SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 506
IMPACT ANALYSIS OF EPDA AND IPDA ATTACK WITH INCREASING
NODE MOBILITY IN DATA COMMUNICATION
Hemant Pareek1
, Vishal Shrivastva2
1
M.Tech, 2
Professor, Department of Computer Science & Engineering, Arya College of Engineering & I.T., (Kukas,
Jaipur, Rajasthan), India.
Abstract
In this Paper, two types of denial of service attacks over mobile ad hoc networks are implemented and their impact is analyzed on
data communication process when using a reactive routing protocol for data communication. The reactive routing protocol well
known Ad-hoc on-demand distance vector (AODV) routing protocol. In the Implemented attacks, a malicious node i.e., attacker will
drop data packets that it receives for forwarding towards the destination of the packet. The attacker can do the attack by either
making itself one of the intermediate nodes on the active route. The attackers can be one of the intermediate nodes in two ways. In the
first method the attacker is waiting that some route discovery process will select it as one of its intermediate node and then it will drop
all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false
information to become the part of an active route. Due to the wrong information spread by the malicious nodes the routing tables of
the source node enters a route for the destination that will surely includes the attacker in the route. The Implemented attack is
simulated using a tool Exata and results are drawn using graphs to show the impact of the attack on data communication. Finally, a
mechanism is proposed through which both the attack and attackers can be detected during the data communication and can be
avoided in further communication process.
Keywords: AODV, DoS Attacks, EPDA & IPDA Attacks, MANET
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
MANET routing protocols in general lack security
mechanisms. For proper operation of routing protocol, it is
assumed that intermediate nodes included in routing paths are
trustworthy and follow protocol rules. It is required that each
node in the network generate and forward routing control
traffic according to protocol specifications. Absolute trust on
intermediate nodes is a significant issue in networks that are
characterized by dynamic topology. It is comparatively easy to
eavesdrop wireless communication and to physically capture
and compromise legal nodes. Without appropriate network
level or link-layer security provisions, routing protocols are
susceptible to many form of malicious activity that can freeze
the whole network. In this chapter various attacks that can be
launched on MANETs by exploiting the vulnerabilities
inherent in routing protocols are discussed. It explains how
basic routing protocol functions like packet or message
forwarding and routing can easily jeopardize the whole
network.
It is imperative to secure networks - wired or wireless for its
proper functioning. Wireless ad hoc network is more
vulnerable to security threats than wired network due to
inherent characteristics and system constraints. The nodes are
free to join, move and leave the network making it susceptible
to attacks - both from inside or outside the network. The
attacks can be launched by nodes within radio range or
through compromised nodes. The compromised nodes exploit
the flaws and inconsistencies present in routing protocol to
destroy normal routing operation of the network. A
compromised node may advertise nonexistent or fake links or
flood honest nodes with routing traffic causing Denial of
Service (DoS) attacks [1][2] that may severely degrade
network performance. Thus it is seen that routing protocols are
one of the main areas of vulnerability. There is a need to study
the vulnerabilities in routing protocols that may be exploited
by malicious nodes to launch attacks.
In this paper, two types of denial of service attacks over
mobile ad hoc networks are implemented and their impact is
analyzed on data communication process when using a
reactive routing protocol for data communication. The reactive
routing protocol used is well known Ad-hoc on-demand
distance vector (AODV)[3] routing protocol. In the
Implemented attacks, a malicious node i.e., attacker will drop
data packets that it receives for forwarding towards the
destination of the packet. The attacker can do the attack by
either making itself one of the intermediate nodes on the
active route. The attackers can be one of the intermediate
nodes in two ways. In the first method the attacker is waiting
that some route discovery process will select it as one of its
intermediate node and then it will drop all the data packets it
receives for forwarding to destination. In the second method
the attacker uses the dissemination of the false information to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 507
become the part of an active route. Due to the wrong
information spread by the malicious nodes the routing tables
of the source node enters a route for the destination that will
surely includes the attacker in the route. Results are drawn
using graphs to show the impact of the attack on data
communication. Finally, a mechanism is proposed through
which both the attack and attackers can be detected during the
data communication and can be avoided in further
communication process.
2. RELATED WORK
In this Section, various types of attacks that are proposed in
the recent years by various researchers working on the areas of
attacks over MANETs with their detection methods (if given
and available in the literature) are discussed.
Various attacks on MANETs given in literature are as follows:
2.1 Jamming Attacks
A node may generate considerable interfering radio
transmissions (white noise [4]) that hinders legitimate traffic
(control, data) to access the communication channel. Jamming
prevents reception, resulting in massive amount of control
traffic being lost. This prevents routes to be constructed in the
network and accurate view of topology cannot be maintained.
2.2 Incorrect Traffic Generation Attacks
A malicious node may generate incorrect control traffic and
affect network connectivity in two ways.
Identity spoofing: A malicious node assumes the identity of
some other node in the network and generates control
messages. This causes incorrect topology view in nodes in the
network.
Link spoofing: A misbehaving node may advertise an
incorrect or non- existent link. As control messages are
flooded into the network, all nodes receive and record
information of the spoofed link. This causes incorrect routing
tables or topology view of the network.
2.3 Incorrect Traffic Relaying Attacks
Nodes in MANET forward both control traffic and data traffic.
A misbehaving node may choose not to forward any type of
traffic correctly. This misbehaviour may take the following
forms:
Incorrect forwarding: In MANETs, each node acts as a router
that forwards control traffic for diffusion into the network. A
node may choose not to forward traffic resulting in missing
connectivity. This leads to generation of incorrect routing
tables or network topology. Similarly, a node may not forward
data traffic correctly resulting in loss of data.
This also results in loss of network connectivity as data traffic
is not forwarded to intended destination.
Replay Traffic: A node may first accumulate control traffic
and later forward it as new set of control messages. During
this period network topology may have changed. Replayed
control traffic results in incorrect view of topology.
