SlideShare a Scribd company logo
Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1487-1491

Performance Evaluation of Routing Protocol like AODV and DSR
                  under Black Hole Attacks
                             Pradish Dadhania*, Sachin Patel**
                 *(Department of Information Technology, RGPV University, Indore (INDIA)
                ** (Department of Information Technology, RGPV University, Indore (INDIA)



ABSTRACT
The Wireless mobile ad hoc network (MANET)              is used in many areas. Such as in disaster hit areas,
is a self-configuring network which is composed         data collection in some region, in rescue missions,
of several movable mobile nodes. These mobile           virtual classes and conferences [8]. This concept
nodes communicate with each other without any           with ad hoc network makes the full name of mobile
infrastructure. As wireless ad-hoc networks lack        ad hoc network (MANET). By growing the
an infrastructure, they are exposed to a lot of         network, combined with the node mobility the
attacks. One of these attacks is the Black Hole         challenges of self configuration of the network
attack. In Black Hole attack, a malicious node          become more evident.
falsely advertises shortest path to the destination
node and absorbs all data packets in it. In this        Security in MANET is a very critical and important
way, all packets in the network are dropped. In         issue and many techniques were defined for the
this paper, performance of AODV and DSR are             security of MANET. Intrusion detection technique
evaluated in presence of black hole attack              is investigated in [8].Mobile nodes in the network
(malicious node) and without black hole attack          waste much energy by joining in and out with
with CBR traffic under different scalable               connection to wireless network. This connection
network mobility.                                       and reconnection create energy limitation in the
In this paper, via simulation, we evaluate effect       wireless network. The main purpose of developing
and compare it with standard protocol in terms          the ad hoc routing protocols is to cope with the
of throughput, Packet delivery ratio and End to         dynamic nature of MANET. The routing protocols
End Delay. We have conducted extensive                  efficiency can be determined by the battery power
experiments using the network simulator-2 to            consumption. Energy is consumed during
validate our research.                                  participation of a node in a network and also in
                                                        routing of traffic.
Keywords - MANET, ADOV, DSR, Black hole,
                                                        There are mainly three types of routing protocol
I. INTRODUCTION                                         and they are proactive, reactive and hybrid routing
The mentioned before an ad hoc network is a             protocol. Proactive routing protocol is table driven
wireless network, which do not have a centralized       where as reactive routing protocol is on demand
and fixed infrastructure. MANET is referred to as a     routing protocol. AODV and DSR both are on
wireless ad hoc network in which nodes are free to      demand protocol. But the difference between both
move arbitrarily and mobile nodes can transmit and      of these is, DSR a route cache is maintained and
receive the traffic. Also mobile nodes can act like     due to this over head of memory increases. But in
routers by forwarding the neighbors traffic to the      case of AODV, it is a source initiate routing
destination node as the routers are multi hop           protocol. I n this, routing table is maintained by
devices [8]. MANET does not need base stations of       every mobile node and this routing table consist of
wired infrastructure. The mobile nodes in wireless      next node information for a route to the destination
network range can communicate with each other           node. The intermediate nodes between the source
because it is a self organized network. The mobile      and destination are responsible for finding a fresh
nodes form a network automatically without a fixed      path to the destination in route discovery process of
infrastructure and central management [8]. The          AODV protocol. Malicious node immediately
mobile nodes have transmitters and receivers with       responses to such route discovery process giving
smart antennas, which enable the mobile nodes to        false information of having a fresh enough path to
communicate with each others.                           destination. Source node assumes that it is sending
                                                        data packets through a true path but actually it
The topology of the network changes every time by       sending the data packets to malicious node. Apart
getting in and out of the mobile nodes in the           from the malicious node, black hole attack can
network. In the beginning MANET was designed            occur due to damaged node, unintentionally
for military use but now the MANET                      dropping of data packets.

