SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 494
PERFORMANCE INVESTIGATION OF RE-SHUFFLING PACKET
ATTACK ON TRANSPORT LAYER PROTOCOL IN MANET
Sonia Choudhary1
, Vandna Verma2
1, 2
Department of Computer Science and Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan,
India, sonia.choudhary.14@gmail.com, vermamtech@gmail.com
Abstract
Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio
frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants
(PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks
than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we
present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the
packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their
destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to
retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always
participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets
in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will
also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end
throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated
using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data
flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study
on UDP and TCP.
Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
MANET routing protocols in general lack security
mechanisms. For proper operation of routing protocol, it is
assumed that intermediate nodes included in routing paths are
trustworthy and follow protocol rules. It is required that each
node in the network generate and forward routing control
traffic according to protocol specifications. Absolute trust on
intermediate nodes is a significant issue in networks that are
characterized by dynamic topology. It is comparatively easy to
eavesdrop wireless communication and to physically capture
and compromise legal nodes. Without appropriate network
level or link-layer security provisions, routing protocols are
susceptible to many form of malicious activity that can freeze
the whole network. In this chapter we study various attacks
that can be launched on MANETs by exploiting the
vulnerabilities inherent in routing protocols. We study how
basic routing protocol functions like packet or message
forwarding and routing can easily jeopardize the whole
network.
This paper is organized in the following manner. In Section II,
we present the related work done in our area which includes
the papers that are proposed the effective routing methods.
This is followed by the proposed work for efficient routing for
delay-sensitive applications in Section III. We also
summarize the key features, basic operation, as well as major
pros and cons of our proposed approach. In Section IV, We
will conclude the paper with present state of the art and future
work.
2. RELATED WORK
In this section, we discuss the past works done in MANET
that includes the evolution of many new attacks. It is
imperative to secure networks - wired or wireless for its
proper functioning. Wireless ad hoc network is more
vulnerable to security threats than wired network due to
inherent characteristics and system constraints. The nodes are
free to join, move and leave the network making it susceptible
to attacks - both from inside or outside the network. The
attacks can be launched by nodes within radio range or
through compromised nodes. The compromised nodes exploit
the flaws and inconsistencies present in routing protocol to
destroy normal routing operation of the network. A
compromised node may advertise nonexistent or fake links or
flood honest nodes with routing traffic causing Denial of
Service (DoS) attacks that may severely degrade network
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 495
performance. Thus we see that routing protocols are one of the
main areas of vulnerability. There is a need to study the
vulnerabilities in routing protocols that may be exploited by
malicious nodes to launch attacks.
In [1] and [2], the attack is one of the most serious attacks on
MANETs. In wormhole attack at least two attackers are
required to perform the attack very effectively. These two
attackers resides on different areas of the network makes a
tunnel through the network to communicate with each other.
The attackers broadcast the wrong information to the other
nodes in the network that the destination is only one hop away
from them. Sometimes they also broadcast the wrong
information that they are true neighbors of each other due to
this the attacker one which is near to source node is easily
selected on the route between the source destination pair when
the route is discovered on the basis of lowest number of hops
on the route.
In [3], the attacker when received a route request (RREQ)
message it modifies the sequence number in the RREQ
message to perform the attack. The attacker increases the
sequence number more than the usual number and reply back
to the source to make it believe that it has the better and
fresher route to the destination node. Once the source node got
this reply it start the transmission of data packet on the route