Based on the above three categories the following attacks are
given in the literature:
2.4.1 Wormhole Attack [5]
This attack is one of the most serious attacks on MANETs. In
wormhole attack at least two attackers are required to perform
the attack very effectively. These two attackers resides on
different areas of the network makes a tunnel through the
network to communicate with each other. The attackers
broadcast the wrong information to the other nodes in the
network that the destination is only one hop away from them.
Sometimes they also broadcast the wrong information that
they are true neighbours of each other due to this the attacker
one which is near to source node is easily selected on the route
between the source destination pair when the route is
discovered on the basis of lowest number of hops on the route.
It is very difficult to detect the worm hole attack as it is not
modifying any data packet or generating any false traffic in
the network.
2.4.2 Gray Hole Attack [6]
In this attack the attacker when receives a route request
(RREQ) message it modifies the sequence number in the
RREQ message to perform the attack. The attacker increases
the sequence number more than the usual number and reply
back to the source to make it believe that it has the better and
fresher route to the destination node. Once the source node got
this reply it start the transmission of data packet on the route
which consists of the attacker i.e., one of the intermediate
node of the established route is the attacker. Till now half of
the attack is performed by the attacker by spreading the false
information and making himself the part of the route. Now
when the data communication is started using the route, the
attacker will drop all the data packets that reach to it without
forwarding any of the data packets. In the literature many
solutions are given to detect and then avoid the black hole
attack. Another attack which is very close to the black hole
attack in its implementation and attacking process is known as
gray hole attack. In this attack the attacker does not try to get
on the path between the source destination nodes but it also
does not forward any data packets that goes through it.
2.4.3 Flooding Attack [7]
Flooding attack is the simplest attack to implement but it is
one of the most dangerous attacks. In this attack, the attacker
broadcast the false control or data packets in the network due
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 508
to which the network bandwidth is wasted largely and the
legitimate packets are not able to reach their destinations. This
attack is implemented on the reactive protocols by
broadcasting the false data packets and RREQ messages. On
the other hand, this attack can also be implemented on
proactive routing protocols when the attacker node uses lower
time to send the periodic updates. The methods to detect and
avoid such nodes from the network are given in the work.
3. PROPOSED METHODOLOGY
The DoS attacks that are implemented in this paper are
Explicit Packet Dropping Attack (EPDA) and Implicit Packet
Dropping Attack (IPDA). The effects of both of these attacks
on routing process and received data quality are measured
during and after data communication through a reactive
MANET routing protocol called Ad-hoc On-demand Distance
Vector (AODV). In first DoS attack i.e. explicit packet
dropping attack (EPDA), the attacker first explicitly gain
access (i.e. become an intermediate node of the established
route) over the newly established route between a source
destination pair using the false information dissemination
during the route discovery process of AODV and then drop all
the packets that goes through it. On the other hand, in case of
our proposed second DoS attack i.e. implicit packet dropping
attack (IPDA) the attacker does not know that during the data
communication process to which data flow it will attack.
Therefore, the attacker implicitly caught on some data
communication route and once it is on the route it will start
dropping all the data packets that it receives for forwarding
towards the destination node.
3.1 Proposed Implementation of Denial of Service
(DoS) Attacks
The working and proposed implementation process of two
denials of service (DoS) attacks is described in this section.
3.1.1 Explicit Packet Dropping Attack (EPDA):
In the Explicit packet dropping attack (EPDA), when a source
node receives a data packet for routing it towards some
destination node, the node checks its routing table and if the
source routing table does not have any route for the
destination node the source node initiates the RREQ message.
The RREQ message is a broadcast message and it contains
following fields:
<source _addr, source_ sequence_no, broadcast_ id, dest_
addr, dest_ sequence_no, hop _cnt>
The <source _addr , broadcast_ id> is unique for each RREQ.
Whenever the source sends a new RREQ then broadcast_ id is
incremented. If the node that receives the RREQ is neighbor
node it checks it for the duplicity by using a data structure
called SEEN TABLE. If the received RREQ is not a duplicate
it is re-broadcasted into the network by decrementing the TTL
and increasing the hop count field. On the other hand, the
RREQ is discarded without broadcasting. If an intermediate
node has a fresh route for the destination then the node creates
the RREP message sent it back to the source node. The
destination sequence number field in the received RREQ
message is used to calculate the freshness of the route. If the
node receiving the RREQ message has route for the
destination whose seq_no is greater than the sequence number
given in the received RREQ message then the node can
initiates a RREP message. On the other hand if none of the
intermediate nodes has fresh route for the destination then the
RREQ is finally received by the destination which then replies
with the route reply message (RREP). The RREP is traveled in
the unicast way from destination to source and creates the
forward route when it reaches the source node.
Fig 3.1 Working process of Explicit Packet dropping attack
during route discovery phase
The attacker node will exploit the above mentioned route
discovery process of the AODV routing protocol to make
himself an intermediate node of the selected data
communication route in the following way. When the attacker
node receives the broadcast RREQ message from the source
node it will create an RREP message with very high increased
destination sequence number and send that RREP message to
the source node. When the source node receives the RREP
message from the attacker node it has no way to detect that
this is the fabricated RREP message and it is generated by the
attacker node. Therefore, the source node updates its routing
table for the destination node and starts the data transmission
process. The source node will discard any other RREP
messages that it receives from other network nodes or
destination. In this way the attacker node make itself the part
of an active route and drop all the data packets that it receives
from the source node instead of forwarding them to the
destination node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 509
The above mentioned approach of attack is also explained
with the help of Figure 3.1. In the Figure 3.1 the source node
is S, the destination node is D and the attacker node is H. The
timing instants used in the Figure are such that where t1 < t2 >
t3. The Figure 3.6 clearly shows how the attacker node H
gains access on the newly established route and performs the
packet dropping attack.
