Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Secure routing proposals in manets a reviewijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
SECURE ROUTING PROPOSALS IN MANETS: A REVIEWijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
More Related Content
Similar to ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ PERFORMANCE IN NS-2
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Secure routing proposals in manets a reviewijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
SECURE ROUTING PROPOSALS IN MANETS: A REVIEWijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Similar to ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ PERFORMANCE IN NS-2 (20)
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ PERFORMANCE IN NS-2
1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
DOI 10.5121/ijcsea.2023.13402 19
ANALYZING THE IMPACT OF BLACKHOLE
ATTACKS ON AODV AND DSR ROUTING
PROTOCOLS’ PERFORMANCE IN NS-2
Ferdinand Alifo1
, Mustapha Awinsongya yakubu2
, Martin Doe3
and Michael
Asante4
1
MIS/Computer Dep., Ministry of Local Government, Local Gov’t Service.
2
University of Cincinnati Ohio, USA
3
Computer Science Department, University of Business and Integrated Development
Studies, Ghana
4
Department of Computer Science, Kwame Nkrumah University of Science and
Technology, Ghana
ABSTRACT
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone-
2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
KEYWORDS
Performance Analyss, AODV, DSR, MANET, Protocols, Security, Blackhole, NS2
1. INTRODUCTION
Routing protocols have a crucial role in Mobile Ad hoc Network (MANET) research,
concentrating on guaranteeing efficient and secure communication. [1]. Several routing protocols
have been specifically developed for MANETs, including AODV, DSR, DSDV, OLSR, among
others. MANETs encounter vulnerabilities attributed to factors such as an open access medium,
dynamic topology changes, absence of central administration or monitoring systems, cooperative
algorithms, and transparent protective mechanisms [2]. Due to their attractive features, MANETs
are vulnerable to malicious activities. Therefore, emphasizing security concerns becomes crucial
to enhance network availability, data reliability, and privacy. Since MANETs function wirelessly,
they are susceptible to different forms of attacks, including Blackhole attacks, saturating attacks,
routing table overflow attacks, Denial of Service (DoS) attacks, Sybil attacks and impersonation
attacks, [3]. These threats pose a serious risk to the availability, integrity, and confidentiality of
network services. Among these threats, the Blackhole Attack stands out as one of the most
dangerous attacks on MANETs. This attack has been known to have a considerable impact on
MANET reactive routing protocols, such as Ad-hoc OnDemand Distance Vector (AODV) and
2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
20
Dynamic Source Routing (DSR) [4]. To ensure network services' availability and safeguard user
privacy, it is imperative to address network security issues. This research utilizes the NS2
Simulator to investigate the performance of AODV and DSR protocols in Mobile Ad Hoc
Networks (MANETs) using various metrics, including Average Throughput, Packet Delivery
Ratio (PDR), and Residual Energy at the destination node. The primary objective of the paper is
to assess how the AODV and DSR routing protocols respond to a Blackhole attack and how this
security risk impacts crucial variables such as packet delivery ratio, average throughput, and
residual energy. Moreover, the study analyzes the existing body of knowledge on evaluating
routing protocol performance under security attacks, gaining insights into the behavior and
effectiveness of AODV and DSR during a Blackhole attack.
MANETs are gaining popularity in diverse sectors due to their wireless network connectivity and
cable-free convenience. However, their vulnerability to security attacks, particularly Blackhole
attacks, raises significant concerns. By scrutinizing the behavior of AODV and DSR routing
protocols under Blackhole attacks, this research yields valuable insights into these vulnerabilities
and can potentially inform strategies to bolster MANET security.
2. RELATED WORKS
[3]discusses Mobile Ad hoc Networks (MANETs), which are dynamic, infrastructure-less
wireless networks comprising mobile, self-organized nodes. Routing protocols in MANETs find
routes between nodes for communication. The study highlights that numerous routing protocols
are designed to handle dynamic topology changes. However, MANET's characteristics, like
openness and restricted resources, make it vulnerable to security attacks, especially Distributed
Denial of Service (DDoS) attacks. DDoS attacks consume system resources, affecting the
efficiency of nodes and making them unavailable to legitimate users. The research aims to use a
simulation model called DDoS-Sim to examine the impact of DDoS attacks on routing protocols
like AODV, DSR, and DSDV. The model utilizes the NS-2 network simulator to apply DDoS
attacks on the selected routing protocols and analyze their performance in terms of packet
delivery fraction and end-to-end delay.