                                                                                            1487 | P a g e
Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1487-1491
                                                         source route. It may send that reply along the
II. OVERVIEW OF AODV AND DSR                             source route in reverse order or issue a ROUTE
    ROUTING PROTOCOLS                                    REQUEST including the route to get back to the
                                                         source, if the former is not possible due to
2.1 The Ad hoc on-Demand Distance Vector                 asymmetric links. ROUTE REPLY messages can
     PROTOCOL                                            be triggered by ROUTE REQUEST messages or
AODV is on demand routing, means it start its            are gratuitous. After receiving one or several
routing process only when any node in the network        routes, the source selects the best (by default the
desire to transmit the data packets. In AODV, next       shortest), stores it, and sends messages along that
hop information is started by each node in it a          path. The better the route metrics (number of hops,
routing table. When a source node cannot reach to        delay, bandwidth, or other criteria) and the sooner
the destination node directly, then the source node      the REPLY arrives at the source, the higher the
will immediately initiate a route discovery process.     preference given to the route and the longer it will
AODV uses several control packets like Route             stay in the cache. When a ROUTE REPLY arrives
Request (RREQ), Route Reply (RREP) and Route             very quickly after a ROUTE REQUEST has been
Error Process (RERR). RREQ message is                    sent out this is an indication of a short path, since
broadcasted, RREP message is unicasted back to           the nodes are required to wait for a time
source of RREQ, and RERR message is used to              corresponding to the length of the route they can
notify the loss of link to other node. Route             advertise, before sending it. This is done in order to
discovery is initiated by broad casting a RREQ to        avoid a storm of replies. In case of a link failure,
its neighbor and this RREQ is rebroadcasted to           the node that cannot forward the packet to the next
their neighbor until it reaches to the destination       node sends an error message towards the source.
node. When destination node receives the RREQ, it        Routes that contain a failed link can be `salvaged'
sends the RREP message to the sender node Routes         by taking an alternate partial route that does not
are maintained in the source node as long as they        contain the bad link.
are needed. Routing table are maintained by every
node and have fields like destination, number of         3   BLACK          HOLE        ATTACKS           ON
hops, next hops, destination sequence number, life           MANET
time, active neighbor. To find the freshness of
route towards destination, sequence number is            MANETs face various securities threats i.e. attack
used. Attacks on AODV can be performed easily as         that are passed out against them to interrupt the
AODV does not have any centrally administered            normal performance of the networks. Black hole
secure routers. Attackers from outside or inside can     attack is one of the security threat in which the
easily exploit the network. AODV supports shared         traffic is redirect to such a node that actually does
wireless medium and dynamic topology. It is              not exist in the network. In these attacks, black hole
capable of both unicast and multicast routing. It        attack is that kind of attack which occurs in Mobile
avoids count to infinity problem of other Distance       Ad-Hoc networks (MANET). In black hole attack,
–vector protocol. It is flat routing protocol and does   a malicious node uses its routing protocol in order
not need any central administrative system to            to endorse itself for having the shortest path to the
handle the routing process. It does not require any      destination node or to the packet it wants to
permanent link between the nodes to transfer data.       interrupt. This destructive node advertises its
For transferring the data temporary link would           availability of new routes irrespective of checking
suffice for time being. AODV needs less protection       its routing table. In this way attacker node will
of control message. It is enough to protect RREQ         always have the availability in replying to the route
and RREP message in order to provide the security        request and thus intercept the data packet and retain
to the protocol.                                         it [6]. In protocol based on flooding, the malicious
2.2 Dynamic Source Routing protocol                      node reply will be received by the requesting node
                                                         before the response of reply from actual node;
Dynamic Source Routing is a protocol developed           hence a malicious and forged route is created.
for routing in mobile ad-hoc networks and was            When this route is establish, now it is up to the
proposed for MANET by Broch, Johnson, and                node whether to drop all the packets or promote it
Maltz [2]. In a nutshell, it works as follows: Nodes     to the unknown address [7]. The black hole attack
send out a ROUTE REQUEST message, all nodes              has two properties. First, the node exploits the
that receive this message put themselves into the        mobile ad-hoc routing protocol, such as AODV, to
source route and forward it to their neighbors,          promote itself as having a valid route to a target
unless they have received the same request before.       node, even though the route is false, with the aim
If a receiving node is the destination, or has a route   of intercepting packets. Second, the attacker
to the destination, it does not forward the request,     consumes the intercepted packets without any
but sends a REPLY message containing the full            forwarding. However, the attacker runs the risk that
                                                         neighboring nodes will check and represent the