3.2.2 Implicit Packet Dropping Attack (IPDA):
In this attack, the attacker node will behave like a selfish or
non-cooperative node which will not forward the data packets
of other nodes that goes through it. The attacker will not do
anything to disrupt the data communication in the network as
long as it is not the part of any data communication path.
Therefore, in this kind of attack finding the attacker node
becomes difficult task as it is not harming the network by any
other means than not forwarding the data packets. To properly
explain this attack an example is used as given in Figure 3.2.
Fig 3.2 Working process of implicit packet dropping attack
during route discovery phase
In Figure 3.2 node S is the source node and Node D is the
destination node. When node S starts the route discovery
phase at time t1, the broadcasted RREQ is received by the
node G which has found a fresh route in its routing table for
node D. Therefore, node G will reply the RRP on behalf of
node D. This RREP will travel towards the source node
through the unicast route from which node G has received the
RREQ message. If the node E is a malicious node in the
network and it has forwarded the RREQ message that has
been replied by node G then the RREP message will also go
through node E. Therefore, when node S starts the data
transmission after it receives the RREP message then all the
data packets are received by the malicious node E as it is one
of the intermediate node on the selected route between the
node S and node D. When node E receives the data packets for
forwarding it will intentionally drop them instead of
forwarding them towards the destination. As, we can see from
the example given in Figure 3.2 that node E has not any
additional effort to get on to the route selected between the
node S and D. This is why this attack is named as implicit data
packet dropping attack.
3.3 Proposed Detection Method for EPDA and IPDA
Attacks
The concept of Data packet Routing Information (DPRI) table
is proposed in order to combat with the EPDA Attack. This
proposed mechanism works as follows:
•In this every node maintains a DPRI table. This table consists
of two fields knows as from and through corresponding to
other nodes.
•Here from means the node whose table it is has routed any
packets coming from the corresponding node in the table. And
Through means if the node has routed any packets through the
nodes listed in the table.
•For both the fields „0‟ stands for false and „1‟ stands for true.
•Now let‟s consider an example given in Figure 3.3.
Fig 3.3 Example for detection method for EDPA
Table 3.1 DPRI TABLE FOR NODE 3
DATA PACKET ROUTING INFORMATION
NODE # FROM THROUGH
6 1 0
2 0 0
4 1 0
Here the FROM and THROUGH Fields for node 2 are „0‟
which indicates it as an attacker node.
The entire mechanism works as follows:
(i)First the source node broadcasts RREQ. When the source
node receives RREP, it first checks if the RREP is from
Destination node or an Intermediate Node. If it‟s from the
destination then the route is considered secure and data
packets are forwarded through that route. Else if, it‟s from an
intermediate node, then the reliability of that node is checked.
(ii)If the source has used this intermediate node before also for
routing then it is considered reliable and hence data packets
are routed through the provided route. Else it is an unreliable
node.
(iii)The intermediate node that generates the RREP is
supposed to reply with its Next Hop Node and its DPRI entry
for the Next Hop Node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 510
(iv) The source node now generates FRq (Further Request)
message to Next Hop Neighbor with the ID of the
Intermediate node in question.
(v)The Next hop neighbor replies FRp(Further Reply)message
with DPRI entry for Intermediate Node and the next hop node
of current Next hop neighbor.
(vi) Now, the source checks if the THROUGH field of DIR
table of Intermediate Node is TRUE for its next hop neighbor
but the FROM field of DIR table of the Next Hop Neighbors
Node is FALSE for the intermediate node, then it is declared
as a attacker node, Else the node is considered reliable, The
reliability of other nodes in the route is tested using the same
procedure. This is done until the destination is reached.
But this method is suitable only in case of EDPA attack.
For attacks like IPDA the DPRI table is modified-
(i)Three different other fields known as CTR (COUNTER),
malicious node (MAL NODE) and TIMER are added. The
DPIR table is now known as EDPRI Table (Extended Data
packet Information Routing Table).
Table 3.2 EDPRI TABLE FOR NODE 3
DATA PACKET ROUTING INFORMATION
NODE#FROMTHROUGHCTRMALNODETIMER
6 1 0 0 0 0
2 0 0 3 1 2^4
4 1 0 0 0 0
(ii)And also 2 more types of packets are added which are
Refresh packet and BHID Packet. Refresh packet is generated
when a presence of malicious node in a route is detected. Each
node that receives Refresh Packet deletes concerned path from
its Routing Table.
(iii)CTR field keeps the count of how many times a node has
behaved maliciously, MAL NODE are used to indicate if a
node is an attacker or not by storing values 1 and 0
respectively. BHID packet is used to update this field. TIMER
field, based on CTR value, is used to contain the time for
which the node will be considered as an attacker.
Here the mechanism works as follows:
The detection of attacker node in EDPA is done in the same
way as in the above process. But now after detecting the
attacker the following steps are followed.
(i)After detecting the malicious node, the source now
broadcasts a BHID packet and makes everyone aware of the
attacker‟s identity.
(ii)Now all the other nodes mark this node as a black hole i.e.
they set the MAL NODE field in the EDPRI table as
1corresponding to the attacker node. Also the value of CTR is
increased by 1.
(iii)Each node now starts a timer (based on CTR value). This
timer indicates the time for which the node is considered as an
attacker.
(iv)After the timer expires this node is given one more chance
and its MAL NODE field is again set to 0.
4. SIMULATION RESULTS
This Chapter presented the detailed performance analysis and
impact analysis of the Explicit Packet Dropping Attack
(EPDA) and Implicit Packet Dropping Attack (IPDA) on
different scenarios over mobile ad-hoc networks (MANETs).
The network scenarios used in the simulation process are
designed in such a way so that the effects of the wireless
channel and environment can be obtained during the
simulation process to replicate the real time scenarios. This is
done to discover the exact impact of both the attacks over
MANETs.
