This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
1. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
DOI: 10.5121/ijnsa.2019.11201
PERFORMANCE
PROTOCOLS
1
School of Business and Technology, Gloucestershire University, Cheltenham, England
ABSTRACT
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
KEYWORDS
Mobile Ad-Hoc Networks, DSR, AODV, Routing Protocols, Wireless Network Security, Malicious Node,
Network Performance
1. INTRODUCTION
Mobile ad-hoc networks are composed of a number of wireless mobile devices called nodes as
shown in figure 1. These networks have no fixed infrastructure and no central administration.
MANETs are characterised by resource constraints, dynamic topology, and openness to wire
media. However, wireless networks have a number of vulnerabilities, which may be exploited by
hackers to gain access to the network to steal or tamper with data [4, 11].
In this paper, the performance of two MANET’s routing protocols; Ad
Vector (AODV) and Dynamic Source Routing (DSR) have been analysed under malicious attacks
[10].
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
ERFORMANCE ANALYSIS OF ROUTING
ROTOCOLS IN MANET UNDER MALICIOUS
ATTACKS
Dr. Gorine1
and Rabia Saleh
School of Business and Technology, Gloucestershire University, Cheltenham, England
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey
hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
hole attacks have been applied to two important MANET routing protocols;
hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the network performance based on throughput, average delay,
packet loss and consumption of energy.
Hoc Networks, DSR, AODV, Routing Protocols, Wireless Network Security, Malicious Node,
works are composed of a number of wireless mobile devices called nodes as
shown in figure 1. These networks have no fixed infrastructure and no central administration.
MANETs are characterised by resource constraints, dynamic topology, and openness to wire
media. However, wireless networks have a number of vulnerabilities, which may be exploited by
hackers to gain access to the network to steal or tamper with data [4, 11].
In this paper, the performance of two MANET’s routing protocols; Ad-hoc On deman
Vector (AODV) and Dynamic Source Routing (DSR) have been analysed under malicious attacks
Figure 1. MANET architecture
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
1
OUTING
ALICIOUS
School of Business and Technology, Gloucestershire University, Cheltenham, England
types of security attacks such as selfish nodes, grey-
hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such
hole attacks have been applied to two important MANET routing protocols;
hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
network performance based on throughput, average delay,
Hoc Networks, DSR, AODV, Routing Protocols, Wireless Network Security, Malicious Node,
works are composed of a number of wireless mobile devices called nodes as
shown in figure 1. These networks have no fixed infrastructure and no central administration.
MANETs are characterised by resource constraints, dynamic topology, and openness to wireless
media. However, wireless networks have a number of vulnerabilities, which may be exploited by
hoc On demand Distance
Vector (AODV) and Dynamic Source Routing (DSR) have been analysed under malicious attacks
2. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
2
2. RELATED WORK
Mobile Ad Hoc Networks routing protocols have been the subject of intense research in the past
20 years. Many researchers have been studying the performance of a single protocol under
several attacks, but attempts are carried out on performance analysis of routing protocols under
malicious attacks.
In [15], the authors evaluated the performance of AODV routing under black-hole, grey-hole,
selfish and flooding attacks. Their finding is that black-hole and flooding attacks have a severe
impact on the AODV performance compared to selfish and grey-hole attacks.
In 2016, the authors [16], also focused on the impact of the black hole, flooding and rushing
attacks against AODV. They compared the performance of AODV under attacks with the original
AODV in terms of Packet Delivery Ratio, Average End to End Delay and Average Throughput.
They concluded that the performance of AODV degrades under the attacks. Their finding is that
black hole attack has a higher significant effect on the network performance than flooding and
rushing attacks.
In [17], the authors conducted a comparative study between AODV and DSR routing protocols,
but under wormhole attacks only. Their simulation results show that DSR performs better than
AODV under wormhole attacks in MANET. They concluded that the high performance of DSR is
due to the alternative data delivery path provided by DSR.
However, in our research paper, a comparative study between AODV and DSR routing protocols
subject to several attacks including back-hole, grey-hole and selfish node attacks.
3. SECURITY GOALS
The majority of previous security studies define five major security goals which are required for
attacks' prevention [7].
Like all wireless networks, MANETs need is to achieve the security goals, such as
confidentiality, authentication, integrity, availability, and data freshness.