which consists of the attacker i.e., one of the intermediate
node of the established route is the attacker. Till now half of
the attack is performed by the attacker by spreading the false
information and making himself the part of the route. Now
when the data communication is started using the route the
attacker will drop all the data packets that reaches to it that is
when the attacker got the data packet for forwarding it drops
the packet without forwarding any of the data packets.
In [4], Flooding attack is the simplest attack to implement but
it is one of the most dangerous attacks. In this attack, the
attacker broadcast the false control or data packets in the
network due to which the network bandwidth is wasted largely
and the non-false packets are not able to reach their
destinations.
In [5]: As the communication in MANETs is multi hop
therefore the intermediate nodes plays an important role in
data communication over MANETs. The intermediate nodes
can become selfish by either using the wireless channel
unnecessary due to which the other nearby channels has to
contend more time to access the channel.
In [6] has analyzed the impact of packet re-ordering attack
over various TCP-variants using the MANET routing
protocols named AODV and DSR. Although authors claim
that they have investigated various versions of TCP but the
simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
3. PROPOSED METHODOLOGY
In proposed Re-shuffling data packet attack (RSA) an attacker
node re-ordered a specified number of packets using a re-
ordering buffer whose size is either selected randomly every
time the buffer is empty or its size can be fixed at the start of
the data communication and kept constant throughout the
whole communication duration. To perform this attack the
attacker node should be one of the intermediate nodes on the
route between the source destination pair. The attacker can
perform the proposed Re-shuffling data packet attack (RSA)
using any one of the following two approaches:
a) In this method, the attacker node uses a fixed size of
buffer and wait till the number of packets are equal to
the size of the buffer once the number of data packets
are equal to the used re-order buffer size the attacker
shuffles all the packets and forward them one-by-one.
For example, if the re-order buffer size is set to 3
then as soon as the re-order buffer has 3 data packets
stored in it the attacker shuffles them in any random
or predefined order and forward the data packets.
b) In the second method, the attacker node may vary the
size of the reorder buffer during the communication
duration and uses a random re-order buffer size for
some duration while uses some other size for the rest
or some other period. In this way, the attacker makes
itself more secure from the detection mechanisms if
applied by the source node to detect the attackers. To
perform any attack method either first or second the
attacker should be one of the intermediate nodes on
the active TCP or UDP based route using for data
communication process.
Pseudo Code for proposed Delay-Aware Routing Protocol
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 496
Processing of Data Packet Received by an Attacker
Node
Shorthand used in the Algorithm:
////////////////////////////////////
S = Source node
D = Destination node
A = Attacker node
I = Intermediate node
IP_OQ(N) = IP output queue of node N
RO_buffer_size = x; where x is between 1 to 5
//////////////////////////////////
IF1 (I got a data packet)
I check its AODV routing table
IF2 (Route is present in the routing table)
IF3 (I != A)
I forward the data packets from its IP output queue using FIFO
approach towards D
ELSE //this node is an attacker node
A checks whether the IP output queue has number of data
packets that are greater than or equals to its RO_buffer_size
IF4 (RO_buffer_size (A) >= number of packets in IP_OQ(A))
A either send the data packet or it pauses the data packet till
the re-shuffle buffer of its IP output queue is filled with the
required packets
ELSE //attackers re-shuffle buffer is full
A re-shuffle the data packets either using a fixed re-order
pattern or randomly
After re-shuffling send the packets from the re-order buffer
using FIFO approach
ENDIF4
ENDIF3
ENDIF2
ENDIF1
4. SIMULATION RESULTS AND
PERFORMANCE EVALUATION
In this section, we present the detailed performance analysis
and impact analysis of the proposed Re-shuffling data packet
attack (RSA) on different variants of TCP protocol over
mobile ad-hoc networks. The network scenarios used in the
simulation process are designed in such a way so that the
effects of the wireless channel and environment can be
mitigated. This is done to discover the exact impact of Re-
shuffling data packet attack on the TCP-based MANETs.
Therefore, we ignore the congestion and mobility induced
situation from the network scenarios used for simulation
process. As already mentioned above that the network
simulator used for the simulation process is the trail version of
the well knows network simulator called EXata.
Table1. Simulation Parameter Table
Parameters Values