Performance Metrics
The following metrics are used in varying scenarios to
evaluate the three different protocols:
(i)Packet delivery ratio (PDR): The ratio of the application
data packets that are received without any error at destination
nodes to the total data packets generated by the CBR sources
are called Packet delivery ratio (PDR) of the network. Let‟s
assume that S is the total number of packets send from source
node and R represents the total number of packets received
successfully at each destination node than the PDR is defined
as follows:
PDR = R/S
(ii)Average end-to-end delay of data packets: This metric is
calculated by the destination node whenever it receives a data
packet. The destination node will calculate the delay of each
received data packet by using its send timestamp and its
received timestamp at the destination. At the end of the
transmission the total time of the data packets received at the
destination is divided by the total number of received data
packets. Average end-to-end delay (EED) for packets received
by each destination node is calculated as follows:
EED = delay of each packet received successfully / total
number of packets received
(iii)Normalized routing load: The number of routing control
messages that are transmitted for each data packet delivered at
the destination node are called the Normalized routing
overhead of a source-destination data flow. Normalized
routing load gives a measure of the efficiency of the protocol
by telling how much extra load is put by the proposed method
to implement its working in the network.
Normalized routing load = Total number of control packets /
(total number of control packets + total number of data
packets in the network).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 511
4.1 Simulation Result
In order to compare and evaluate performances of the three
protocols (AODV, AODV with EPDA and AODV with
IPDA) in different network conditions, one parameter are
varied in the simulations:
• Increasing the node mobility
Simulations are carried out by keeping the number of sources
constant and varying the mobility in the network. 5 sources are
modeled respectively to study the effect of varying mobility in
network. 4.1 Effect of network mobility on attacks
Fig 4.1 Average EED with increase in node mobility
In figure 4.1 shows the effect of network mobility on end-to-
end delay for both the attacks i.e., AODV-EPDA and AODV-
IPDA and as well as on the traditional AODV routing
protocol. It can be seen that the network end-to-end delay
increases with increases in network mobility this is because as
the network mobility increases the number of broken route
also increases which requires the re-routing due to which the
network delay on the active routes increases.
Fig 4.2 Average PDR with increase in node mobility
In Figure 4.2 shows packet delivery ratio of the network with
increase in node mobility for AODV, AODV-EPDA and
AODV-IPDA routing protocols. It can be seen from the Figure
4.2 that the PDR of all the compared protocols decreases with
increase in the network mobility this is because due to the
mobility active routes are broken and the data packets that are
on the way to the destination on the intermediate node are
dropped. The PDR of AODV-EPDA is very low as compared
to the other comparing protocol this is because the attackers in
EPDA will always become the part of the active routes due to
their false RREP replies. The attackers will drop all the
packets they receive from the source nodes for forwarding to
the destinations. The PDR of IPDA is lower than the EDPA
because the probability that an attacker node will be on an
active route is less in case of IPDA as compared to the EPDA.
Fig 4.3 Average Routing overhead with increase in node
mobility
Figure 4.3 shows the Routing Overhead (RO) casued by the
comparing routing protocols with the increase in the network
mobility. The figure shows that the overhead of the network
increases for all the compared protocols with the increase in
the network mobility. This is due to the fact that as the
network mobility increases the re-routing due to the broke
route also increases and each re-routing requires a new route
for the destiantion and each time a route discovery process is
initiated to disocover a new route for a destination process.
The routing overhead of the AODV-EPDA routing protocol is
lower than the other two compared protocols because the
number of intermediate nodes between source to destination
are low if an attacker node is present on the data forwarding
route. This is because the attacker can be the next hop node
from the source in that case the probability of broke route to
be decreases rapidly.
5. CONCLUSIONS
The simulation results presented in the previous sections
shows that the attacks are implemented successfully and they
causes the various forms of problems during the data
communication process. the impact of the attacks on various
network scenarios using various performance metrics (i.e.,
end-to-end delay, packet delivery ratio and routing overhead)
to prove the correctness and effectiveness of the attack
algorithms. It has been observed during simulations that due to
attacks the performance of the underlying network decreases
highly in terms of network throughput. Furthermore, proposed
a possible detection method for the attacks and its theoretical
study prove that attack can be detected with certain
assumptions (such as each attacker causes unique type of
misbehaviour). Although, it is very difficult to provide
detection method with 100% efficiency and which also has a
very low convergence time so that the effect of attack can be
minimized or localized.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 512
REFERENCES
[1]. R.H. Jhaveri, S.J. Patel, and D.C. Jinwala “DoS attacks in
mobile ad hoc networks: A survey. In Advanced Computing
Communication Technologies (ACCT)2012”,Second
International Conference on, 2012.
[2]. Carl.G,Kesidis.G,Brooks,R.R.Rai,"Denial-of-service
attack-detection techniques",Internet Computing, IEEE ,
vol.10, no.1, pp.82,89, Jan.-Feb. 2006.
[3]. Yih Chun Hu Adrian Perrig and David B. Johnson
Ariadne, “a secure on-demand routing protocol for ad hoc
networks”, In Eighth ACM International Conference on
Mobile Computing and Networking(MobiCom 2002),
September 2002.
[4]. Su.Ming-Yang and Chiang.Kun-Lin ”Prevention of
Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion
Detection Nodes”, Wireless Algorithms, Systems, and
Applications, Springer Berlin Heidelberg, 2010.
[5]. Nait-Abdesselam.F "Detecting and avoiding wormhole
attacks in wireless ad hoc networks" Communications
Magazine, IEEE , vol.46, no.4, pp.127,133, April 2008.
[6]. Chen Wei, Long Xiang, Bai Yuebin, Gao Xiaopeng, "A
New Solution for Resisting Gray Hole Attack in Mobile Ad-
Hoc Networks," Communications and Networking in China,
2007. CHINACOM '07. Second International Conference on ,
vol., no., pp.366,370, 22-24 Aug. 2007.
