SlideShare a Scribd company logo
1 of 5
Download to read offline
Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328
1324 | P a g e
Performance Evaluation of MANET with Black Hole Attack
Using Routing Protocols
Tarandeep Kaur1
, Amarvir Singh2
1, 2
Punjabi university, DEPT. of Computer science, Patiala, India
ABSTRACT
Mobile Ad hoc networks (MANET) are
collection of wireless nodes that communicate with
each other with the help of wireless links. MANET
is vulnerable to different attacks due to its feature
open medium, dynamic topology, no central
authority and no clear defense mechanism. One of
the attacks is black hole attack in which a
malicious node intercepts the packets being
transmitted to another node in the network. As
the data packets do not reach the destination,
Data loss occurs which affects the performance of
network badly. Our aim of the paper is to analyze
the impact of the Black hole attack on MANET
performance and how it affects the various
performance metrics of the network by comparing
the network performance with and without black
hole nodes.
Keywords- Black hole attack, Manet, Routing
protocols.
I. INTRODUCTION
MANET is considered a collection of
wireless mobile nodes that communicate with each
other without the use of a network infrastructure or
central base station. Mobile nodes dynamically create
routes among themselves to form own wireless
network on the fly and organize themselves into a
network. In such a network, each mobile node
operates not only as a host but also as a router,
forwarding packets for other mobile nodes in the
network that may not be within direct wireless
transmission range of each other. These
infrastructure-less mobile nodes in ad hoc networks
dynamically create routes among themselves to form
own wireless network on the fly. Different
applications of MANET are sensor networks, vehicle
to vehicle communication, military battlefields and
emergency services. These wireless links makes the
MANETs more susceptible to attacks, which make it
easier for the attacker to go inside the network and
get access to the ongoing communication. Black hole
attack is one kind of attack that a MANET suffers
from. In black hole attack, a malicious node uses its
routing protocol in order to advertise itself for having
the shortest path to the destination node or to the
packet it wants to intercept.
This paper is divided into seven sections.
Section 2 describes the black hole attack occurring in
the network and the security issues related to the
Attack. Section 3 consists of types of routing
protocols that are used to find the secure path
between the source and the destination node. Section
4 is of the previous work done on black hole attack.
Section 5 consists of simulation methodology for
analyzing the network with black hole attack and
without black hole attack. Section 6 gives simulation
results of our proposed model. Finally, the paper is
concluded in section 7.
1.1 BLACK HOLE ATTACK
Black hole attack is an attack in which
malicious node uses its routing protocol to advertise
itself for having the shortest path with minimum hops
to the destination node whose data packet it wants to
take away. In this way attacker node is always
available to the nodes whose packets it wants to
retain.
Fig. 1.1
In figure 1.1 Node A want to send data
packets to node D and initiate the route discovery
mechanism by sending a Route request message to all
the nodes in the network. Node C is a malicious node
it presents itself for having a shortest route to the
destination node as soon as it receives route request
(RREQ) message. It will then respond to node A
before any other node responds. In this way node A
will think that this is the only shortest route and thus
will complete its route discovery mechanism. Node A
will ignore all other replies and will start sending data
packets to node C. In this way all the data packet will
be intercepted by node C.
Due to these attacks, transmission of the
data between the source and destination has become
insecure. These attacker nodes exploit the network by
becoming the part of the network. One of the reasons
that make the network more susceptible to these
attacks is its wireless links due to which attacker
Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328
1325 | P a g e
nodes go inside the network and starts intercepting
the packets being transmitted which leads to data
loss.
1.2 ROUTING PROTOCOLS
The primary goal of routing protocols is to
securely deliver the data packets by finding a shortest
path between source and destination with minimum
hops. A MANET protocol work for small sized
network to large sized network. Routing protocols
can be divided into proactive, reactive and hybrid
protocols, depending on the routing topology.