In [5], a Mobile Ad Hoc Network (MANET) consists of freely and mobile nodes that form a
temporary dynamic wireless network without any fixed infrastructure. These nodes act as both
hosts and routers, forwarding data packets to their destinations. The communication and
connectivity are facilitated by routing protocols like Ad hoc On -Demand Distance Vector
(AODV).
However, due to the lack of security measures and the absence of infrastructure, MANETs are
vulnerable to various security threats and attacks. This paper investigates the impact of two types
of attacks, namely Blackhole and Wormhole Attacks, on the AODV routing protocol using
Network Simulator version 2 (NS2) environment. The goal of these attacks is to prevent data
packets from reaching their intended destinations.
Given the prevalence of mobile devices in today's world, the authors in [6] have conducted a
comprehensive review to explore various routing protocol technologies applicable to MANETs.
The study covers different types of routing protocols, their classifications, routing techniques,
geographical coverage, route metric, route repository, and route reconfiguration strategies in
detail. The [6] compares the various routing protocols discussed in the study, highlighting their
respective areas of strength. Additionally, the research examines network simulators that have
these protocols enabled by default to gain insights into their practical implementation.
3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
21
The authors in [7] proposed a cooperative analysis method to detect malicious nodes in MANETs.
The mechanism involves protocols working together to analyze and reliably identify malicious
nodes. They validate their method through simulations using mobile nodes and different routing
protocols such as AODV, DSR, OLSR, and DSDV. The results show that the malicious node
detection rate is excellent, with low overhead, a relatively high packet delivery proportion, and
quick response times, particularly when there are changes in mobility speed.
According to [8], Mobile Ad hoc Networks (MANETs), routing protocols' performance is
negatively affected by various network attacks, including black hole and rushing attacks. The
vulnerability to these attacks extends to all layers of mobile ad hoc networks. MANETs lack
centralized administration control and infrastructure, making them less secure. The paper
evaluates the Ad hoc On-Demand Distance Vector (AODV) routing protocol under rushing
attacks, black hole attacks, and grayhole attacks. The study assesses the network's performance
under different attack scenarios, considering various factors like speed, network size, node
density, and the number of attacking nodes. Performance metrics such as average throughput,
average end-to-end delay, and packet delivery ratio are used for evaluation. The results show that
the attacks lead to poor throughput, increased packet dropping, and higher end-to-end delays in
the network. AODV is relatively less affected by rushing attacks compared to black hole and
grayhole attacks.
In [9], the authors proposed an approach called Stable-Ad hoc On Demand Distance Vector
(AODV) to enhance the routing performance of AODV in mobile ad hoc networks. The approach
aims to improve route stability by considering node's residual energy and link quality, estimated
through received signal power, against dynamic threshold values for hop selection during route
discovery. If both values exceed their thresholds, the node increases the stability factor of the
route before forwarding the route request (RREQ) packet. This process continues until the
destination node is reached. If a later duplicate RREQ packet with a better stability factor arrives,
the node processes it. Additionally, the approach maintains local neighborhood information
through hello messages. When a node receives a hello message from its neighbor, it updates the
neighbor table based on its current residual energy and link connectivity status using distance and
hello message delay parameters. Simulation results demonstrate that the proposed Stable-AODV
algorithm outperforms traditional AODV in terms of packet delivery ratio, throughput, delay,
control message overhead, and normalized routing load.
The authors of [10] proposed an enhanced trust model for securing data transfer in Mobile Ad hoc
Networks (MANETs) against malicious attacks. The proposed scheme combines blind trust and
referential trust to establish a more robust trust model. To achieve this, the trust relationship
function is integrated with the dynamic source routing (DSR) protocol, making the protocol more
secure. The authors conduct a thorough analysis of the DSR protocol and generate performance
matrices for packet-related data, including packets sent, packets received, packets loss, and
throughput. They also evaluate the effectiveness of the improved trust establishment scheme by
implementing three algorithms in the NS2 simulator to detect and prevent various types of
attacks.