[7]. Ping Yi, Zhoulin Dai, Yi-ping Zhong, Shiyong Zhang
"Resisting flooding attacks in ad hoc networks" Information
Technology: Coding and Computing, 2005. ITCC 2005.
International Conference on , vol.2, no., pp.657,662 Vol. 2, 4-
6 April 2005.

More Related Content

What's hot

A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET Journal
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clusteringidescitation
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET Journal
 

What's hot (18)

Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
black hole attack
black hole attackblack hole attack
black hole attack
 
He3413241328
He3413241328He3413241328
He3413241328
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
E0432933
E0432933E0432933
E0432933
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
 

Similar to Impact analysis of epda and ipda attack with increasing node mobility in data communication

An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET Journal
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)IRJET Journal
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 

Similar to Impact analysis of epda and ipda attack with increasing node mobility in data communication (20)

An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
N0363079085
N0363079085N0363079085
N0363079085
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manets
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Impact analysis of epda and ipda attack with increasing node mobility in data communication

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 506 IMPACT ANALYSIS OF EPDA AND IPDA ATTACK WITH INCREASING NODE MOBILITY IN DATA COMMUNICATION Hemant Pareek1 , Vishal Shrivastva2 1 M.Tech, 2 Professor, Department of Computer Science & Engineering, Arya College of Engineering & I.T., (Kukas, Jaipur, Rajasthan), India. Abstract In this Paper, two types of denial of service attacks over mobile ad hoc networks are implemented and their impact is analyzed on data communication process when using a reactive routing protocol for data communication. The reactive routing protocol well known Ad-hoc on-demand distance vector (AODV) routing protocol. In the Implemented attacks, a malicious node i.e., attacker will drop data packets that it receives for forwarding towards the destination of the packet. The attacker can do the attack by either making itself one of the intermediate nodes on the active route. The attackers can be one of the intermediate nodes in two ways. In the first method the attacker is waiting that some route discovery process will select it as one of its intermediate node and then it will drop all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false information to become the part of an active route. Due to the wrong information spread by the malicious nodes the routing tables of the source node enters a route for the destination that will surely includes the attacker in the route. The Implemented attack is simulated using a tool Exata and results are drawn using graphs to show the impact of the attack on data communication. Finally, a mechanism is proposed through which both the attack and attackers can be detected during the data communication and can be avoided in further communication process. Keywords: AODV, DoS Attacks, EPDA & IPDA Attacks, MANET -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION MANET routing protocols in general lack security mechanisms. For proper operation of routing protocol, it is assumed that intermediate nodes included in routing paths are trustworthy and follow protocol rules. It is required that each node in the network generate and forward routing control traffic according to protocol specifications. Absolute trust on intermediate nodes is a significant issue in networks that are characterized by dynamic topology. It is comparatively easy to eavesdrop wireless communication and to physically capture and compromise legal nodes. Without appropriate network level or link-layer security provisions, routing protocols are susceptible to many form of malicious activity that can freeze the whole network. In this chapter various attacks that can be launched on MANETs by exploiting the vulnerabilities inherent in routing protocols are discussed. It explains how basic routing protocol functions like packet or message forwarding and routing can easily jeopardize the whole network. It is imperative to secure networks - wired or wireless for its proper functioning. Wireless ad hoc network is more vulnerable to security threats than wired network due to inherent characteristics and system constraints. The nodes are free to join, move and leave the network making it susceptible to attacks - both from inside or outside the network. The attacks can be launched by nodes within radio range or through compromised nodes. The compromised nodes exploit the flaws and inconsistencies present in routing protocol to destroy normal routing operation of the network. A compromised node may advertise nonexistent or fake links or flood honest nodes with routing traffic causing Denial of Service (DoS) attacks [1][2] that may severely degrade network performance. Thus it is seen that routing protocols are one of the main areas of vulnerability. There is a need to study the vulnerabilities in routing protocols that may be exploited by malicious nodes to launch attacks. In this paper, two types of denial of service attacks over mobile ad hoc networks are implemented and their impact is analyzed on data communication process when using a reactive routing protocol for data communication. The reactive routing protocol used is well known Ad-hoc on-demand distance vector (AODV)[3] routing protocol. In the Implemented attacks, a malicious node i.e., attacker will drop data packets that it receives for forwarding towards the destination of the packet. The attacker can do the attack by either making itself one of the intermediate nodes on the active route. The attackers can be one of the intermediate nodes in two ways. In the first method the attacker is waiting that some route discovery process will select it as one of its intermediate node and then it will drop all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false information to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 507 become the part of an active route. Due to the wrong information spread by the malicious nodes the routing tables of the source node enters a route for the destination that will surely includes the attacker in the route. Results are drawn using graphs to show the impact of the attack on data communication. Finally, a mechanism is proposed through which both the attack and attackers can be detected during the data communication and can be avoided in further communication process. 2. RELATED WORK In this Section, various types of attacks that are proposed in the recent years by various researchers working on the areas of attacks over MANETs with their detection methods (if given and available in the literature) are discussed. Various attacks on MANETs given in literature are as follows: 2.1 Jamming Attacks A node may generate considerable interfering radio transmissions (white noise [4]) that hinders legitimate traffic (control, data) to access the communication channel. Jamming prevents reception, resulting in massive amount of control traffic being lost. This prevents routes to be constructed in the network and accurate view of topology cannot be maintained. 2.2 Incorrect Traffic Generation Attacks A malicious node may generate incorrect control traffic and affect network connectivity in two ways. Identity spoofing: A malicious node assumes the identity of some other node in the network and generates control messages. This causes incorrect topology view in nodes in the network. Link spoofing: A misbehaving node may advertise an incorrect or non- existent link. As control messages are flooded into the network, all nodes receive and record information of the spoofed link. This causes incorrect routing tables or topology view of the network. 