Simulator EXata
Network Size 900 x 900 meter square
Simulation time 750 Seconds
Application Layer
Process
File transfer protocol
(FTP)
Transport Layer
Protocols
TCP (Tahoe, Reno,
NewReno) and UDP
Routing protocol AODV, DSR, OLSR
Number of Nodes 30
Mobility model None
MAC specification IEEE 802.11
Network Bandwidth 15 Mbps
Performance Metrics Network Throughput,
Packet Delivery Ratio
end-to-end delay and
Number of
Retransmissions
PHY Specification 802.11a/g
Parameters Values
A .Simulation Setup
Furthermore, the performance measurement metrics used are
as follows and the graphs will show that the attack is
independent from the effect of routing protocol on both TCP
as well as UDP:
a) Network throughput: The network throughput is
defined as the ratio of the total number of data bytes
received to the total duration of the communication
process.
b) Packet delivery ratio (PDR): The ratio of the
application data packets that are received without any
error at destination nodes to the total data packets
generated by the CBR sources are called Packet
delivery ratio (PDR) of the network.
c) Average end-to-end delay of data packets: This
metric is calculated by the destination node whenever
it receives a data packet. The destination node will
calculate the delay of each received data packet by
using its send timestamp and its received timestamp
at the destination.
d) Number of retransmission (NOR): This is the
important evaluation metric as we are using TCP-
based MANETs. In TCP a data packet is re-
transmitted when its retransmission timer expires or
the TCP receives the three acknowledgment packets
for the same data packet. These retransmissions
waste network bandwidth and lead to lower network
throughput.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 497
B. Performance Evaluation
1. Effects of Increase in Re-Shuffle Buffer Size
In this section, the effects of increase in the size of the re-
shuffle buffer of an attacker node are analyzed using the two
metrics (i.e., network throughput and number of
retransmissions).
Fig.1 Network throughputs with increase in shuffle size when
using all three routing protocols (TCP-based MANETs)
Fig.2 Number of Retransmissions with increase in shuffle size
when using all three routing protocols (TCP-based MANETs)
2. Effects of Increase Number of Attackers in TCP-
Based Manets
In this section, we analyze the performance of three TCP
protocol variants with the increase in the number of attackers
in an active route between any source-destination pair. The
metrics used for the analysis are network throughput and
number of re-transmissions caused during the whole duration
of data communication of a data session.
Fig.3 Network throughputs with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
Fig.4 Number of Retransmissions with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
3. Effects of Increase Number of Attackers in UDP-
Based Manets
In the previous section, we have shown the effect of the
proposed attack on TCP-based transmissions over mobile ad-
hoc networks. In this section, we analyze the effects of the
proposed attack on the UDP-based transmissions. As we are
using UDP as a transport layer protocol therefore there is no
re-transmission of data packets so we have used different
metrics to analyze the effects of our proposed attack on the
source-destination pair and overall network.
To show through the simulation process that the attack is
independent on the routing protocol used, we have also
configure the OLSR and DSR as the routing protocols in
conjunction with the AODV protocol and the results are given
below. This change is due to their different types of route
discovery methods used for route discovery and different
levels of routing overhead. These factors affect the network
metrics values.
Figure 5 End-to-end delays with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
Figure 6: End-to-end delay with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 498
5. PROPOSED DETECTION METHOD FOR RE-
SHUFFLING DATA PACKET ATTACK
In this section, we will propose an efficient yet simple method
to detect the proposed Re-shuffling data packet attack. The
source node TCP protocol uses the time-stamps to detect
whether the re-transmission done by it is a false or true re-
transmission. If the re-transmission done by the source is true
than the TCP will work in the traditional way by applying its
methods to control the congestion and network flow rates. On
the other hand, if the re-transmission is detected as a false re-
transmission the source TCP will not enter into the congestion
control states. Due to this the network throughput of the
network is maintained during the attack periods.
The proposed method for the detection weather the current re-
transmission at the source is true or false type is explained
below with the help of the Figure
Figure 7 Detection methods for packet re-shuffling attack
When the source TCP sends a data packet, it also places a
time-stamp in that data packet. The value of the time stamp is
set equal to the current system time when the data packet is