                                                                                              1488 | P a g e
Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 3, Issue 1, January -February 2013, pp.1487-1491
ongoing attacks. There is a more delicate form of    size, the overall performance of the protocols can
these attacks when an attacker selectively forward   be compared in terms of three parameters:
packets. An attacker suppress or modifies packets
originating from some nodes, while leaving the       5.1.1     Throughput
data from the other nodes unchanged, which limits    Throughput or network throughput is the average
the suspicion of its wrongdoing.                     rate of successful message delivery over a
                                                     communication channel. The throughput is usually
                                                     measured in bits per second (bit/s or bps), and
                                                     sometimes in data packets per second or data
                                                     packets per time slot. From graph we can analyze
                                                     as number of node increase in network throughput
                                                     gets better.



        Fig: 1 - BLACK HOLE ATTACKS

4   SIMULATION SET UP

The simulation is implemented In Network
Simulator 2 [8], a simulator for mobile Adhoc
networks. The simulation parameters are provided
in Table 3. We implement the random waypoint
movement model for the simulation, in which a
node starts at a random position, waits for the
pause time, and then moves to another random
position with a velocity chosen between 0 m/s to
                                                            Fig: 2 throughput Of DSR(Sesr.1) and
the maximum simulation speed. A packet size of
                                                                       AODV(ser.2)
512 bytes and a transmission rate of 4
packets/s,congestion of the network are not likely   5.1.2 Average end-to-end delay of data packets
to occur.                                            There are possible delays caused by buffering
Parameter Value                                      during route discovery latency, queuing at the
Examined Protocol         AODV DSR                   interface queue, retransmission delays at the MAC,
Application traffic       CBR                        and propagation and transfer times. Once the time
Transmission range        250 m                      difference between every CBR packet sent and
Packet size               512 bytes                  received was recorded, dividing the total time
Transmission rate         4 packets/sec              difference over the total number of CBR packets
Pause time                10 s                       received gave the average end-to-end delay for the
Maximum speed             20 m/s                     received packets. This metric describes the packet
Simulation time           1000 s                     delivery time: the lower the end-to-end delay the
Number of nodes           10,20,30,40,50 (attack     better the application performance.
                          result on only 50 nodes)
Area                      1000 m * 1000 m
Propagation Model         Free space
Maximum Malicious         10/4
nodes
Movement Model            Random waypoint
Types of attack           Black-hole

5   RESULTS AND DISCUSSIONS

To ensure a high-quality product, diagrams and
lettering MUST be either computer-drafted or
drawn using India ink.

5.1 DSR and AODV are with 50 nodes without
    attack.                                          Fig: 3 Average end-to-end delay Of DSR (Series 1)
                                                                   and AODV (series 2)
Considering the mobility of nodes and the network


                                                                                       1489 | P a g e
Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and
                    Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 3, Issue 1, January -February 2013, pp.1487-1491
5.1.3    Packet Delivery Ratio
                                                                    Throughput(kbps) vs number of malicious
                                                                                   nodesa
Packet delivery ratio can be calculated as the ratio          120
between the number of data packets that are sent by
the source and the number of data packets that are            100
received by the sink. Graph shows as the number of             80
node increase it gets better because probability of
path breakage decrease.                                        60
                                                               40
                                                               20
                                                                0
                                                                         2            4         6            8         10
                                                                     MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS



                                                                Fig 5 throughput Of DSR and AODV with
                                                                             malicious nodes

                                                            Fig shows the graph for end to end delay. Graph
                                                            shows as the number of malicious node increase it
                                                            gets decrease output. In the DSR End to end delay
                                                            is decreased and in AODV that increased.


                                                                    number of malicious nodes Vs End to End
Fig 4 Packet Delivery Ratio of DSR (Series 1) and                                    delay
                AODV (series 2)
                                                              100
5.2 DSR and AODV are with 50 nodes with                        80
    attack.
                                                               60
It is observed from the Fig that, the impact of the            40
Black hole attack to the Networks throughput. The
                                                               20
throughput of the network also decreases due to
black hole effect as compared to without the effect             0
of black hole attack. We vary the speed of the node                     2         4        6         8           10
                                                                    MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS
and take the result to the different node speed.