2.3 Incorrect Traffic Relaying Attacks Nodes in MANET forward both control traffic and data traffic. A misbehaving node may choose not to forward any type of traffic correctly. This misbehaviour may take the following forms: Incorrect forwarding: In MANETs, each node acts as a router that forwards control traffic for diffusion into the network. A node may choose not to forward traffic resulting in missing connectivity. This leads to generation of incorrect routing tables or network topology. Similarly, a node may not forward data traffic correctly resulting in loss of data. This also results in loss of network connectivity as data traffic is not forwarded to intended destination. Replay Traffic: A node may first accumulate control traffic and later forward it as new set of control messages. During this period network topology may have changed. Replayed control traffic results in incorrect view of topology. Based on the above three categories the following attacks are given in the literature: 2.4.1 Wormhole Attack [5] This attack is one of the most serious attacks on MANETs. In wormhole attack at least two attackers are required to perform the attack very effectively. These two attackers resides on different areas of the network makes a tunnel through the network to communicate with each other. The attackers broadcast the wrong information to the other nodes in the network that the destination is only one hop away from them. Sometimes they also broadcast the wrong information that they are true neighbours of each other due to this the attacker one which is near to source node is easily selected on the route between the source destination pair when the route is discovered on the basis of lowest number of hops on the route. It is very difficult to detect the worm hole attack as it is not modifying any data packet or generating any false traffic in the network. 2.4.2 Gray Hole Attack [6] In this attack the attacker when receives a route request (RREQ) message it modifies the sequence number in the RREQ message to perform the attack. The attacker increases the sequence number more than the usual number and reply back to the source to make it believe that it has the better and fresher route to the destination node. Once the source node got this reply it start the transmission of data packet on the route which consists of the attacker i.e., one of the intermediate node of the established route is the attacker. Till now half of the attack is performed by the attacker by spreading the false information and making himself the part of the route. Now when the data communication is started using the route, the attacker will drop all the data packets that reach to it without forwarding any of the data packets. In the literature many solutions are given to detect and then avoid the black hole attack. Another attack which is very close to the black hole attack in its implementation and attacking process is known as gray hole attack. In this attack the attacker does not try to get on the path between the source destination nodes but it also does not forward any data packets that goes through it. 2.4.3 Flooding Attack [7] Flooding attack is the simplest attack to implement but it is one of the most dangerous attacks. In this attack, the attacker broadcast the false control or data packets in the network due
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 508 to which the network bandwidth is wasted largely and the legitimate packets are not able to reach their destinations. This attack is implemented on the reactive protocols by broadcasting the false data packets and RREQ messages. On the other hand, this attack can also be implemented on proactive routing protocols when the attacker node uses lower time to send the periodic updates. The methods to detect and avoid such nodes from the network are given in the work. 3. PROPOSED METHODOLOGY The DoS attacks that are implemented in this paper are Explicit Packet Dropping Attack (EPDA) and Implicit Packet Dropping Attack (IPDA). The effects of both of these attacks on routing process and received data quality are measured during and after data communication through a reactive MANET routing protocol called Ad-hoc On-demand Distance Vector (AODV). In first DoS attack i.e. explicit packet dropping attack (EPDA), the attacker first explicitly gain access (i.e. become an intermediate node of the established route) over the newly established route between a source destination pair using the false information dissemination during the route discovery process of AODV and then drop all the packets that goes through it. On the other hand, in case of our proposed second DoS attack i.e. implicit packet dropping attack (IPDA) the attacker does not know that during the data communication process to which data flow it will attack. Therefore, the attacker implicitly caught on some data communication route and once it is on the route it will start dropping all the data packets that it receives for forwarding towards the destination node. 3.1 Proposed Implementation of Denial of Service (DoS) Attacks The working and proposed implementation process of two denials of service (DoS) attacks is described in this section. 3.1.1 Explicit Packet Dropping Attack (EPDA): In the Explicit packet dropping attack (EPDA), when a source node receives a data packet for routing it towards some destination node, the node checks its routing table and if the source routing table does not have any route for the destination node the source node initiates the RREQ message. The RREQ message is a broadcast message and it contains following fields: <source _addr, source_ sequence_no, broadcast_ id, dest_ addr, dest_ sequence_no, hop _cnt> The <source _addr , broadcast_ id> is unique for each RREQ. Whenever the source sends a new RREQ then broadcast_ id is incremented. If the node that receives the RREQ is neighbor node it checks it for the duplicity by using a data structure called SEEN TABLE. If the received RREQ is not a duplicate it is re-broadcasted into the network by decrementing the TTL and increasing the hop count field. On the other hand, the RREQ is discarded without broadcasting. If an intermediate node has a fresh route for the destination then the node creates the RREP message sent it back to the source node. The destination sequence number field in the received RREQ message is used to calculate the freshness of the route. If the node receiving the RREQ message has route for the destination whose seq_no is greater than the sequence number given in the received RREQ message then the node can initiates a RREP message. On the other hand if none of the intermediate nodes has fresh route for the destination then the RREQ is finally received by the destination which then replies with the route reply message (RREP). The RREP is traveled in the unicast way from destination to source and creates the forward route when it reaches the source node. Fig 3.1 Working process of Explicit Packet dropping attack during route discovery phase The attacker node will exploit the above mentioned route discovery process of the AODV routing protocol to make himself an intermediate node of the selected data communication route in the following way. When the attacker node receives the broadcast RREQ message from the source node it will create an RREP message with very high increased destination sequence number and send that RREP message to the source node. When the source node receives the RREP message from the attacker node it has no way to detect that this is the fabricated RREP message and it is generated by the attacker node. Therefore, the source node updates its routing table for the destination node and starts the data transmission process. The source node will discard any other RREP messages that it receives from other network nodes or destination. In this way the attacker node make itself the part of an active route and drop all the data packets that it receives from the source node instead of forwarding them to the destination node.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 509 The above mentioned approach of attack is also explained with the help of Figure 3.1. In the Figure 3.1 the source node is S, the destination node is D and the attacker node is H. The timing instants used in the Figure are such that where t1 < t2 > t3. The Figure 3.6 clearly shows how the attacker node H gains access on the newly established route and performs the packet dropping attack. 