The main focus of the paper is to enhance the security of data transfer in MANETs by introducing
a trust-based approach and integrating it with the DSR protocol for better protection against
malicious attacks. The proposed scheme is evaluated and compared against different types of
attacks through simulations in the NS2 simulator.
In [11], the authors introduced the Dynamic Source Routing (DSR) Protocol to enhance quality-
ofservice (QoS) by calculating path reliability and link sustainability criteria. The protocol uses
node energy, centrality, degree, and link cost to select relay nodes. Qualified relaying nodes are
4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
22
utilized to transmit data packets from the source node to the cluster head (CH). The suggested
technique outperforms other existing routing protocols in terms of packet loss ratio, energy
consumption, and delay. It achieves a lower packet loss ratio of approximately 4%, which is 3%
less than the existing methods.
3. METHODOLOGY
In this paper, we employ the ns-2.35 simulator on Ubuntu LINUX to simulate Blackhole attack
on the AODV and DSR routing protocols using Object Tool Command Language (OTCL). This
simulation enables us to examine and compare the performance metrics of both protocols when
the network was exposed to a Blackhole attack. Through these simulations, we were able to
assess the behaviour and effectiveness of AODV and DSR in the presence of such an attack. By
utilizing ns-2.35 as our simulation tool, we were able to evaluate how the Blackhole attack affects
the routing protocols and draw significant findings about their performance under the metrics.
3.1. Performance Metrics
This study employed three key metrics to evaluate the research work. The first metric, Average
Throughput, measures the average data transmission rate within the network, reflecting its overall
performance. The second metric, PDR (Packet Delivery Ratio), is essential as it indicates the
proportion of successfully delivered packets, providing insights into reliability and minimizing
data losses. The third metric, Residual Energy, assesses the energy levels of nodes, offering
valuable information on network efficiency and longevity.
3.2. Simulation Parameters
Simulation parameters govern a model's actions and qualities, influencing outcomes and findings.
They can be modified to examine various situations or circumstances as shown in table 2.
Table 1. Simulation Parameters
Parameter Settings
Channel type Channel/Wireless channel
Propagation Model Propagation/TwoRayGround
Physical Type Phy/WirelessPhysical
Mac Protocol Type Mac/802_11
Interface queue type Queue/DropTail/CMU/PriQueue
Link layer type LL
Antenna model Antenna/OmniAntenna
Maximum packet in queue 50
Number of mobile nodes 17
Routing protocol AODV and DSR
Transmission Range 550 Meters
Interference Range 550 Meters
Start Time/Stop Time 1 Second/15 Seconds
Packet in queue 5, 10, 15, 20, 25, 30
Number of Blackholes nodes 2
5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
23
3.3. Routing Topology
Routing topology is the plan arrangement of conceptual elements (nodes) in a communication
network. For this study, fifteen (15) legitimate nodes and two (2) malicious nodes were set in the
topography of 956m by 600m simulation environment. Two commands nam AODV.nam and
nam DSR.nam were executed to invoke network animator (NAM) to show the path for AODV
and DSR respectively with N
Figure 1: Screenshot of NAM with 17 nodes including two false nodes
3.4. Simulator Execution and setup
Following the successful assembly of NS-2 version ns-allinone-2.35 via Ubuntu on VMware
station 16, Six (6) important files required for simulation were copied to the installation folder's
home directory for execution. The Six (6) files comprises of;
• Blackhole.tcl
• average_throu.awk
• energy.awk
• pdr.awk
• AODV.tr
• DSR.tr
Location path for these files;
2.35/bin:/home/ferdinand/ns-allinone-
2.35/Blackhole/home/ferdinand/ns-allinone-2.35/ns-
#PATH
PATH=$PATH:/home/ferdinand/ns-allinone-2.35/bin:/home/ferdinand/nsallinone-
2.35/tcl11.5.0/unix:/home/ferdinand/ns-allinone-2.35/tk11.5.0/unix
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/ferdinand/ns-allinone-