    Throughput(kbps) vs number of malicious
                                                                    number of malicious nodes Vs End to End
                    nodes                                                            delay
  120                                                        100
  100
                                                               80
   80
                                                               60
   60
                                                               40
   40
                                                               20
   20
                                                                0
    0
                                                                        2         4         6            8        10
            2         4        6         8         10               MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS
        MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS




                                                               Fig 6 Average end-to-end delay Of DSR and
                                                                      AODV with malicious nodes

                                                            Fig shows the graph plotted between the numbers
                                                            of malicious nodes and the packet delivery ratio. It


                                                                                                    1490 | P a g e
Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and
                       Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 3, Issue 1, January -February 2013, pp.1487-1491
is inferred from the graph that since there is no               Hole attack than DSR.
mechanism available to detect malicious node in
DSR, the packet delivery ratio decreases as the no              REFERENCES
of malicious node increases.                                      [1]   Varsha Patidar,Rakesh Verma, “Risk
                                                                        Mitigation of Black Hole Attack for Aodv
      Packet Delivery Ratio in % vs number of
                                                                        Routing Protocol,” IOSRJCE, Volume 3,
                  malicious nodes                                       Issue 3,July-Aug.
     1                                                            [2]   N. Bhalaji, A. R. Sivaramkrishnan,
                                                                        Sinchan Banerjee, V. Sundar, and A.
    0.8
                                                                        Shanmugam. , “Trust Enhanced Dynamic
    0.6                                                                 Source     Routing Protocol,”        World
                                                                        Academy of Science, Engineering and
    0.4                                                                 Technology 49 2009.
                                                                  [3]   C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox,
    0.2                                                                 and M. Miller, “Rotation, scale, and
                                                                        translation resilient public watermarking
     0                                                                  for images,” IEEE Trans. Image Process.,
               2         4         6         8         10               vol. 10, no. 5, pp. 767-782, May 2001.
           MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS
                                                                  [4]   Nor Surayati Mohamad Usop, Azizol
                                                                        Abdullah, Ahmad Faisal Amri Abidin,
            Packet Delivery Ratio in % vs number of                     „„Performance Evaluation of AODV,
                        malicious nodes                                 DSDV & DSR Routing Protocol in Grid
                                                                        Environment‟‟, IJCSNS International
      1                                                                 Journal of Computer Science and Network
                                                                        Security, VOL.9 No.7, July 2009 Q. Feng
     0.8
                                                                        , Z. Cai, J. Yang, and X. Hu . "A
     0.6                                                                Performance Comparison of the Ad Hoc
                                                                        Network Protocols." Second International
     0.4                                                                Workshop on Computer Science and
                                                                        Engineering. 2009.
     0.2                                                          [5]   E. Gerhards-Padilla, N. Aschenbruch, and
                                                                        P. Martini. "Detecting Black Hole Attacks
      0                                                                 in Tactical MANETs using Topology
                   2      4        6         8         10               Graphs." 32nd IEEE Conference on Local
            MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS
                                                                        Computer Networks. 2007.
                                                                  [6]   Rajiv      Misra       and     C.R.Manda,
 Fig 7: Packet Delivery Ratio Of DSR and AODV
                                                                        „„Performance          Comparison         of
               with malicious nodes.
                                                                        AODV/DSR           On-demand       Routing
                                                                        Protocols for Ad Hoc Networks in
6         CONCLUSION                                                    Constrained Situation‟‟, Indian Institute of
                                                                        Technology, Kharagpur (India).
We have done simulation for 50 nodes ad hoc                       [7]   Vahid Nazari Talooki & Koorush Ziarati,
network. As a traffic parameter we have used                            „„Performance Comparison of Routing
Constant Bit Rate. As far as mobility concern we                        Protocols For Mobile Ad Hoc Networks‟‟,
are using Random Way Point Model. We have                               Dept. of Computer Science and
taken average of 10 simulations to make result                          Engineering, School of Engineering,
more appropriate. We analyze both protocols in                          Shiraz University
terms of throughput, Delay, Routing Overhead and                  [8]   marjan kuchaki rafsanjani, ali movaghar,
Packet Delivery Ratio.                                                  and faroukh koroupi, „„Investigating
We have analyzed during Black Hole Attack, based                        Intrusion Detection Systems in MANET
on the number of attacker, the Packet Delivery                          and Comparing IDSs for Detecting
Ratio is high or low. If the number of them                             Misbehaving Nodes‟‟, World Academy of
increases, the Packet Delivery Ratio is low,                            Science, Engineering and Technology 44
because we are dropping data packets. As far as                         2008.
throughput concern, as number of malicious node
increase our throughput decreases because nodes
are not able to find path towards destination and
that causes dropping. Based on our research and
analysis of simulation result we draw the
conclusion that AODV is more vulnerable to Black