3.1. DATA CONFIDENTIALITY
Routing and packet forwarding information must remain confidential. To keep the confidentiality,
it is required to ensure to disclose data packets to authorized nodes only. Data encryption is a
common method of ensuring confidentiality
3.2. DATA AUTHENTICATION
Authentication ensures that data packets or communications between nodes are accessible by only
authorised nodes. Without authentication, a malicious node can masquerade as a trusted node in
MANET and can have a negative impact on data transmission between nodes.
3.3. DATA INTEGRITY
Integrity ensures that data must not be changed in transit, and steps must be taken to ensure that
data cannot be altered by unauthorized nodes.
3. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
3
For example, a malicious node may add some packets or modify data within a packet before
forwarding the corrupt data to its neighbour.
3.4. DATA AVAILABILITY
Availability ensures that services provided by nodes should be available to their users even under
attacks, such as energy starvation, denial of service and a misbehaving node.
3.5. DATA FRESHNESS
Even if confidentiality and data integrity have been achieved it is imperative to ensure that no old
data have been replayed. This requirement of fresh data is important when dealing with shared-
keys which need to be changed over time.
4. ROUTING PROTOCOLS IN MANET
Protocols are defined as the set of rules which are used by network devices to communicate
between them. Due to mobility nature of nodes of MANET and the dynamic network topology,
an effective routing protocol is needed to manage the communication between the nodes within
the network.
Routing protocols in MANET’s routing protocols are divided into two groups; proactive and
reactive routing protocols [1].
In this paper, the performance of two MANET’s routing protocols; Ad-hoc on demand Distance
Vector (OADV) and Dynamic Source Routing (DSR) have been analysed under normal operation
4.1. AD-HOC ON DEMAND DISTANCE VECTOR ROUTING (AODV)
Ad hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks
(MANETs) and other wireless ad hoc networks with a large number of mobile nodes [14]. The
protocol’s algorithm creates a route between two nodes only when the route is requested by the
source node. This route will remain active as long as the source node has data packets to send to
the destination node. However the route will be dropped as soon as the source stops sending data
packets.
AODV uses optimisation; this will reduce the overhead in the network. Optimisation in AODV,
being the “time-to-live” field will limit propagation in route requests when they are sent. The
time-to-live field can fluctuate if there is no route reply.
4.2. DYNAMIC SOURCE ROUTING (DSR)
DSR is a fully reactive routing protocol [17]. It is a source routing protocol meaning that a packet
carried in the network contains an ordered list of all nodes through which the packet must be
routed.
The DSR protocol is composed of two mechanisms that work together to allow the discovery and
maintenance of source routes in the ad hoc network as shown in figure 2:
• Route Discovery is the mechanism by which a node S wishing to send a packet to a
destination node D obtains a source route to D. Route Discovery is used only when S
attempts to send a packet to D and does not already know a route to D.
4. International Journal of Network Security & Its Applications
• Route Maintenance is the mechanism by which node S is able to detect, while using a
source route to D, if the network topology has changed such that it can no longer use its
route to D because a link along the route no longer works. When Route Maintenance
indicates a source route is broken, S can attempt to use any other route it happens to know to
D, or can invoke Route Discovery again to find a new route. Route Maintenance is used only
when S is actually sending packets to D.
5. SECURITY THREATS
Due to the lack of infrastructure and the dynamic nature of MANET, they are more likely to be
open to attacks [2], which may disturb the relationship of trust between nodes. These MANETs'
characteristics allow attackers to readily target the network and
jamming and disturbing the communication between trusted nodes.
In mobile ad-hoc networks, attacks can be classified as active and passive attacks [3]. In passive
attacks, attackers only listen to the traffic for information with
process, which compromises confidentiality such as snooping, eavesdropping, traffic analysis and
monitoring. Whereas active attacks destroy, steal or modify useful information as well as
damaging network operations, such a
routing attacks and selfish attacks.
In this paper, three types of attacks have been investigated; these are grey
attacks and selfish node attacks.
5.1. SELFISH NODES ATTACKS
A selfish node is a type of routing protocol attack at the Data link layer, in which a malicious
node deviates from the original routing and forwarding of packets.
Due to the limitation of resources
resources by refusing to forward packets to other nodes [5]. There are two types of selfish nodes:
• The first type shares the routing table
destinations.
• The second type do not share their
routing protocol, a selfish node may decide to drop all RREQ packets received or not forwarding
a route reply RREP packet to its destination.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
Route Maintenance is the mechanism by which node S is able to detect, while using a
source route to D, if the network topology has changed such that it can no longer use its
because a link along the route no longer works. When Route Maintenance
indicates a source route is broken, S can attempt to use any other route it happens to know to
D, or can invoke Route Discovery again to find a new route. Route Maintenance is used only
when S is actually sending packets to D.