3.2.2 Implicit Packet Dropping Attack (IPDA): In this attack, the attacker node will behave like a selfish or non-cooperative node which will not forward the data packets of other nodes that goes through it. The attacker will not do anything to disrupt the data communication in the network as long as it is not the part of any data communication path. Therefore, in this kind of attack finding the attacker node becomes difficult task as it is not harming the network by any other means than not forwarding the data packets. To properly explain this attack an example is used as given in Figure 3.2. Fig 3.2 Working process of implicit packet dropping attack during route discovery phase In Figure 3.2 node S is the source node and Node D is the destination node. When node S starts the route discovery phase at time t1, the broadcasted RREQ is received by the node G which has found a fresh route in its routing table for node D. Therefore, node G will reply the RRP on behalf of node D. This RREP will travel towards the source node through the unicast route from which node G has received the RREQ message. If the node E is a malicious node in the network and it has forwarded the RREQ message that has been replied by node G then the RREP message will also go through node E. Therefore, when node S starts the data transmission after it receives the RREP message then all the data packets are received by the malicious node E as it is one of the intermediate node on the selected route between the node S and node D. When node E receives the data packets for forwarding it will intentionally drop them instead of forwarding them towards the destination. As, we can see from the example given in Figure 3.2 that node E has not any additional effort to get on to the route selected between the node S and D. This is why this attack is named as implicit data packet dropping attack. 3.3 Proposed Detection Method for EPDA and IPDA Attacks The concept of Data packet Routing Information (DPRI) table is proposed in order to combat with the EPDA Attack. This proposed mechanism works as follows: •In this every node maintains a DPRI table. This table consists of two fields knows as from and through corresponding to other nodes. •Here from means the node whose table it is has routed any packets coming from the corresponding node in the table. And Through means if the node has routed any packets through the nodes listed in the table. •For both the fields „0‟ stands for false and „1‟ stands for true. •Now let‟s consider an example given in Figure 3.3. Fig 3.3 Example for detection method for EDPA Table 3.1 DPRI TABLE FOR NODE 3 DATA PACKET ROUTING INFORMATION NODE # FROM THROUGH 6 1 0 2 0 0 4 1 0 Here the FROM and THROUGH Fields for node 2 are „0‟ which indicates it as an attacker node. The entire mechanism works as follows: (i)First the source node broadcasts RREQ. When the source node receives RREP, it first checks if the RREP is from Destination node or an Intermediate Node. If it‟s from the destination then the route is considered secure and data packets are forwarded through that route. Else if, it‟s from an intermediate node, then the reliability of that node is checked. (ii)If the source has used this intermediate node before also for routing then it is considered reliable and hence data packets are routed through the provided route. Else it is an unreliable node. (iii)The intermediate node that generates the RREP is supposed to reply with its Next Hop Node and its DPRI entry for the Next Hop Node.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 510 (iv) The source node now generates FRq (Further Request) message to Next Hop Neighbor with the ID of the Intermediate node in question. (v)The Next hop neighbor replies FRp(Further Reply)message with DPRI entry for Intermediate Node and the next hop node of current Next hop neighbor. (vi) Now, the source checks if the THROUGH field of DIR table of Intermediate Node is TRUE for its next hop neighbor but the FROM field of DIR table of the Next Hop Neighbors Node is FALSE for the intermediate node, then it is declared as a attacker node, Else the node is considered reliable, The reliability of other nodes in the route is tested using the same procedure. This is done until the destination is reached. But this method is suitable only in case of EDPA attack. For attacks like IPDA the DPRI table is modified- (i)Three different other fields known as CTR (COUNTER), malicious node (MAL NODE) and TIMER are added. The DPIR table is now known as EDPRI Table (Extended Data packet Information Routing Table). Table 3.2 EDPRI TABLE FOR NODE 3 DATA PACKET ROUTING INFORMATION NODE#FROMTHROUGHCTRMALNODETIMER 6 1 0 0 0 0 2 0 0 3 1 2^4 4 1 0 0 0 0 (ii)And also 2 more types of packets are added which are Refresh packet and BHID Packet. Refresh packet is generated when a presence of malicious node in a route is detected. Each node that receives Refresh Packet deletes concerned path from its Routing Table. (iii)CTR field keeps the count of how many times a node has behaved maliciously, MAL NODE are used to indicate if a node is an attacker or not by storing values 1 and 0 respectively. BHID packet is used to update this field. TIMER field, based on CTR value, is used to contain the time for which the node will be considered as an attacker. Here the mechanism works as follows: The detection of attacker node in EDPA is done in the same way as in the above process. But now after detecting the attacker the following steps are followed. (i)After detecting the malicious node, the source now broadcasts a BHID packet and makes everyone aware of the attacker‟s identity. (ii)Now all the other nodes mark this node as a black hole i.e. they set the MAL NODE field in the EDPRI table as 1corresponding to the attacker node. Also the value of CTR is increased by 1. (iii)Each node now starts a timer (based on CTR value). This timer indicates the time for which the node is considered as an attacker. (iv)After the timer expires this node is given one more chance and its MAL NODE field is again set to 0. 4. SIMULATION RESULTS This Chapter presented the detailed performance analysis and impact analysis of the Explicit Packet Dropping Attack (EPDA) and Implicit Packet Dropping Attack (IPDA) on different scenarios over mobile ad-hoc networks (MANETs). The network scenarios used in the simulation process are designed in such a way so that the effects of the wireless channel and environment can be obtained during the simulation process to replicate the real time scenarios. This is done to discover the exact impact of both the attacks over MANETs. Performance Metrics The following metrics are used in varying scenarios to evaluate the three different protocols: (i)Packet delivery ratio (PDR): The ratio of the application data packets that are received without any error at destination nodes to the total data packets generated by the CBR sources are called Packet delivery ratio (PDR) of the network. Let‟s assume that S is the total number of packets send from source node and R represents the total number of packets received successfully at each destination node than the PDR is defined as follows: PDR = R/S (ii)Average end-to-end delay of data packets: This metric is calculated by the destination node whenever it receives a data packet. The destination node will calculate the delay of each received data packet by using its send timestamp and its received timestamp at the destination. At the end of the transmission the total time of the data packets received at the destination is divided by the total number of received data packets. Average end-to-end delay (EED) for packets received by each destination node is calculated as follows: EED = delay of each packet received successfully / total number of packets received (iii)Normalized routing load: The number of routing control messages that are transmitted for each data packet delivered at the destination node are called the Normalized routing overhead of a source-destination data flow. Normalized routing load gives a measure of the efficiency of the protocol by telling how much extra load is put by the proposed method to implement its working in the network. Normalized routing load = Total number of control packets / (total number of control packets + total number of data packets in the network).