transmitted into the network. Let’s assume that node A sends
four data packets with the time stamps t1, t2, t3 and t4
respectively. As, it can be seen in Figure 4.13 that the attacker
node re-shuffles the packets before forwarding them towards
the destination node When the receiver node E receives the
data packet with the time-stamped equal to t4 it generates the
duplicate ACK because it is waiting for the data packet which
has the timestamp equal to t1. In this way, the node E will
generate three duplicate ACKs for the first three received out
of order data packets.
CONCLUSIONS AND FUTURE WORK
In this section, we have presented the conclusion and future
work for the paper. As we are using UDP as a transport layer
protocol therefore there is no re-transmission of data packets
so we have used different metrics to analyze the effects of our
proposed attack on the source-destination pair and overall
network. For this we have studied all forms of existing attacks
over Mobile ad-hoc networks. The simulation results clearly
show the impact of proposed attack on the network
throughput, bandwidth wastage and received data quality. We
have also seen that the proposed attack is independent on the
underlying network protocol as the attack is done to interrupt
the usual working of the TCP protocol. The attack exploits the
TCP congestion avoidance algorithm and flow control process
to disturb the regular data transmission process.
In the paper, we have analyzed the impact of packet re-
ordering attack over various TCP-variants using the MANET
routing protocols named AODV and DSR. Although authors
claim that they have investigated various versions of TCP but
the simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
REFERENCES
 George Hoffman, Yoko Ono, Akiko Kawakami,
Kenichi Kusano, and Takashi Manabe Japan
Communications 2012 Top 10 Predictions
http://www.idc.com/getdoc.jsp?containerId=JP1376002
U.
 Trends — Survey Says Wireless Net- works Expand for
Mobile Growth.
http://edtechdigest.wordpress.com/2011/10/18/trends-
survey-says-wirele
 Raza, I. and Hussain, S.A. and Ali, A. and Hassan
Raza, M. : Persistent packet reordering attack in TCP
based Ad hoc wireless networks, Information and
Emerging Technologies (ICIET), 2010 International
Conference, 2010.
 C. Perkins and E. Royer. Ad hoc on-demand distance
vector routing. 1999.
 A. Mishra, R. Jaiswal, and S. Sharma. A novel
approach for detecting and eliminating cooperative
black hole attack using advanced dri table in ad hoc
network. In Advance Computing Conference (IACC),
2013 IEEE 3rd International, 2013.
 Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole
attacks in wireless networks," Selected Areas in
Communications, IEEE Journal on , vol.24, no.2,
pp.370,380, Feb. 2006.
 Hoang Lan Nguyen and Uyen Trang Nguyen. A study
of different types of attacks in mobile ad hoc networks.
In Electrical Computer Engineering (CCECE), 2012
25th IEEE Canadian Conference on, 2012.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 499
 M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy.
A reputation-based mechanism for isolating selfish
nodes in ad hoc networks. In International Conference
on Mobile and Ubiquitous Systems, Networking and
Services, July 2005.
 Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang,
"Resisting flooding attacks in ad hoc networks,"
Information Technology: Coding and Computing, 2005.
ITCC 2005. International Conference on , vol.2, no.,
pp.657,662 Vol. 2, 4-6 April 2005.
 Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of-
service attack-detection techniques," Internet
Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb.
2006.
 JOHNSON David B. The dynamic source routing
protocol for mobile ad hoc networks (dsr). Internet-
Draft, 2004.
 Chen, S., Nahrstedt, K.: Distributed quality-of-service
routing in ad hoc networks. Selected Areas in
Communications, IEEE Journal 17, 1488–1505 (1999).
 Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan
and Irwin, Angela and Hassan, Aamir,” Vehicular ad
hoc networks (VANETS): status, results,
and challenges”, Telecommunication Systems, Springer
US, 2012.
 Chakrabarti, S., Mishra, A.: QoS issues in ad hoc
wireless networks. Communications Magazine, IEEE
39, 142–148 (2001).
 Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu.
Mobile ad hoc networking: imperatives and challenges.
Ad Hoc Networks, 1(1):13 – 64, 2003.
 Tsu-Wei Chen and Gerla, M.: Global state routing: a
new routing scheme for ad-hoc wireless networks,
Communications, 1998. ICC 98. Conference Record.
1998 IEEE International Conference.
 E.M. Royer and Chai-Keong Toh. A review of current
routing protocols for ad hoc mobile wireless networks.
Personal Communications, IEEE, 6(2):46 –55, apr
1999.
 P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, and L. Viennot. Optimized link state routing
protocol for ad hoc networks. 3626, 2001.
 Charles E. Perkins and Pravin Bhagwat. Highly
dynamic destination-sequenced distance-vector routing
(dsdv) for mobile computers. SIGCOMM Comput.
Commun. Rev., 24:234–244, October 1994.