Figure 2. DSR protocol diagram
HREATS IN MANET
Due to the lack of infrastructure and the dynamic nature of MANET, they are more likely to be
open to attacks [2], which may disturb the relationship of trust between nodes. These MANETs'
characteristics allow attackers to readily target the network and jeopardis
jamming and disturbing the communication between trusted nodes.
hoc networks, attacks can be classified as active and passive attacks [3]. In passive
attacks, attackers only listen to the traffic for information without disturbing the normal routing
process, which compromises confidentiality such as snooping, eavesdropping, traffic analysis and
monitoring. Whereas active attacks destroy, steal or modify useful information as well as
damaging network operations, such as wormhole, black hole, grey hole, information disclosure,
and selfish attacks.
In this paper, three types of attacks have been investigated; these are grey-hole attacks, black
attacks and selfish node attacks.
TTACKS
A selfish node is a type of routing protocol attack at the Data link layer, in which a malicious
node deviates from the original routing and forwarding of packets.
to the limitation of resources wireless networks, selfish nodes seek to conserve their
resources by refusing to forward packets to other nodes [5]. There are two types of selfish nodes:
t type shares the routing table but drops packets instead of forwarding them to their
• The second type do not share their routing tables, with their neighbours. For example, in DSR
routing protocol, a selfish node may decide to drop all RREQ packets received or not forwarding
a route reply RREP packet to its destination.
(IJNSA) Vol. 11, No.2, March 2019
4
Route Maintenance is the mechanism by which node S is able to detect, while using a
source route to D, if the network topology has changed such that it can no longer use its
because a link along the route no longer works. When Route Maintenance
indicates a source route is broken, S can attempt to use any other route it happens to know to
D, or can invoke Route Discovery again to find a new route. Route Maintenance is used only
Due to the lack of infrastructure and the dynamic nature of MANET, they are more likely to be
open to attacks [2], which may disturb the relationship of trust between nodes. These MANETs'
se its resources by
hoc networks, attacks can be classified as active and passive attacks [3]. In passive
out disturbing the normal routing
process, which compromises confidentiality such as snooping, eavesdropping, traffic analysis and
monitoring. Whereas active attacks destroy, steal or modify useful information as well as
s wormhole, black hole, grey hole, information disclosure,
hole attacks, black-hole
A selfish node is a type of routing protocol attack at the Data link layer, in which a malicious
, selfish nodes seek to conserve their own
resources by refusing to forward packets to other nodes [5]. There are two types of selfish nodes:
but drops packets instead of forwarding them to their
routing tables, with their neighbours. For example, in DSR
routing protocol, a selfish node may decide to drop all RREQ packets received or not forwarding
5. International Journal of Network Security & Its Applications
5.2. BLACK HOLE ATTACKS
Black-hole attacks happen at the Ne
nodes that it has the shortest route to their destination node. The malicious node will drop all data
packets or implement man-in
number (3) sends fake routing information by advertising that it has the shortest path to the
destination node (4). When the node (1) wants to send a packet data to the node (4), it will initiate
route discovery. The malicious node (3) intercepts the RREQ pa
the sender node (1). If the reply from the malicious node (3) reaches the source first, then the
sender node (1) disregards all other RREP messages and start sending packets through node (3).
Therefore, all packets are lost o
5.3. GREY HOLE ATTACKS
The grey-hole attack takes place at the network layer and can be used as a slow poison in the
network side [12].
A grey-hole attack happens when a
destination node with the intention of intercepting data packet. However instead of forwarding the
data packet, the malicious node (i.e. the grey
three ways:
• Drops packets sent by specific nodes while forwarding packets sent by the other nodes.
• The malicious node drops all packets received within a specific period of time and forward
packets later.
• The grey-hole drops the intercepted packets randomly and
• The grey-hole attack is more difficult to detect than the black hole attack in which the
malicious node drops all the packets received.
6. METHODOLOGY
Three types of research methods are used for evaluating the performance of wireless
physical measurement, analytical methods and network simulation.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
TTACKS
hole attacks happen at the Network layer [6], in which a malicious node declares to other
nodes that it has the shortest route to their destination node. The malicious node will drop all data
in-the-middle attack. For example in figure 3, the malicious node
mber (3) sends fake routing information by advertising that it has the shortest path to the
destination node (4). When the node (1) wants to send a packet data to the node (4), it will initiate
route discovery. The malicious node (3) intercepts the RREQ packet and sends a reply RREP to
the sender node (1). If the reply from the malicious node (3) reaches the source first, then the
sender node (1) disregards all other RREP messages and start sending packets through node (3).