2.35/otcl-1.14:/home/ferdinand/ns-allinone-2.35/lib NS=/home/ferdinand/ns-allinone-2.35 /ns-
2.35/
NAM=/home/ferdinand/ns-allinone-2.35 /nam-
1.14/ PATH=$PATH:$XGRAPH:$N$S:$$NAM
6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
24
3.5. Simulation Experiment for AODV
After validating the NS-2.35 installation and modifying all of the parameters, changes were made
to the Blackhole.tcl file to simulate the AODV routing protocol;
• Interface queue type was set to Queue/DropTail/PriQueue
• Routing protocol was set to AODV tcl file was created as Blackhole.tcl
• trace file was set to tracefile [open AODVblack.tr B]
• nam file for path was set to namfile [open AODVblack.nam B]
• node 10 and node 11 were set as Blackhole node
• packets in queue [5, 10, 15, 20, 25, and 30]
3.6. Simulation Experiment for DSR
After validating the NS-2.35 installation and modifying all of the parameters, the Blackhole.tcl
file was modified to simulate the DSR routing protocol:
• Interface queue type was set to CMUPriQueue
• Routing protocol was set to DSR
• tcl file was created as Blackhole.tcl
• trace file was set to tracefile [open DSRblack.tr B]
• nam file for topology was set to namfile [open DSRblack.nam B]
• nam file for path was set to namfile [open AODVblack.nam B]
• node 10 and node 11 were set as Blackhole node
4. RESULT AND ANALYSIS
Table 3 showing Average Throughput, Packet Delivery Ratio, and Residual Energy as
performance metrics and data sizes displays the simulation results for AODV and DSR.
Table 2: Results of performance metrics for AODV and DSR with data sizes
Protocol
Speed/Data
Average
Throughput
Packet Delivery
Ratio(PDR) Residual
Energy (J)
Size
AODV
5
0.288707 0.993377 1.57784
DSR 0.327946 0.983577 1.410075
AODV
10
0.328707 0.993449 3.155679
DSR 0.367946 0.983725 2.820152
AODV
15
0.368707 0.993521 4.733519
DSR 0.407946 0.983871 4.230228
AODV
20
0.408707 0.99359 6.311358
DSR 0.447946 0.984014 5.640304
AODV
25
0.448707 0.993658 7.889198
DSR 0.487946 0.984155 7.05038
7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
25
AODV
30
0.488707 0.993724 9.467037
DSR 0.527946 0.984293 8.460455
4.1. Average Throughput Analysis
Average throughput analysis is a technique employed to assess the mean rate at which data is
transmitted within a specific time frame in a given system.
Figure 2. A graph of Average Throughput for AODV and DSR
DSR has higher throughput compared to AODV under Blackhole attack as shown in figure 2, due
to its ability to detect and avoid malicious routes, enabling successful packet transmission.
Additionally, DSR uses efficient routing mechanisms, reducing overhead and maintaining higher
throughput even under attack.
4.2. Packet Delivery Ratio Analysis
Packet Delivery Ratio (PDR) analysis was employed to assess the efficiency and dependability of
transmitting data packets within the communication system.
Figure 3. A graph of Packet Delivery Ratio for AODV and DSR
8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
26
AODV outperforms DSR in PDR under Blackhole attack as shown in figure 3 due to better route
detection and avoiding malicious node routes. AODV's efficient routing mechanisms enable
lower overhead transmission, ensuring higher PDR even under attack.
4.3. Residual Energy Analysis
Residual energy analysis was utilized to evaluate the energy levels that remain in nodes within
energy-constrained systems like wireless sensor networks.
Figure 4. A graph of Residual Energy for AODV and DSR
AODV is more energy-efficient than DSR under Blackhole attack as shown in figure 4, due to its
ability to detect and avoid malicious routes, while DSR is more vulnerable. AODV's efficient
routing mechanisms require less energy to transmit packets, allowing nodes to conserve energy
even during attacks.
5. CONCLUSIONS
This study conducted a performance analysis of the AODV and DSR routing protocols under
Blackhole attacks, using PDR, Residual Energy, and Average Throughput as metrics. The
simulation results indicated that DSR had a higher Throughput but AODV had better PDR and
Residual Energy. These findings can help MANET network designers and managers select the
best protocols for their unique network requirements. .