Proactive protocols are typically table driven.
Examples of this type include Optimized link state
routing (OLSR), Destination Sequence Distance
Vector (DSDV) protocols. Reactive or source-
initiated on demand protocols, do not periodically
update the routing information. It is propagated to the
nodes only when necessary. Example of this type
includes Dynamic Source Routing (DSR) and Ad
Hoc On-Demand Distance Vector (AODV). Hybrid
protocols make use of both reactive and proactive
approaches. Example of this type includes Zone
Routing Protocol (ZRP).
II. RELATED WORK
Mohammad Al-Shurman [2] has proposed solution
in which host node sends a packet that includes the
packet id and sequence number to destination node
through three different paths. When any intermediate
node or malicious node has a route to the destination
node will reply to that packet. Once the source node
collects all the reply from the intermediate nodes,
source node will check for the secure route to the
destination.
Sanjay Ramaswamy [6] proposed a solution for
multiple black hole nodes in a network. He modified
AODV routing protocol by introducing new concept
of data routing information table and cross checking.
In DRI table, every intermediate node maintains a
DRI table which will record information about the
node traversed before and node traversed after the
intermediate node. Once the data is transmitted cross
checking is done to check the data loss occurred
during the transmission.
Hesiri Weerasinghe [4] studied the problem of
cooperative black hole attack in MANET. He has
compared the performance of the network in terms of
throughput, end to end delay, packet loss and packet
overhead by varying the number of black hole nodes,
number of mobile nodes, mobility speed and the size
of terrain area. Simulation results show greater
reduction in terms of throughput and packet loss.
K. Lakshmi [7] proposed an algorithm named
Prior_ReceiveReply with six steps. In first step
current time is retrieved and that current time is
added to the waiting time that is set for the source
node to receive route request from the intermediate
nodes. Second step is of storing the RREQ
destination sequence number (DSN) and node ID into
a table called RR table (Route Reply). Next third step
is of identifying and removing the malicious node.
The first entry in the RR table with the greatest DSN
is of malicious node. If the difference between the
DSN of source node and the first entry in RR table is
much greater than remove that first entry from the
RR table. In this way a malicious node is identified
and removed. In next step, second entry with higher
DSN in the RR table is selected. In the last step, with
that entry the default process is continued.
Dinesh [5] analyzed the behavior of malicious node
in different routing protocols in MANET. He
proposed a solution for finding a safe route by
waiting and checking the replies received from the
intermediate nodes. He observed the network under
varying network mobility with maximum speed of
10m/s. He concluded that AODV routing protocol
results in a better performance with black hole nodes
than DSR in terms of throughput.
III. SIMULATION METHODOLOGY
OPNET modeler 14.5 is used to develop the
simulation and analysis for this paper. Six different
scenarios have been created in which 60 mobile
nodes have been kept in a campus network. Out of
those 60 mobile nodes, 15 nodes are made black hole
nodes or malicious nodes by changing some of their
parameters. All these nodes are configured mobile by
using profile configuration. Two different
applications file transfer protocol (FTP) for heavy
load and hypertext transfer protocol (HTTP) for
heavy browsing are being used to analyze the
performance. Simulation focuses on performance of
network with and without black hole attack by
changing the routing protocols. Three different
routing protocols have been employed on these six
scenarios. These routing protocols are Ad hoc on
demand routing protocol (AODV), Optimized link
state routing protocol (OLSR) and Dynamic source
routing protocol (DSR). Network throughput, delay,
and load are taken into account to perform simulation
using routing protocols.
Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328
1326 | P a g e
Fig 2. Network model
We use the following metrics to evaluate the
protocols.
LOAD (BITS/SEC): Load represents the total load
(in bits/sec) submitted to wireless LAN layers by all
higher layers in all WLAN nodes of the network
THROUGHPUT: Throughput represents the total
number of bits (in bits/sec) forwarded from wireless
LAN layers to higher layers in all WLAN nodes of
the network.
DELAY (SEC): Delay represents the end to end
delay of all the packets received by the wireless LAN
MACs of all WLAN nodes in the network and