Therefore, all packets are lost or consumed at the malicious node.
Figure 3. Black hole attack
TTACKS
hole attack takes place at the network layer and can be used as a slow poison in the
hole attack happens when a malicious node advertises itself as having a valid route to the
destination node with the intention of intercepting data packet. However instead of forwarding the
e malicious node (i.e. the grey-hole) may exhibit its malicious behaviour in one of
Drops packets sent by specific nodes while forwarding packets sent by the other nodes.
The malicious node drops all packets received within a specific period of time and forward
hole drops the intercepted packets randomly and forward other packets.
hole attack is more difficult to detect than the black hole attack in which the
malicious node drops all the packets received.
Three types of research methods are used for evaluating the performance of wireless
physical measurement, analytical methods and network simulation.
(IJNSA) Vol. 11, No.2, March 2019
5
twork layer [6], in which a malicious node declares to other
nodes that it has the shortest route to their destination node. The malicious node will drop all data
middle attack. For example in figure 3, the malicious node
mber (3) sends fake routing information by advertising that it has the shortest path to the
destination node (4). When the node (1) wants to send a packet data to the node (4), it will initiate
cket and sends a reply RREP to
the sender node (1). If the reply from the malicious node (3) reaches the source first, then the
sender node (1) disregards all other RREP messages and start sending packets through node (3).
hole attack takes place at the network layer and can be used as a slow poison in the
advertises itself as having a valid route to the
destination node with the intention of intercepting data packet. However instead of forwarding the
hole) may exhibit its malicious behaviour in one of
Drops packets sent by specific nodes while forwarding packets sent by the other nodes.
The malicious node drops all packets received within a specific period of time and forward
forward other packets.
hole attack is more difficult to detect than the black hole attack in which the
Three types of research methods are used for evaluating the performance of wireless networks:
6. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
6
In this research paper, a network simulator called ns2 is selected as it is currently the best-known
network simulation package for research into wireless networks [8,13]. ns-2 is written in C++,
which uses MIT’s Object Tool Command Language (OTcl) as the command and configuration
interface.
The simulator is invoked via the ns interpreter and the OTcl scripts defined the simulation rules.
ns-2 provides substantial support for the simulation of TCP/ UDP, routing, multicast protocols
over both wired and wireless, local and satellite network.
Currently ns-2 development is supported by the Defence Advanced Research Projects Agency
(DARPA).
7. IMPLEMENTATION
In this research paper, NS2 (v2.34) is used as the network simulator [9] and was run under
Ubuntu v14.04 operating system.
The network consists of 50 wireless nodes spread randomly in a terrain area of 700m x 1000m
with simulated waypoint mobility model time of 100, 300, 500, 700 and 900 seconds. The
simulation used the random, which has become a "benchmark" model for evaluating the routing
protocols of MANET.
The aim of the simulation is to evaluate the network performance by measuring the following
parameters: throughput, average delay, packet loss and energy per byte.
These parameters are defined as follow:
• Throughput: The total number of packets successfully received by the destination node.
• Packet Loss: The number of packets dropped during the simulation.
• Average delay: The average time taken by data packets to travel between the source and
destination nodes.
• Energy per byte: The amount of energy consumed by nodes to transmit and receive the
number of data packets.
In this experiment, the performance of two protocols namely; Dynamic Source Routing (DSR)
and Ad-Hoc on Demand Distance Vector (AODV) are evaluated in two separate scenarios. The
first one when the network is operating under normal conditions (i.e. without attacks or malicious
nodes) and the second scenario, the network is operating under attacks (i.e. with some malicious
nodes). The simulation is repeated ten times split equally between AODV and DSR protocols
with different time scale (100, 300, 500, 700 and 900).
8. RESULTS OF SIMULATION OF MANET UNDER ATTACKS
In this part of the experiment, the network is simulated under attack by several malicious nodes
including black-hole attack, selfish node attack and grey-hole attack under both AODV and DSR
protocols.
The selfish nodes are implemented to drop just route request and route reply, because if a node is
not involved in route discovery, it will not be used in forwarding data packets. However, black
hole nodes are implemented to drop data packets, forward routing requests and reply packets,
because the attack affect routing operation. By contrast, the grey-hole attack is similar to the
7. International Journal of Network Security & Its Applications
black hole attack with inconsistent behaviour, as it will drop selective data packets and forward
others.