                                                                                                   1491 | P a g e

More Related Content

What's hot

Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
Editor IJCATR
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
ijcncs
 
E41022938
E41022938E41022938
E41022938
IJERA Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
IJECEIAES
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
Kishan Patel
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
ijsrd.com
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
journal ijrtem
 

What's hot (19)

Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
E41022938
E41022938E41022938
E41022938
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
A2546035115
A2546035115A2546035115
A2546035115
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 

Similar to Hu3114871491

Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
IJERA Editor
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
Fransiskeran
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
International Journal of Engineering Inventions www.ijeijournal.com
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
IJERA Editor
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
J0935461
J0935461J0935461
J0935461
IOSR Journals
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
prj_publication
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
Editor IJCATR
 
G343741
G343741G343741
G343741
IJERA Editor
 
G343741
G343741G343741
G343741
IJERA Editor
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
C0331215
C0331215C0331215
C0331215
iosrjournals
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
ijcsa
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
IJERA Editor
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
IDES Editor
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 

Similar to Hu3114871491 (20)

Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
525 529
525 529525 529
525 529
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
J0935461
J0935461J0935461
J0935461
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
C0331215
C0331215C0331215
C0331215
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 

Hu3114871491

  • 1. Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1487-1491 Performance Evaluation of Routing Protocol like AODV and DSR under Black Hole Attacks Pradish Dadhania*, Sachin Patel** *(Department of Information Technology, RGPV University, Indore (INDIA) ** (Department of Information Technology, RGPV University, Indore (INDIA) ABSTRACT The Wireless mobile ad hoc network (MANET) is used in many areas. Such as in disaster hit areas, is a self-configuring network which is composed data collection in some region, in rescue missions, of several movable mobile nodes. These mobile virtual classes and conferences [8]. This concept nodes communicate with each other without any with ad hoc network makes the full name of mobile infrastructure. As wireless ad-hoc networks lack ad hoc network (MANET). By growing the an infrastructure, they are exposed to a lot of network, combined with the node mobility the attacks. One of these attacks is the Black Hole challenges of self configuration of the network attack. In Black Hole attack, a malicious node become more evident. falsely advertises shortest path to the destination node and absorbs all data packets in it. In this Security in MANET is a very critical and important way, all packets in the network are dropped. In issue and many techniques were defined for the this paper, performance of AODV and DSR are security of MANET. Intrusion detection technique evaluated in presence of black hole attack is investigated in [8].Mobile nodes in the network (malicious node) and without black hole attack waste much energy by joining in and out with with CBR traffic under different scalable connection to wireless network. This connection network mobility. and reconnection create energy limitation in the In this paper, via simulation, we evaluate effect wireless network. The main purpose of developing and compare it with standard protocol in terms the ad hoc routing protocols is to cope with the of throughput, Packet delivery ratio and End to dynamic nature of MANET. The routing protocols End Delay. We have conducted extensive efficiency can be determined by the battery power experiments using the network simulator-2 to consumption. Energy is consumed during validate our research. participation of a node in a network and also in routing of traffic. Keywords - MANET, ADOV, DSR, Black hole, There are mainly three types of routing protocol I. INTRODUCTION and they are proactive, reactive and hybrid routing The mentioned before an ad hoc network is a protocol. Proactive routing protocol is table driven wireless network, which do not have a centralized where as reactive routing protocol is on demand and fixed infrastructure. MANET is referred to as a routing