forwarded to the higher layer. This delay includes
medium access delay at the source MAC, reception
of all the fragments individually, and transfers of the
frames via AP, if access point functionality is
enabled.
3.1 SIMULATION RESULTS
Simulation is done for 600 seconds for each
scenario and overlaid statistics of these performance
metrics for each protocol have been obtained.
Table 1. Simulation Parameters
Initial topology Empty scenario
Size 10*10 km
Model family MANET
Network scale campus
Data rate 11 mbps
Speed 5m/s
Technology WLAN (AD HOC)
Nodes 60
Attacker nodes 15
Mobility model Random waypoint
Routing protocols AODV,OLSR, DSR
Operational mode 802.11b
Packet inter-arrival
time
Constant(0.03)
Packet size Uniform(140,160)
Trajectory Vector
Simulation time 600 seconds
The following graph depicts the nature of
each routing protocol by taking into account the
performance metrics with and without the attacker
node.
Fig.3 AODV without attacker nodes
Fig.4 AODV with attacker nodes
Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328
1327 | P a g e
Fig.3 and fig. 4 shows the impact of black
hole attack on the network performance under AODV
routing protocol. In fig.3, the throughput is high
without attacker nodes than in fig.4 with attacker
nodes. This is because of few packets are being
forwarded and loss of data occurs. Because of the
packets being discarded by the attacker nodes, shows
an impact on throughput. When we compare the
throughput of both the scenarios, we find a greater
difference in throughput of both scenarios. All this
leads to lesser load on the network with attack. Load
which is 500,000 bits/sec without attack just remains
300,000 bits/sec with attack. This is because without
the presence of the attacker nodes, the network load
is high due to the proper routing of the packets to
their destinations, but with attacker nodes discarding
of the packets leads to the reduction in the network
load.
Fig.5 OLSR without attacker node
Fig.6 OLSR with attacker nodes
Fig.5 and fig.6 shows the impact of black
hole attack on the network performance under OLSR
routing protocol. As we compared the performance of
the network with and without attacker nodes under
OLSR routing protocol, the difference in the
throughput is negligible. Same is in the case of
network load; change in the network load with and
without attacker nodes is negligible.
Fig.7 DSR without attacker node
Fig. 8 DSR with attacker node
Fig.7 and fig.8 shows the impact of black hole
attack on the network performance under DSR
routing protocol. In Fig.7 green line depicts
throughput without attacker nodes which first
increases with a peak then remain constant for the
rest of the time whereas in fig.8 throughput with
attacker nodes keeps on increasing for the whole
time. Red line depicts load on the network which
slightly increases with the presence of attacker nodes.
IV. CONCLUSIONS
In this paper we analyze the impact of black
hole attack on network performance in terms of
throughput, delay and load under AODV, OLSR,
DSR routing protocols. Simulation results show that
when there are attacker nodes in the network it
Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328
1328 | P a g e
decreases the overall performance of the network by
intercepting the packets being routed from the source
node to the destination node. The impact of attacker
nodes on the network highly disrupts the performance
which leads a greater data loss.
REFERENCES
Thesis:
[1] Irshad Ullah and Shoaib Ur Rehman,
“Analysis of Black Hole Attack on Mobile
Ad hoc Networks Using Different MANET
Routing Protocols” June 2010
Journal Papers:
[2] Mohammad Al-Shurman and Seong Moo
Yoo, “Black Hole Attack in Mobile Ad Hoc
Networks,” 42nd
Annual South East Regional
Conference
[3] Hongmei Deng, Wei Li, and Dharma P.
Agrawal, “Routing Security in Wireless Ad
Hoc Network,” IEEE Communications
Magzine, vol. 40, no. 10, October 2002.
[4] Hesiri Weerasinghe and Huirong Fu,
Member of IEEE, Preventing Cooperative
Black Hole Attacks in Mobile Adhoc
Network Simulation implementation and
Evaluation ,IJSEA,Vol2,No.3,July 2008.
[5] Dinesh Mishra, Yogendra Kumar Jain,
Sudhir Agrawal, “Behavior Analysis of
Malicious Node in the Different Routing
Algorithms in Mobile Ad Hoc Network
(MANET)” International Conference on
Advances in Computing, Control, and
Telecommunication Technologies, 2009.
[6] Sanjay Ramaswamy, Huirong Fu, Manohar
Sreekantaradhya, John Dixon, and Kendall
Nygard, “Prevention of Cooperative Black
Hole Attack in Wireless Ad Hoc Networks”
International Conference on Wireless
Networks, Las Vegas, Nevada, USA.
[7] K. Lakshmi, S.Manju Priya2
A.Jeevarathinam3 K.Rama4, K. Thilagam5
“Modified AODV Protocol against Black
hole Attacks in MANET” International
Journal of Engineering and Technology
Vol.2 (6), 2010.