8.1. SELFISH NODES ATTACKS
THROUGHPUT OF THE PRO
In Figure 4 the graph shows the throughput in the protocols with selfish nodes, in which their
percentages vary from 10% to 50%. It is clear that AODV is much better than DSR to deliver
packets successfully in this kind of attack.
Figure 4. Throughput of
AVERAGE DELAY OF THE PROTOCOL
As can be seen from Figure 5, average delay of DSR is higher than AODV. Because DSR is an
On-Demand source routing protocol, this can be considered as the major reason fo
route is discovered only when needed and also, the mechanism for route discovery happens each
time as well as, several paths to the destination is di
delay. On the other hand, AODV has just one path for
is updated permanently based on a sequence number. Thus, that leads to a slight end to end delay.
Also, AODV was not impacted very much with increase in the percentage of selfish nodes, unlike
DSR, which was impacted when selfish nodes increased
Figure 5. Average delay of the protocols with selfish nodes
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
black hole attack with inconsistent behaviour, as it will drop selective data packets and forward
TTACKS
HROUGHPUT OF THE PROTOCOLS UNDER SELFISH NODES:
Figure 4 the graph shows the throughput in the protocols with selfish nodes, in which their
percentages vary from 10% to 50%. It is clear that AODV is much better than DSR to deliver
packets successfully in this kind of attack.
Figure 4. Throughput of the protocols with selfish nodes
ELAY OF THE PROTOCOLS UNDER SELFISH NODES
As can be seen from Figure 5, average delay of DSR is higher than AODV. Because DSR is an
Demand source routing protocol, this can be considered as the major reason fo
route is discovered only when needed and also, the mechanism for route discovery happens each
time as well as, several paths to the destination is discovered. Consequently, DSR has
delay. On the other hand, AODV has just one path for each destination in its routing table, which
is updated permanently based on a sequence number. Thus, that leads to a slight end to end delay.
Also, AODV was not impacted very much with increase in the percentage of selfish nodes, unlike
acted when selfish nodes increased.
Figure 5. Average delay of the protocols with selfish nodes
(IJNSA) Vol. 11, No.2, March 2019
7
black hole attack with inconsistent behaviour, as it will drop selective data packets and forward
Figure 4 the graph shows the throughput in the protocols with selfish nodes, in which their
percentages vary from 10% to 50%. It is clear that AODV is much better than DSR to deliver
As can be seen from Figure 5, average delay of DSR is higher than AODV. Because DSR is an
Demand source routing protocol, this can be considered as the major reason for DSR delay. A
route is discovered only when needed and also, the mechanism for route discovery happens each
scovered. Consequently, DSR has higher
each destination in its routing table, which
is updated permanently based on a sequence number. Thus, that leads to a slight end to end delay.
Also, AODV was not impacted very much with increase in the percentage of selfish nodes, unlike
8. International Journal of Network Security & Its Applications
PACKET LOSS OF THE PR
From line graph in Figure 6, it is obvious that
despite DSR being better in normal protocols. While AODV as a standard protocol does not have
better performance than DSR, in the case of selfish nodes it is better in performance than DSR.
Figure 6.
ENERGY PER BYTE OF TH
Figure 7 illustrates the energy per byte which is consumed during participation in routing
activities under different percentages of selfish nodes. It is
even when the percentage of selfish nodes reached 40%, while DSR was affected by the attack
and consequently, it consumed high amounts of energy when the attacks increased. Thus, AOD
outperforms DSR in terms of consuming
Figure 7. Energy per byte of the protocols with selfish nodes
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
ACKET LOSS OF THE PROTOCOLS UNDER SELFISH NODES:
gure 6, it is obvious that DSR was affected excessively by the selfish nodes,
despite DSR being better in normal protocols. While AODV as a standard protocol does not have
better performance than DSR, in the case of selfish nodes it is better in performance than DSR.
Figure 6. Packet loss of the protocols with selfish nodes
NERGY PER BYTE OF THE PROTOCOLS WITH SELFISH NODES
Figure 7 illustrates the energy per byte which is consumed during participation in routing
activities under different percentages of selfish nodes. It is clear that AODV was nearly the same
even when the percentage of selfish nodes reached 40%, while DSR was affected by the attack
it consumed high amounts of energy when the attacks increased. Thus, AOD
outperforms DSR in terms of consuming energy.
Figure 7. Energy per byte of the protocols with selfish nodes
(IJNSA) Vol. 11, No.2, March 2019
8
DSR was affected excessively by the selfish nodes,
despite DSR being better in normal protocols. While AODV as a standard protocol does not have
better performance than DSR, in the case of selfish nodes it is better in performance than DSR.