protocol. AODV and DSR both are on wireless ad hoc network in which nodes are free to demand protocol. But the difference between both move arbitrarily and mobile nodes can transmit and of these is, DSR a route cache is maintained and receive the traffic. Also mobile nodes can act like due to this over head of memory increases. But in routers by forwarding the neighbors traffic to the case of AODV, it is a source initiate routing destination node as the routers are multi hop protocol. I n this, routing table is maintained by devices [8]. MANET does not need base stations of every mobile node and this routing table consist of wired infrastructure. The mobile nodes in wireless next node information for a route to the destination network range can communicate with each other node. The intermediate nodes between the source because it is a self organized network. The mobile and destination are responsible for finding a fresh nodes form a network automatically without a fixed path to the destination in route discovery process of infrastructure and central management [8]. The AODV protocol. Malicious node immediately mobile nodes have transmitters and receivers with responses to such route discovery process giving smart antennas, which enable the mobile nodes to false information of having a fresh enough path to communicate with each others. destination. Source node assumes that it is sending data packets through a true path but actually it The topology of the network changes every time by sending the data packets to malicious node. Apart getting in and out of the mobile nodes in the from the malicious node, black hole attack can network. In the beginning MANET was designed occur due to damaged node, unintentionally for military use but now the MANET dropping of data packets. 1487 | P a g e
  • 2. Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1487-1491 source route. It may send that reply along the II. OVERVIEW OF AODV AND DSR source route in reverse order or issue a ROUTE ROUTING PROTOCOLS REQUEST including the route to get back to the source, if the former is not possible due to 2.1 The Ad hoc on-Demand Distance Vector asymmetric links. ROUTE REPLY messages can PROTOCOL be triggered by ROUTE REQUEST messages or AODV is on demand routing, means it start its are gratuitous. After receiving one or several routing process only when any node in the network routes, the source selects the best (by default the desire to transmit the data packets. In AODV, next shortest), stores it, and sends messages along that hop information is started by each node in it a path. The better the route metrics (number of hops, routing table. When a source node cannot reach to delay, bandwidth, or other criteria) and the sooner the destination node directly, then the source node the REPLY arrives at the source, the higher the will immediately initiate a route discovery process. preference given to the route and the longer it will AODV uses several control packets like Route stay in the cache. When a ROUTE REPLY arrives Request (RREQ), Route Reply (RREP) and Route very quickly after a ROUTE REQUEST has been Error Process (RERR). RREQ message is sent out this is an indication of a short path, since broadcasted, RREP message is unicasted back to the nodes are required to wait for a time source of RREQ, and RERR message is used to corresponding to the length of the route they can notify the loss of link to other node. Route advertise, before sending it. This is done in order to discovery is initiated by broad casting a RREQ to avoid a storm of replies. In case of a link failure, its neighbor and this RREQ is rebroadcasted to the node that cannot forward the packet to the next their neighbor until it reaches to the destination node sends an error message towards the source. node. When destination node receives the RREQ, it Routes that contain a failed link can be `salvaged' sends the RREP message to the sender node Routes by taking an alternate partial route that does not are maintained in the source node as long as they contain the bad link. are needed. Routing table are maintained by every node and have fields like destination, number of 3 BLACK HOLE ATTACKS ON hops, next hops, destination sequence number, life MANET time, active neighbor. To find the freshness of route towards destination, sequence number is MANETs face various securities threats i.e. attack used. Attacks on AODV can be performed easily as that are passed out against them to interrupt the AODV does not have any centrally administered normal performance of the networks. Black hole secure routers. Attackers from outside or inside can attack is one of the security threat in which the easily exploit the network. AODV supports shared traffic is redirect to such a node that actually does wireless medium and dynamic topology. It is not exist in the network. In these attacks, black hole capable of both unicast and multicast routing. It attack is that