More Related Content

What's hot

Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 

What's hot (16)

Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 

Viewers also liked

Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...eSAT Journals
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Journals
 
Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]eSAT Journals
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uaveSAT Journals
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitseSAT Journals
 
Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...eSAT Journals
 
Pyramid type plate bending machine
Pyramid type plate bending machinePyramid type plate bending machine
Pyramid type plate bending machineeSAT Journals
 
An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...eSAT Journals
 
Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...eSAT Journals
 
Finite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structureFinite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structureeSAT Journals
 
Photovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applicationsPhotovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applicationseSAT Journals
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Power system solution provided by facts and hvdc
Power system solution provided by facts and hvdcPower system solution provided by facts and hvdc
Power system solution provided by facts and hvdceSAT Journals
 
Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...eSAT Journals
 
Seismic response of transmission tower a case study
Seismic response of transmission tower   a case studySeismic response of transmission tower   a case study
Seismic response of transmission tower a case studyeSAT Journals
 

Viewers also liked (17)

Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uav
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuits
 
Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...
 
Road signs
Road signsRoad signs
Road signs
 
Pyramid type plate bending machine
Pyramid type plate bending machinePyramid type plate bending machine
Pyramid type plate bending machine
 
An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...
 
Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...
 
Finite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structureFinite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structure
 
Photovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applicationsPhotovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applications
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Power system solution provided by facts and hvdc
Power system solution provided by facts and hvdcPower system solution provided by facts and hvdc
Power system solution provided by facts and hvdc
 
Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...
 
Seismic response of transmission tower a case study
Seismic response of transmission tower   a case studySeismic response of transmission tower   a case study
Seismic response of transmission tower a case study
 

Similar to Performance investigation of re shuffling packet attack on transport layer protocol in manet

Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...eSAT Journals
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingeSAT Publishing House
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 

Similar to Performance investigation of re shuffling packet attack on transport layer protocol in manet (20)

Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasing
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
B43011014
B43011014B43011014
B43011014
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
He3413241328
He3413241328He3413241328
He3413241328
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
M017248993
M017248993M017248993
M017248993
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Performance investigation of re shuffling packet attack on transport layer protocol in manet