Figure 7 illustrates the energy per byte which is consumed during participation in routing
clear that AODV was nearly the same
even when the percentage of selfish nodes reached 40%, while DSR was affected by the attack
it consumed high amounts of energy when the attacks increased. Thus, AOD
9. International Journal of Network Security & Its Applications
8.2 BLACK HOLE ATTACKS
THROUGHPUT OF THE PRO
Figure 8 illustrates throughput of both protocols under different percentages of black hole
and it is clear that both protocols are affected by increasing the percentage of the black hole
attack. However, it is obvious that DSR outperforms AODV when the percentage of attack nodes
has increased. This performance can be justified because of
AODV networks and their different techniques to achieve routing activities, such as the packet
salvage of the DSR protocol in NS2.
Figure 8. Throughput of the protocols with black hole attack
AVERAGE DELAY OF THE
In Figure 9, the line graph shows the average delay of both protocols under black hole nodes.
Both protocols have approximately the same nature in terms of performance when assessing the
average delay metric as the average delay fluctuated over the time of the simulation. However,
AODV suffered less delay than DSR in all the percentages of attacks, for the reasons discussed in
the previous section.
Figure 9. Average delay of the protocols with black hole attack
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
TTACKS RESULTS
HROUGHPUT OF THE PROTOCOLS UNDER BLACK HOLE ATTACK:
Figure 8 illustrates throughput of both protocols under different percentages of black hole
and it is clear that both protocols are affected by increasing the percentage of the black hole
attack. However, it is obvious that DSR outperforms AODV when the percentage of attack nodes
has increased. This performance can be justified because of the different nature of DSR and
AODV networks and their different techniques to achieve routing activities, such as the packet
salvage of the DSR protocol in NS2.
Figure 8. Throughput of the protocols with black hole attack
VERAGE DELAY OF THE PROTOCOLS UNDER BLACK HOLE ATTACK
In Figure 9, the line graph shows the average delay of both protocols under black hole nodes.
Both protocols have approximately the same nature in terms of performance when assessing the
average delay fluctuated over the time of the simulation. However,
AODV suffered less delay than DSR in all the percentages of attacks, for the reasons discussed in
Figure 9. Average delay of the protocols with black hole attack
(IJNSA) Vol. 11, No.2, March 2019
9
Figure 8 illustrates throughput of both protocols under different percentages of black hole nodes,
and it is clear that both protocols are affected by increasing the percentage of the black hole
attack. However, it is obvious that DSR outperforms AODV when the percentage of attack nodes
the different nature of DSR and
AODV networks and their different techniques to achieve routing activities, such as the packet
K HOLE ATTACK:
In Figure 9, the line graph shows the average delay of both protocols under black hole nodes.
Both protocols have approximately the same nature in terms of performance when assessing the
average delay fluctuated over the time of the simulation. However,
AODV suffered less delay than DSR in all the percentages of attacks, for the reasons discussed in
10. International Journal of Network Security & Its Applications
PACKET LOSS OF THE PR
From Figure 10 below, it can be observed that packet loss for both protocols under black hole
nodes increases when the percentage of the attack is increased. Also, as discussed earlier in the
simulation of the normal protocols section, the DSR protocol has better performance than the
AODV protocol for the same reasons discussed in the normal protocol.
Figure 10. Packet loss of the protocols with black hole attack
ENERGY PER BYTE OF TH
Figure 11 below shows the energy consumption of the protocols under different percentages of
black hole attack. It is clear that DSR shows better performance than AODV, which increased
slightly when the black hole nodes increased
very much greater impact on AODV, which increased from 0.11 when the percentage of black
hole nodes was 10% to 0.68 when the attack increased to 50%.
Figure 11. Energy per byte of the protocols with
8.3. GREY HOLE ATTACKS
Grey-hole attack has the same impact as black hole attack on throughput, average delay and
energy consumption. However, it has a different effect on dropping packets in the protocols, for
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
ACKET LOSS OF THE PROTOCOLS UNDER BLACK HOLE ATTACK:
From Figure 10 below, it can be observed that packet loss for both protocols under black hole
nodes increases when the percentage of the attack is increased. Also, as discussed earlier in the
on of the normal protocols section, the DSR protocol has better performance than the
AODV protocol for the same reasons discussed in the normal protocol.