More Related Content

What's hot

TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionIJARIIT
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

What's hot (20)

E41022938
E41022938E41022938
E41022938
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Grayhole
GrayholeGrayhole
Grayhole
 
C0331215
C0331215C0331215
C0331215
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and Prevention
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Viewers also liked (20)

Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643
 
Hj3413671376
Hj3413671376Hj3413671376
Hj3413671376
 
Fa33921924
Fa33921924Fa33921924
Fa33921924
 
Fi33957960
Fi33957960Fi33957960
Fi33957960
 
Ew33895899
Ew33895899Ew33895899
Ew33895899
 
Ff33946949
Ff33946949Ff33946949
Ff33946949
 
Fh33953956
Fh33953956Fh33953956
Fh33953956
 
Fc33929934
Fc33929934Fc33929934
Fc33929934
 
Fz3310671070
Fz3310671070Fz3310671070
Fz3310671070
 
Nv3424352438
Nv3424352438Nv3424352438
Nv3424352438
 
C350712
C350712C350712
C350712
 
Mp3422592263
Mp3422592263Mp3422592263
Mp3422592263
 
Ab35157161
Ab35157161Ab35157161
Ab35157161
 
Ol3425172524
Ol3425172524Ol3425172524
Ol3425172524
 
Op3425432547
Op3425432547Op3425432547
Op3425432547
 
Mo3422492258
Mo3422492258Mo3422492258
Mo3422492258
 
Ou3425912596
Ou3425912596Ou3425912596
Ou3425912596
 
Oo3425382542
Oo3425382542Oo3425382542
Oo3425382542
 
Gx3412721276
Gx3412721276Gx3412721276
Gx3412721276
 
revista
revistarevista
revista
 

Similar to He3413241328

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 

Similar to He3413241328 (20)

Jt3516941700
Jt3516941700Jt3516941700
Jt3516941700
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
M017248993
M017248993M017248993
M017248993
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
J0935461
J0935461J0935461
J0935461
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Be31390392
Be31390392Be31390392
Be31390392
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