ACKNOWLEDGEMENTS
We express our gratitude to the reviewers for their thorough examination of the paper, as well as
their valuable comments and suggestions that significantly enhanced the quality of the
manuscript. Also, our gratitude goes to University of Science and Technology KNUST, Kumasi
and University of Cincinnati, Ohio for their support
REFERENCES
[1] B. H. Khudayer et al., "A Comparative Performance Evaluation of Routing Protocols for Mobile
Ad-hoc Networks," International Journal of Advanced Computer Science and Applications, vol. 14,
no. 4, 2023.
9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 13, No. 2/3/4, August 2023
27
[2] S. Al-Emadi and A. Al-Mohannadi, "Towards enhancement of network communication architectures
and routing protocols for FANETs: A survey," in 2020 3rd International Conference on Advanced
Communication Technologies and Networking (CommNet), 2020: IEEE, pp. 1-10.
[3] M. T. Sultan, H. El Sayed, and M. A. Khan, "Performance Analysis of the Impact of DDoS Attack
on Routing Protocols in Infrastructure-less Mobile Networks," in 2022 5th International Conference
on Communications, Signal Processing, and their Applications (ICCSPA), 2022: IEEE, pp.1-6.
[4] T. Safdar Malik, M. N. Siddiqui, M. Mateen, K. R. Malik, S. Sun, and J. Wen, "Comparison of
blackhole and wormhole attacks in cloud MANET enabled IoT for agricultural field
monitoring," Security and Communication Networks, vol. 2022, 2022.
[5] M. H. Al Rubaiei, H. S. Jassim, and B. T. Sharef, "Performance analysis of black hole and worm
hole attacks in MANETs," International Journal of Communication Networks and Information
Security, vol. 14, no. 1, pp. 126-131, 2022.
[6] A. C. Onuora, E. E. Essien, and P. Ana, "A Comprehensive Review of Routing Protocols for Mobile
Ad Hoc Networks (Manets)," International Journal of Information System and Computer
Science (IJISCS) Vol, vol. 6, pp. 1-13, 2022.
[7] K. Thamizhmaran, "Secure Analysis of Routing Protocol under Wormhole for MANET," Journal
of Advancement in Electronics Design, vol. 5, no. 2, pp. 47-52, 2022.
[8] P. Sarao, "Performance Analysis of MANET under Security Attacks," J. Commun., vol. 17, no. 3,
pp.194-202, 2022.
[9] P. Pandey and R. Singh, "Efficient ad hoc on demand distance vector routing protocol based on
route stability in MANETs," International Journal of Wireless Information Networks, vol. 29, no. 3,
pp. 393-404, 2022.
[10] S. A. Syed and A. Shahzad, "Enhanced dynamic source routing for verifying trust in mobile ad hoc
network for secure routing," International Journal of Electrical and Computer Engineering, vol. 12,
no. 1, p. 425, 2022.
[11] C. N. Kishore and H. V. Kumar, "Dynamic source routing protocol for robust path reliability and
link sustainability aware routing in wireless communication," Optik, vol. 282, p. 170036, 2023.
AUTHORS
Ferdinand Alifo is the Head of ICT/MIS department with Ministry of Local Government
in Ghana. He holds an MSc Information Technology from KNUST, a BSc in Computer
Science, and His expertise is further validated by his certifications in Cisco Certified
Network Professional (CCNP) and Cisco Certified Network Associate (CCNA).
Throughout his career, Ferdinand has made significant contributions to improving IT
systems and services within the government and private sectors
Mustapha Awinsongya Yakubu is a Graduate Teaching Assistant at the University of
Cincinnati where he is currently studying for PhD Information Technology. His research
focuses in areas of Enterprise Architecture & Security, Human Computer Interaction, and
Crisis Informatics. He earned his Master’s degree in Information Technology from the
Kwame Nkrumah University of Science and Technology. He has over a decade experience
working in both public and private sector as an IT Professional.
Martin Doe is a Ph.D student at the University of Business and integrated development
Studies, Ghana. He had MPhil in Information Technology at the Department of Computer
Science in the Kwame Nkrumah University of Science and Technology, Ghana. His
research area includes Cyber Security, computer networks and internet of things.
Prof. Michael Asante is an Associate Professor in Computer Science at the Department of
Computer Science at the Kwame Nkrumah University of Science and Technology, Ghana.
His research areas include Computer Security, Cyber Security, and Network