Figure 10. Packet loss of the protocols with black hole attack
NERGY PER BYTE OF THE PROTOCOLS UNDER BLACK HOLE ATTACK
Figure 11 below shows the energy consumption of the protocols under different percentages of
black hole attack. It is clear that DSR shows better performance than AODV, which increased
slightly when the black hole nodes increased in the network, while the black hole attack had a
very much greater impact on AODV, which increased from 0.11 when the percentage of black
hole nodes was 10% to 0.68 when the attack increased to 50%.
Figure 11. Energy per byte of the protocols with black hole attacks
TTACKS
hole attack has the same impact as black hole attack on throughput, average delay and
energy consumption. However, it has a different effect on dropping packets in the protocols, for
(IJNSA) Vol. 11, No.2, March 2019
10
From Figure 10 below, it can be observed that packet loss for both protocols under black hole
nodes increases when the percentage of the attack is increased. Also, as discussed earlier in the
on of the normal protocols section, the DSR protocol has better performance than the
ACK:
Figure 11 below shows the energy consumption of the protocols under different percentages of
black hole attack. It is clear that DSR shows better performance than AODV, which increased
in the network, while the black hole attack had a
very much greater impact on AODV, which increased from 0.11 when the percentage of black
black hole attacks
hole attack has the same impact as black hole attack on throughput, average delay and
energy consumption. However, it has a different effect on dropping packets in the protocols, for
11. International Journal of Network Security & Its Applications
the reason that it is designed to drop fewer packets than the black hole because of its fluctuation
in behaviour. Consequently, at instance T1, a grey
T2 it becomes a malicious node.
DROPPED PACKETS IN TH
As can be seen from the below graph in Figure 12, packet loss is higher in AODV than in DSR.
The reason behind this is related to the same discussion as given above regarding selfish and
black hole attacks.
Figure 12. Packet loss of the protoco
9. CONCLUSION
Security is an important issue in MANET as hackers are finding new ways to intercept data
during their exchange between wireless nodes in order to steal or tamper
In this research paper, the performance of
by measuring several parameters under different attacks by introducing some malicious nodes
within the network.
Based on the simulation results, DSR was affected more by selfish nodes than AODV. However,
DSR performed better than AODV under black hole attack. In terms of average delay, under
selfish nodes and under black hole attack, AODV has better performance than DSR, which has
high average delay in all scenarios.
AODV performed better than DSR under sel
performed better than AODV.
In the case of energy per byte and under selfish nodes, DSR consumed less energy than AODV.
However, under black hole attack, DSR consumed more energy than AODV.
In summary, both DSR and AODV protocols have been affected by the attacks and their
performance decreased in all terms (i.e end
throughput). Therefore, such attacks need to be detected and prevented in MANETs.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
signed to drop fewer packets than the black hole because of its fluctuation
in behaviour. Consequently, at instance T1, a grey-hole node behaves normally, while at instance
T2 it becomes a malicious node.
ROPPED PACKETS IN THE PROTOCOLS UNDER GREY HOLE ATTACK
As can be seen from the below graph in Figure 12, packet loss is higher in AODV than in DSR.
The reason behind this is related to the same discussion as given above regarding selfish and
Figure 12. Packet loss of the protocols under grey-hole attack
Security is an important issue in MANET as hackers are finding new ways to intercept data
during their exchange between wireless nodes in order to steal or tamper with it.
In this research paper, the performance of two protocols namely; DSR and AODV are evaluated
by measuring several parameters under different attacks by introducing some malicious nodes
Based on the simulation results, DSR was affected more by selfish nodes than AODV. However,
R performed better than AODV under black hole attack. In terms of average delay, under
selfish nodes and under black hole attack, AODV has better performance than DSR, which has
high average delay in all scenarios.
AODV performed better than DSR under selfish nodes, but under black hole attack, DSR
performed better than AODV.
In the case of energy per byte and under selfish nodes, DSR consumed less energy than AODV.
However, under black hole attack, DSR consumed more energy than AODV.
R and AODV protocols have been affected by the attacks and their
performance decreased in all terms (i.e end-to-end delay, packet loss, energy consumption and
throughput). Therefore, such attacks need to be detected and prevented in MANETs.
(IJNSA) Vol. 11, No.2, March 2019
11
signed to drop fewer packets than the black hole because of its fluctuation
hole node behaves normally, while at instance
TTACK:
As can be seen from the below graph in Figure 12, packet loss is higher in AODV than in DSR.