He3413241328

  • 1. Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328 1324 | P a g e Performance Evaluation of MANET with Black Hole Attack Using Routing Protocols Tarandeep Kaur1 , Amarvir Singh2 1, 2 Punjabi university, DEPT. of Computer science, Patiala, India ABSTRACT Mobile Ad hoc networks (MANET) are collection of wireless nodes that communicate with each other with the help of wireless links. MANET is vulnerable to different attacks due to its feature open medium, dynamic topology, no central authority and no clear defense mechanism. One of the attacks is black hole attack in which a malicious node intercepts the packets being transmitted to another node in the network. As the data packets do not reach the destination, Data loss occurs which affects the performance of network badly. Our aim of the paper is to analyze the impact of the Black hole attack on MANET performance and how it affects the various performance metrics of the network by comparing the network performance with and without black hole nodes. Keywords- Black hole attack, Manet, Routing protocols. I. INTRODUCTION MANET is considered a collection of wireless mobile nodes that communicate with each other without the use of a network infrastructure or central base station. Mobile nodes dynamically create routes among themselves to form own wireless network on the fly and organize themselves into a network. In such a network, each mobile node operates not only as a host but also as a router, forwarding packets for other mobile nodes in the network that may not be within direct wireless transmission range of each other. These infrastructure-less mobile nodes in ad hoc networks dynamically create routes among themselves to form own wireless network on the fly. Different applications of MANET are sensor networks, vehicle to vehicle communication, military battlefields and emergency services. These wireless links makes the MANETs more susceptible to attacks, which make it easier for the attacker to go inside the network and get access to the ongoing communication. Black hole attack is one kind of attack that a MANET suffers from. In black hole attack, a malicious node uses its routing protocol in order to advertise itself for having the shortest path to the destination node or to the packet it wants to intercept. This paper is divided into seven sections. Section 2 describes the black hole attack occurring in the network and the security issues related to the Attack. Section 3 consists of types of routing protocols that are used to find the secure path between the source and the destination node. Section 4 is of the previous work done on black hole attack. Section 5 consists of simulation methodology for analyzing the network with black hole attack and without black hole attack. Section 6 gives simulation results of our proposed model. Finally, the paper is concluded in section 7. 1.1 BLACK HOLE ATTACK Black hole attack is an attack in which malicious node uses its routing protocol to advertise itself for having the shortest path with minimum hops to the destination node whose data packet it wants to take away. In this way attacker node is always available to the nodes whose packets it wants to retain. Fig. 1.1 In figure 1.1 Node A want to send data packets to node D and initiate the route discovery mechanism by sending a Route request message to all the nodes in the network. Node C is a malicious node it presents itself for having a shortest route to the destination node as soon as it receives route request (RREQ) message. It will then respond to node A before any other node responds. In this way node A will think that this is the only shortest route and thus will complete its route discovery mechanism. Node A will ignore all other replies and will start sending data packets to node C. In this way all the data packet will be intercepted by node C. Due to these attacks, transmission of the data between the source and destination has become insecure. These attacker nodes exploit the network by becoming the part of the network. One of the reasons that make the network more susceptible to these attacks is its wireless links due to which attacker
  • 2. Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328 1325 | P a g e nodes go inside the network and starts intercepting the packets being transmitted which leads to data loss. 1.2 ROUTING PROTOCOLS The primary goal of routing protocols is to securely deliver the data packets by finding a shortest path between source and destination with minimum hops. A MANET protocol work for small sized network to large sized network. Routing protocols can be divided into proactive, reactive and hybrid protocols, depending on the routing topology. Proactive protocols are typically table driven. Examples of this type include Optimized link state routing (OLSR), Destination Sequence Distance Vector (DSDV) protocols. Reactive or source- initiated on demand protocols, do not periodically update the routing information. It is propagated to the nodes only when necessary. Example of this type includes Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector (AODV). Hybrid protocols make use of both reactive and proactive approaches. Example of this type includes Zone Routing Protocol (ZRP). II. RELATED WORK Mohammad Al-Shurman [2] has proposed solution in which host node sends a packet that includes the packet id and sequence number to destination node through three different paths. When any intermediate node or malicious node has a route to the destination node will reply to that packet. Once the source node collects all the reply from the intermediate nodes, source node will check for the secure route to the destination. Sanjay Ramaswamy [6] proposed a solution for multiple black hole nodes in a network. He modified AODV routing protocol by introducing new concept of data routing information table and cross checking. In DRI table, every intermediate node maintains a DRI table which will record information about the node traversed before and node traversed after the intermediate node. Once the data is transmitted cross checking is done to check the data loss occurred during the transmission. Hesiri Weerasinghe [4] studied the problem of cooperative black hole attack in MANET. He has compared the performance of the network in terms of throughput, end to end delay, packet loss and packet overhead by varying the number of black hole nodes, number of mobile nodes, mobility speed and the size of terrain area. Simulation results show greater reduction in terms of throughput and packet loss. K. Lakshmi [7] proposed an algorithm named Prior_ReceiveReply with six steps. In first step current time is retrieved and that current time is added to the waiting time that is set for the source node to receive route request from the intermediate nodes. Second step is of storing the RREQ destination sequence number (DSN) and node ID into a table called RR table (Route Reply). Next third step is of identifying and removing the malicious node. The first