kind of attack which occurs in Mobile avoids count to infinity problem of other Distance Ad-Hoc networks (MANET). In black hole attack, –vector protocol. It is flat routing protocol and does a malicious node uses its routing protocol in order not need any central administrative system to to endorse itself for having the shortest path to the handle the routing process. It does not require any destination node or to the packet it wants to permanent link between the nodes to transfer data. interrupt. This destructive node advertises its For transferring the data temporary link would availability of new routes irrespective of checking suffice for time being. AODV needs less protection its routing table. In this way attacker node will of control message. It is enough to protect RREQ always have the availability in replying to the route and RREP message in order to provide the security request and thus intercept the data packet and retain to the protocol. it [6]. In protocol based on flooding, the malicious 2.2 Dynamic Source Routing protocol node reply will be received by the requesting node before the response of reply from actual node; Dynamic Source Routing is a protocol developed hence a malicious and forged route is created. for routing in mobile ad-hoc networks and was When this route is establish, now it is up to the proposed for MANET by Broch, Johnson, and node whether to drop all the packets or promote it Maltz [2]. In a nutshell, it works as follows: Nodes to the unknown address [7]. The black hole attack send out a ROUTE REQUEST message, all nodes has two properties. First, the node exploits the that receive this message put themselves into the mobile ad-hoc routing protocol, such as AODV, to source route and forward it to their neighbors, promote itself as having a valid route to a target unless they have received the same request before. node, even though the route is false, with the aim If a receiving node is the destination, or has a route of intercepting packets. Second, the attacker to the destination, it does not forward the request, consumes the intercepted packets without any but sends a REPLY message containing the full forwarding. However, the attacker runs the risk that neighboring nodes will check and represent the 1488 | P a g e
  • 3. Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1487-1491 ongoing attacks. There is a more delicate form of size, the overall performance of the protocols can these attacks when an attacker selectively forward be compared in terms of three parameters: packets. An attacker suppress or modifies packets originating from some nodes, while leaving the 5.1.1 Throughput data from the other nodes unchanged, which limits Throughput or network throughput is the average the suspicion of its wrongdoing. rate of successful message delivery over a communication channel. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. From graph we can analyze as number of node increase in network throughput gets better. Fig: 1 - BLACK HOLE ATTACKS 4 SIMULATION SET UP The simulation is implemented In Network Simulator 2 [8], a simulator for mobile Adhoc networks. The simulation parameters are provided in Table 3. We implement the random waypoint movement model for the simulation, in which a node starts at a random position, waits for the pause time, and then moves to another random position with a velocity chosen between 0 m/s to Fig: 2 throughput Of DSR(Sesr.1) and the maximum simulation speed. A packet size of AODV(ser.2) 512 bytes and a transmission rate of 4 packets/s,congestion of the network are not likely 5.1.2 Average end-to-end delay of data packets to occur. There are possible delays caused by buffering Parameter Value during route discovery latency, queuing at the Examined Protocol AODV DSR interface queue, retransmission delays at the MAC, Application traffic CBR and propagation and transfer times. Once the time Transmission range 250 m difference between every CBR packet sent and Packet size 512 bytes received was recorded, dividing the total time Transmission rate 4 packets/sec difference over the total number of CBR packets Pause time 10 s received gave the average end-to-end delay for the Maximum speed 20 m/s received packets. This metric describes the packet Simulation time 1000 s delivery time: the lower the end-to-end delay the Number of nodes 10,20,30,40,50 (attack better the application performance. result on only 50 nodes) Area 1000 m * 1000 m Propagation Model Free space Maximum Malicious 10/4 nodes Movement Model Random waypoint Types of attack Black-hole 5 RESULTS AND DISCUSSIONS To ensure a high-quality product, diagrams and lettering MUST be either computer-drafted or drawn using India ink. 5.1 DSR and AODV are with 50 nodes without attack. Fig: 3 Average end-to-end delay Of DSR (Series 1) and AODV (series 2) Considering the mobility of nodes and the network 1489 | P a g e