The reason behind this is related to the same discussion as given above regarding selfish and
Security is an important issue in MANET as hackers are finding new ways to intercept data
it.
two protocols namely; DSR and AODV are evaluated
by measuring several parameters under different attacks by introducing some malicious nodes
Based on the simulation results, DSR was affected more by selfish nodes than AODV. However,
R performed better than AODV under black hole attack. In terms of average delay, under
selfish nodes and under black hole attack, AODV has better performance than DSR, which has
fish nodes, but under black hole attack, DSR
In the case of energy per byte and under selfish nodes, DSR consumed less energy than AODV.
R and AODV protocols have been affected by the attacks and their
end delay, packet loss, energy consumption and
throughput). Therefore, such attacks need to be detected and prevented in MANETs.
12. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
12
REFERENCES
[1] Odeh, A. Abdelfattah, E and Alshowkan, M., (2012) “Performance evaluation of AODV and DSR
routing protocols in MANET networks”. International Journal of Distributed and Parallel Systems
(IJDPS), 13(4), 13-22
[2] Gagandeep, A. & Kumar, P., (2012) “Analysis of Different Security Attacks in MANETs on Protocol
Stack” International Journal of Engineering and Advanced Technology (IJEAT), 1(5), pp.269-275.
[3] Chandure, O.V & Gaikwad, V.T.,(2012) “Detection and Prevention of Gray Hole attack in Mobile
Ad-Hoc Network using AODV Routing Protocol. “ International Journal of Computer Application,
41(5), pp.27-32.
[4] Gorine, H. & M.Ramadan Elmezughi., (2016) “Security Threats on Wireless Sensor Network
Protocols,” 18th International Conference on Cryptology and Network Security, Kuala Lumpur, 18-
19 August 2016.
[5] Soni, G. and Chandrawanshi, K., (2013) “A Novel defence Scheme Against Selfish Node Attack in
MANET,” International Journal on Computational Science & Applications (IJCSA), 3(3), pp.51-63.
[6] Kaur, H., Bala, M. and Sahni, V., (2013) “Study of Black Hole Attack using different routing
protocols in MANETs.” International Journal of Advanced Research in Electrical, Electronics and
Instrumentation Engineering (IJAREEIE), 2(7).
[7] Kavitha, T. & Sridharan, D., (2010) ”Security vulnerabilities in wireless sensor networks: A survey”.
Journal of information Assurance and Security, 5(1), pp. 31-44.
[8] Singh, S.K., Singh, M.P. and Singh, D.K.,(2001) “A Survey on Network Security and Attack Defence
Mechanism for Wireless Sensor Networks,” International Journal of Computer Trends and
Technology, May-June Issue.
[9] Haddad , I. F. & Gordon, D., (2002) Network Simulator 2: a Simulation Tool for Linux | Linux
Journal. [Online] available at http://www.linuxjournal.com/article/5929 [accessed 12 January 2016]
[10] Kavitha, T. Sridharan, D., (2010) “Security vulnerabilities in wireless sensor networks: A survey”.
Journal of information Assurance and Security, 5(1), pp. 31-44.
[11] Taneja, S. & Kush, A., (2010) “A Survey of Routing Protocols in Mobile Ad-Hoc Networks“.
Internbational Journal of Innovation, Management and Technology, Vol.1, No.3.
[12] Tripathi,M., Gaur, M.S and Laxmi, V.(2013) “Comparing the Impact of the Black Hole and Gray
Hole Attack on LEACH in WSN” , Procedia Computer Science 19, pp 1101 – 1107
[13] Vasudeva, A. and Sood, M., (2012) “Sybil attack on lowest id clustering algorithm in the mobile ad
hoc networks”, International Journal of Network Security & Its Applications. 4(5):135–147.
[14] Arunmozhi, S.A. & Venkataramani, Y. (2011) “DDos Attack and Defense Scheme in Wireless Ad
Hoc Networks”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3
[15] Mohamed A. Abdelshafy, Peter J. B. King, (2014) “AODV Routing Protocol Performance Analysis
under MANET Attacks“, International Journal for Information Security Research (IJISR), Volume 4,
Issue 2.
[16] Moudni, H., Er-rouidi, M., Mouncif H. and El-Hadadi (2016) “Performance analysis of AODV
routing protocol in MANET under the influence of routing attacks”, International Conference on
Electrical and Information Technologies (ICEIT).
[17] Shahjahan, A. and Parma N.,(2016) “Comparative performance analysis of AODV and DSR routing
protocols under wormhole attack in mobile ad hoc network on different node's speeds”, International
Conference on Computing Communication and Automation (ICCCA).