entry in the RR table with the greatest DSN is of malicious node. If the difference between the DSN of source node and the first entry in RR table is much greater than remove that first entry from the RR table. In this way a malicious node is identified and removed. In next step, second entry with higher DSN in the RR table is selected. In the last step, with that entry the default process is continued. Dinesh [5] analyzed the behavior of malicious node in different routing protocols in MANET. He proposed a solution for finding a safe route by waiting and checking the replies received from the intermediate nodes. He observed the network under varying network mobility with maximum speed of 10m/s. He concluded that AODV routing protocol results in a better performance with black hole nodes than DSR in terms of throughput. III. SIMULATION METHODOLOGY OPNET modeler 14.5 is used to develop the simulation and analysis for this paper. Six different scenarios have been created in which 60 mobile nodes have been kept in a campus network. Out of those 60 mobile nodes, 15 nodes are made black hole nodes or malicious nodes by changing some of their parameters. All these nodes are configured mobile by using profile configuration. Two different applications file transfer protocol (FTP) for heavy load and hypertext transfer protocol (HTTP) for heavy browsing are being used to analyze the performance. Simulation focuses on performance of network with and without black hole attack by changing the routing protocols. Three different routing protocols have been employed on these six scenarios. These routing protocols are Ad hoc on demand routing protocol (AODV), Optimized link state routing protocol (OLSR) and Dynamic source routing protocol (DSR). Network throughput, delay, and load are taken into account to perform simulation using routing protocols.
  • 3. Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328 1326 | P a g e Fig 2. Network model We use the following metrics to evaluate the protocols. LOAD (BITS/SEC): Load represents the total load (in bits/sec) submitted to wireless LAN layers by all higher layers in all WLAN nodes of the network THROUGHPUT: Throughput represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN nodes of the network. DELAY (SEC): Delay represents the end to end delay of all the packets received by the wireless LAN MACs of all WLAN nodes in the network and forwarded to the higher layer. This delay includes medium access delay at the source MAC, reception of all the fragments individually, and transfers of the frames via AP, if access point functionality is enabled. 3.1 SIMULATION RESULTS Simulation is done for 600 seconds for each scenario and overlaid statistics of these performance metrics for each protocol have been obtained. Table 1. Simulation Parameters Initial topology Empty scenario Size 10*10 km Model family MANET Network scale campus Data rate 11 mbps Speed 5m/s Technology WLAN (AD HOC) Nodes 60 Attacker nodes 15 Mobility model Random waypoint Routing protocols AODV,OLSR, DSR Operational mode 802.11b Packet inter-arrival time Constant(0.03) Packet size Uniform(140,160) Trajectory Vector Simulation time 600 seconds The following graph depicts the nature of each routing protocol by taking into account the performance metrics with and without the attacker node. Fig.3 AODV without attacker nodes Fig.4 AODV with attacker nodes
  • 4. Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328 1327 | P a g e Fig.3 and fig. 4 shows the impact of black hole attack on the network performance under AODV routing protocol. In fig.3, the throughput is high without attacker nodes than in fig.4 with attacker nodes. This is because of few packets are being forwarded and loss of data occurs. Because of the packets being discarded by the attacker nodes, shows an impact on throughput. When we compare the throughput of both the scenarios, we find a greater difference in throughput of both scenarios. All this leads to lesser load on the network with attack. Load which is 500,000 bits/sec without attack just remains 300,000 bits/sec with attack. This is because without the presence of the attacker nodes, the network load is high due to the proper routing of the packets to their destinations, but with attacker nodes discarding of the packets leads to the reduction in the network load. Fig.5 OLSR without attacker node Fig.6 OLSR with attacker nodes Fig.5 and fig.6 shows the impact of black hole attack on the network performance under OLSR routing protocol. As we compared the performance of the network with and without attacker nodes under OLSR routing protocol, the difference in the throughput is negligible. Same is in the case of network load; change in the network load with and without attacker nodes is negligible. Fig.7 DSR without attacker node Fig. 8 DSR with attacker node Fig.7 and fig.8 shows the impact of black hole attack on the network performance under DSR routing protocol. In Fig.7 green line depicts throughput without attacker nodes which first increases with a peak then remain constant for the rest of the time whereas in fig.8 throughput with attacker nodes keeps on increasing for the whole time. Red line depicts load on the network which slightly increases with the presence of attacker nodes. IV. CONCLUSIONS In this paper we analyze the impact of black hole attack on network performance in terms of throughput, delay and load under AODV, OLSR, DSR routing protocols. Simulation results show that when there are attacker nodes in the network it
  • 5. Tarandeep Kaur, Amarvir Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1324-1328 1328 | P a g e decreases the overall performance of the network by intercepting the packets being routed from the source node to the destination node. The impact of attacker nodes on the network highly disrupts the performance which leads a greater data loss. REFERENCES Thesis: [1] Irshad Ullah and Shoaib Ur Rehman, “Analysis of Black Hole Attack on Mobile Ad hoc Networks Using Different MANET Routing Protocols” June 2010 Journal Papers: [2] Mohammad Al-Shurman and Seong Moo Yoo, “Black Hole Attack in Mobile Ad Hoc Networks,” 42nd Annual South East Regional Conference [3] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Network,” IEEE Communications Magzine, vol. 40, no. 10, October 2002. [4] Hesiri Weerasinghe and Huirong Fu, Member of IEEE, Preventing Cooperative Black Hole Attacks in Mobile Adhoc Network Simulation implementation and Evaluation ,IJSEA,Vol2,No.3,July 2008. [5] Dinesh Mishra, Yogendra Kumar Jain, Sudhir Agrawal, “Behavior Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET)” International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009. [6] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks” International Conference on Wireless Networks, Las Vegas, Nevada, USA. [7] K. Lakshmi, S.Manju Priya2 A.Jeevarathinam3 K.Rama4, K. Thilagam5 “Modified AODV Protocol against Black hole Attacks in MANET” International Journal of Engineering and Technology Vol.2 (6), 2010.