for this," further meaning "for this purpose only.” •All nodes are mobile and can be connected dynamically in an arbitrary manner. •No default router available. •Potentially every node becomes a router: must be able to forward traffic on behalf of others.
  • 4. Working Of Ad-hoc Network:- Start Nodes send signal to find the number of other nodes within range Synchronizing between nodes Sender node send messages to receiving node receiving node ready Communication begins Termination Process Stop Receiving node Send back Ready signal Is Wait for sometime Yes No
  • 5. What is mean by Mobile Ad-hoc Network? Mobile Ad-hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves.
  • 6. • Host movement frequent • Topology change frequent A B A B • No cellular infrastructure. Multi-hop wireless links • Data must be routed via intermediate nodes
  • 7. MANET • Do not need backbone infrastructure support • Are easy to deploy • Useful when infrastructure is absent, destroyed or impractical • Infrastructure may not be present in a disaster area or war zone
  • 8. Where MANETs are used? • For military and rescue use. • Information distribution for meetings, seminars etc. • Internet / intranet hot spots in public transportation. • Localized advertising and shopping. • New mobile devices are invented constantly and used various ways.
  • 9. Characteristics of MANET: • Dynamic topology • Variable capacity links • Energy-constrained mobile nodes •Weakened physical security • Bandwidth Constraint
  • 10. MANET Features: • Autonomous Terminal • Distributed Operation • Multihop Routing • Light weight Terminal
  • 11. Behavior Based Attack in MANET:- • Passive Attack • Active Attack • Location Based Attack • Denial Of Service • Impersonation • Eavesdropping • Sybil Attack
  • 12. Why traditional routing protocols are not suitable for MANETs? • No pre-existing infrastructure. • No centralized administration. • Dynamic topologies. • Variable capacity links. • Energy-constrained nodes. • Limited physical security.
  • 14. MANET Routing Protocols • Reactive Protocols – Determine route if and when needed – Example: DSR (dynamic source routing) • Proactive Protocols – Traditional distributed shortest-path protocols – Example: DSDV (destination sequenced distance vector) • Hybrid Protocols – Adaptive; Combination of proactive and reactive – Example : ZRP (zone routing protocol)
  • 15. Dynamic Source Routing (DSR): Source S initiates a route discovery by flooding Route Request (RREQ) Each node appends its own identifier when forwarding RREQ Destination D on receiving the first RREQ, sends a Route Reply (RREP) RREP sent on route obtained by reversing the route appended in RREQ RREP includes the route from S to D, on which RREQ was received by D S routes data using “source route” mechanism
  • 16. B A S E F H J M D C G I K Z Y N Represents a node that has received RREQ for D from S L
  • 17. B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ
  • 18. B A S E F H J M D C G I K Z Y • Node H receives packet RREQ from two neighbors: potential for collision N L [S,E] [S,C]
  • 19. B A S E F H J Z M D C G I K Y N • Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once L [S,C,G] [S,E,F]
  • 20. B A S E F H [S,E,F,J] J D C G I K Z Y M • Nodes J and K both broadcast RREQ to node D • Since nodes J and K are hidden from each other, their transmissions may collide N L [S,C,G,K]
  • 21. B A S E F H J D C G I K Z Y • Node D does not forward RREQ, because node D is the intended target of the route discovery M N L [S,E,F,J,M]
  • 22. B A S E F H J D C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message
  • 23. B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length
  • 24. B A S E F H J D C G I K Z Y M N L RERR [J-D] J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails
  • 25.  Each node caches a new route it learns by any means  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S
  • 26.  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also overhear Data to learn routes
  • 27. B A S E [F,J,D],[F,E,S] F H J D C G I K Z M N L [S,E,F,J,D] [E,F,J,D] [C,S] [G,C,S] [J,F,E,S] [K,G,C,S] RREQ When Z sends a route request for C, node K sends back a route reply [Z,K,G,C] to Z using a locally cached route RREP
  • 28.  Uses:  Finding alternate routes in case original route breaks  Route reply from intermediate nodes  Problems:  Cached routes may become invalid over time and due to host mobility  Stale caches can adversely affect performance
  • 29.  Routes maintained only between nodes who need to communicate  reduces overhead of route maintenance  Route caching can further reduce route discovery overhead  A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches
  • 30.  Packet header size grows with route length due to source routing  Flood of route requests may potentially reach all nodes in the network  An intermediate node may send Route Reply using a stale cached route, thus polluting other caches
  • 31. Analysis Of Problem: • MANET nodes are free to move randomly and organize themselves arbitrarily, thus the topology may change rapidly and unpredictably. •Because of its dynamic network topology, it is exposed to various network attacks including eavesdropping, selfish nodes, data tampering, network congestion etc. •When a malicious which can modify the network routing packets or generate enormous Artificial traffics takes part in the MANET, it makes network delay, energy consumption, finally makes the network disabled. • MANET routing protocols (AODV, DSR) are vulnerable to the attacks like Sinkhole attack, blackhole attack. 10/12/2014 31
  • 32. Sinkhole Attack: •Sinkhole attack tries to attract the data to itself from all neighboring nodes. •It generates the fake routing information. 10/12/2014 Generation Of Bogus RREQ 32
  • 33. •Sinkhole node attempts to draw all network traffic to itself. Thereafter it alters the data packet or drops the packet silently. Sinkhole attack increases network overhead, decreases network's life time by boosting energy consumption, finally destroy the network. •Shows the generation of the bogus RREQ packet. Sinkhole node 2 make the bogus RREQ which looks as if it is originated by node 0. Sequence number of bogus packet is 999, much higher than original source's, 6. 10/12/2014 Bogus RREP propagation 33
  • 34. Impact of Sinkhole Attack On Ad-hoc Network: •When there the sinkhole attack occur in Ad-hoc network performance of ad-hoc network get decreases. •It decreases •Packet Delivery Ratio. •End to end delay •Packet loss Ratio. 10/12/2014 34
  • 35. System Analysis:- What is ns-2? ns-2 stands for Network Simulator version 2. • ns-2: Is a discrete event simulator for networking research • Work at packet level. • Provide substantial support to simulate bunch of protocols like TCP, UDP, FTP, HTTP and DSR. • Simulate wired and wireless network. • Is primarily Unix based. • Use TCL as its scripting language. • ns-2 is a standard experiment environment in research community. 10/12/2014 35
  • 36. NS Environment : 10/12/2014 36