  • 4. Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1487-1491 5.1.3 Packet Delivery Ratio Throughput(kbps) vs number of malicious nodesa Packet delivery ratio can be calculated as the ratio 120 between the number of data packets that are sent by the source and the number of data packets that are 100 received by the sink. Graph shows as the number of 80 node increase it gets better because probability of path breakage decrease. 60 40 20 0 2 4 6 8 10 MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS Fig 5 throughput Of DSR and AODV with malicious nodes Fig shows the graph for end to end delay. Graph shows as the number of malicious node increase it gets decrease output. In the DSR End to end delay is decreased and in AODV that increased. number of malicious nodes Vs End to End Fig 4 Packet Delivery Ratio of DSR (Series 1) and delay AODV (series 2) 100 5.2 DSR and AODV are with 50 nodes with 80 attack. 60 It is observed from the Fig that, the impact of the 40 Black hole attack to the Networks throughput. The 20 throughput of the network also decreases due to black hole effect as compared to without the effect 0 of black hole attack. We vary the speed of the node 2 4 6 8 10 MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS and take the result to the different node speed. Throughput(kbps) vs number of malicious number of malicious nodes Vs End to End nodes delay 120 100 100 80 80 60 60 40 40 20 20 0 0 2 4 6 8 10 2 4 6 8 10 MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS Fig 6 Average end-to-end delay Of DSR and AODV with malicious nodes Fig shows the graph plotted between the numbers of malicious nodes and the packet delivery ratio. It 1490 | P a g e
  • 5. Pradish Dadhania, Sachin Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1487-1491 is inferred from the graph that since there is no Hole attack than DSR. mechanism available to detect malicious node in DSR, the packet delivery ratio decreases as the no REFERENCES of malicious node increases. [1] Varsha Patidar,Rakesh Verma, “Risk Mitigation of Black Hole Attack for Aodv Packet Delivery Ratio in % vs number of Routing Protocol,” IOSRJCE, Volume 3, malicious nodes Issue 3,July-Aug. 1 [2] N. Bhalaji, A. R. Sivaramkrishnan, Sinchan Banerjee, V. Sundar, and A. 0.8 Shanmugam. , “Trust Enhanced Dynamic 0.6 Source Routing Protocol,” World Academy of Science, Engineering and 0.4 Technology 49 2009. [3] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, 0.2 and M. Miller, “Rotation, scale, and translation resilient public watermarking 0 for images,” IEEE Trans. Image Process., 2 4 6 8 10 vol. 10, no. 5, pp. 767-782, May 2001. MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS [4] Nor Surayati Mohamad Usop, Azizol Abdullah, Ahmad Faisal Amri Abidin, Packet Delivery Ratio in % vs number of „„Performance Evaluation of AODV, malicious nodes DSDV & DSR Routing Protocol in Grid Environment‟‟, IJCSNS International 1 Journal of Computer Science and Network Security, VOL.9 No.7, July 2009 Q. Feng 0.8 , Z. Cai, J. Yang, and X. Hu . "A 0.6 Performance Comparison of the Ad Hoc Network Protocols." Second International 0.4 Workshop on Computer Science and Engineering. 2009. 0.2 [5] E. Gerhards-Padilla, N. Aschenbruch, and P. Martini. "Detecting Black Hole Attacks 0 in Tactical MANETs using Topology 2 4 6 8 10 Graphs." 32nd IEEE Conference on Local MALICIOUS MALICIOUS MALICIOUS MALICIOUS MALICIOUS Computer Networks. 2007. [6] Rajiv Misra and C.R.Manda, Fig 7: Packet Delivery Ratio Of DSR and AODV „„Performance Comparison of with malicious nodes. AODV/DSR On-demand Routing Protocols for Ad Hoc Networks in 6 CONCLUSION Constrained Situation‟‟, Indian Institute of Technology, Kharagpur (India). We have done simulation for 50 nodes ad hoc [7] Vahid Nazari Talooki & Koorush Ziarati, network. As a traffic parameter we have used „„Performance Comparison of Routing Constant Bit Rate. As far as mobility concern we Protocols For Mobile Ad Hoc Networks‟‟, are using Random Way Point Model. We have Dept. of Computer Science and taken average of 10 simulations to make result Engineering, School of Engineering, more appropriate. We analyze both protocols in Shiraz University terms of throughput, Delay, Routing Overhead and [8] marjan kuchaki rafsanjani, ali movaghar, Packet Delivery Ratio. and faroukh koroupi, „„Investigating We have analyzed during Black Hole Attack, based Intrusion Detection Systems in MANET on the number of attacker, the Packet Delivery and Comparing IDSs for Detecting Ratio is high or low. If the number of them Misbehaving Nodes‟‟, World Academy of increases, the Packet Delivery Ratio is low, Science, Engineering and Technology 44 because we are dropping data packets. As far as 2008. throughput concern, as number of malicious node increase our throughput decreases because nodes are not able to find path towards destination and that causes dropping. Based on our research and analysis of simulation result we draw the conclusion that AODV is more vulnerable to Black 1491 | P a g e