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 511 4.1 Simulation Result In order to compare and evaluate performances of the three protocols (AODV, AODV with EPDA and AODV with IPDA) in different network conditions, one parameter are varied in the simulations: • Increasing the node mobility Simulations are carried out by keeping the number of sources constant and varying the mobility in the network. 5 sources are modeled respectively to study the effect of varying mobility in network. 4.1 Effect of network mobility on attacks Fig 4.1 Average EED with increase in node mobility In figure 4.1 shows the effect of network mobility on end-to- end delay for both the attacks i.e., AODV-EPDA and AODV- IPDA and as well as on the traditional AODV routing protocol. It can be seen that the network end-to-end delay increases with increases in network mobility this is because as the network mobility increases the number of broken route also increases which requires the re-routing due to which the network delay on the active routes increases. Fig 4.2 Average PDR with increase in node mobility In Figure 4.2 shows packet delivery ratio of the network with increase in node mobility for AODV, AODV-EPDA and AODV-IPDA routing protocols. It can be seen from the Figure 4.2 that the PDR of all the compared protocols decreases with increase in the network mobility this is because due to the mobility active routes are broken and the data packets that are on the way to the destination on the intermediate node are dropped. The PDR of AODV-EPDA is very low as compared to the other comparing protocol this is because the attackers in EPDA will always become the part of the active routes due to their false RREP replies. The attackers will drop all the packets they receive from the source nodes for forwarding to the destinations. The PDR of IPDA is lower than the EDPA because the probability that an attacker node will be on an active route is less in case of IPDA as compared to the EPDA. Fig 4.3 Average Routing overhead with increase in node mobility Figure 4.3 shows the Routing Overhead (RO) casued by the comparing routing protocols with the increase in the network mobility. The figure shows that the overhead of the network increases for all the compared protocols with the increase in the network mobility. This is due to the fact that as the network mobility increases the re-routing due to the broke route also increases and each re-routing requires a new route for the destiantion and each time a route discovery process is initiated to disocover a new route for a destination process. The routing overhead of the AODV-EPDA routing protocol is lower than the other two compared protocols because the number of intermediate nodes between source to destination are low if an attacker node is present on the data forwarding route. This is because the attacker can be the next hop node from the source in that case the probability of broke route to be decreases rapidly. 5. CONCLUSIONS The simulation results presented in the previous sections shows that the attacks are implemented successfully and they causes the various forms of problems during the data communication process. the impact of the attacks on various network scenarios using various performance metrics (i.e., end-to-end delay, packet delivery ratio and routing overhead) to prove the correctness and effectiveness of the attack algorithms. It has been observed during simulations that due to attacks the performance of the underlying network decreases highly in terms of network throughput. Furthermore, proposed a possible detection method for the attacks and its theoretical study prove that attack can be detected with certain assumptions (such as each attacker causes unique type of misbehaviour). Although, it is very difficult to provide detection method with 100% efficiency and which also has a very low convergence time so that the effect of attack can be minimized or localized.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 512 REFERENCES [1]. R.H. Jhaveri, S.J. Patel, and D.C. Jinwala “DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing Communication Technologies (ACCT)2012”,Second International Conference on, 2012. [2]. Carl.G,Kesidis.G,Brooks,R.R.Rai,"Denial-of-service attack-detection techniques",Internet Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb. 2006. [3]. Yih Chun Hu Adrian Perrig and David B. Johnson Ariadne, “a secure on-demand routing protocol for ad hoc networks”, In Eighth ACM International Conference on Mobile Computing and Networking(MobiCom 2002), September 2002. [4]. Su.Ming-Yang and Chiang.Kun-Lin ”Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes”, Wireless Algorithms, Systems, and Applications, Springer Berlin Heidelberg, 2010. [5]. Nait-Abdesselam.F "Detecting and avoiding wormhole attacks in wireless ad hoc networks" Communications Magazine, IEEE , vol.46, no.4, pp.127,133, April 2008. [6]. Chen Wei, Long Xiang, Bai Yuebin, Gao Xiaopeng, "A New Solution for Resisting Gray Hole Attack in Mobile Ad- Hoc Networks," Communications and Networking in China, 2007. CHINACOM '07. Second International Conference on , vol., no., pp.366,370, 22-24 Aug. 2007. [7]. Ping Yi, Zhoulin Dai, Yi-ping Zhong, Shiyong Zhang "Resisting flooding attacks in ad hoc networks" Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on , vol.2, no., pp.657,662 Vol. 2, 4- 6 April 2005.