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 494 PERFORMANCE INVESTIGATION OF RE-SHUFFLING PACKET ATTACK ON TRANSPORT LAYER PROTOCOL IN MANET Sonia Choudhary1 , Vandna Verma2 1, 2 Department of Computer Science and Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan, India, sonia.choudhary.14@gmail.com, vermamtech@gmail.com Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability; -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION MANET routing protocols in general lack security mechanisms. For proper operation of routing protocol, it is assumed that intermediate nodes included in routing paths are trustworthy and follow protocol rules. It is required that each node in the network generate and forward routing control traffic according to protocol specifications. Absolute trust on intermediate nodes is a significant issue in networks that are characterized by dynamic topology. It is comparatively easy to eavesdrop wireless communication and to physically capture and compromise legal nodes. Without appropriate network level or link-layer security provisions, routing protocols are susceptible to many form of malicious activity that can freeze the whole network. In this chapter we study various attacks that can be launched on MANETs by exploiting the vulnerabilities inherent in routing protocols. We study how basic routing protocol functions like packet or message forwarding and routing can easily jeopardize the whole network. This paper is organized in the following manner. In Section II, we present the related work done in our area which includes the papers that are proposed the effective routing methods. This is followed by the proposed work for efficient routing for delay-sensitive applications in Section III. We also summarize the key features, basic operation, as well as major pros and cons of our proposed approach. In Section IV, We will conclude the paper with present state of the art and future work. 2. RELATED WORK In this section, we discuss the past works done in MANET that includes the evolution of many new attacks. It is imperative to secure networks - wired or wireless for its proper functioning. Wireless ad hoc network is more vulnerable to security threats than wired network due to inherent characteristics and system constraints. The nodes are free to join, move and leave the network making it susceptible to attacks - both from inside or outside the network. The attacks can be launched by nodes within radio range or through compromised nodes. The compromised nodes exploit the flaws and inconsistencies present in routing protocol to destroy normal routing operation of the network. A compromised node may advertise nonexistent or fake links or flood honest nodes with routing traffic causing Denial of Service (DoS) attacks that may severely degrade network
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 495 performance. Thus we see that routing protocols are one of the main areas of vulnerability. There is a need to study the vulnerabilities in routing protocols that may be exploited by malicious nodes to launch attacks. In [1] and [2], the attack is one of the most serious attacks on MANETs. In wormhole attack at least two attackers are required to perform the attack very effectively. These two attackers resides on different areas of the network makes a tunnel through the network to communicate with each other. The attackers broadcast the wrong information to the other nodes in the network that the destination is only one hop away from them. Sometimes they also broadcast the wrong information that they are true neighbors of each other due to this the attacker one which is near to source node is easily selected on the route between the source destination pair when the route is discovered on the basis of lowest number of hops on the route. In [3], the attacker when received a route request (RREQ) message it modifies the sequence number in the RREQ message to perform the attack. The attacker increases the sequence number more than the usual number and reply back to the source to make it believe that it has the better and fresher route to the destination node. Once the source node got this reply it start the transmission of data packet on the route which consists of the attacker i.e., one of the intermediate node of the established route is the attacker. Till now half of the attack is performed by the attacker by spreading the false information and making himself the part of the route. Now when the data communication is started using the route the attacker will drop all the data packets that reaches to it that is when the attacker got the data packet for forwarding it drops the packet without forwarding any of the data packets. In [4], Flooding attack is the simplest attack to implement but it is one of the most dangerous attacks. In this attack, the attacker broadcast the false control or data packets in the network due to which the network bandwidth is wasted largely and the non-false packets are not able to reach their destinations. In [5]: As the communication in MANETs is multi hop therefore the intermediate nodes plays an important role in data communication over MANETs. The intermediate nodes can become selfish by either using the wireless channel unnecessary due to which the other nearby channels has to contend more time to access the channel. In [6] has analyzed the impact of packet re-ordering attack over various TCP-variants using the MANET routing protocols named AODV and DSR. Although authors claim that they have investigated various versions of TCP but the simulation results show graphs for TCP-Reno and TCP- NewReno. Furthermore, the effect of packet re-ordering is not analyzed in UDP-based data communications. Also, the author’s uses only network throughput as an metric for the performance evaluation but other important metric such as number of retransmissions which greatly increases network congestion and delay in the network is not examined. Finally, it is not understandable that why the authors uses and compares AODV and DSR routing protocols in his paper because the re-ordering attack is used to effect the close-loop attacks only and are independent on the underlying protocol used for the routing. 3. PROPOSED METHODOLOGY In proposed Re-shuffling data packet attack (RSA) an attacker node re-ordered a specified number of packets using a re- ordering buffer whose size is either selected randomly every time the buffer is empty or its size can be fixed at the start of the data communication and kept constant throughout the whole communication duration. To perform this attack the attacker node should be one of the intermediate nodes on the route between the source destination pair. The attacker can perform the proposed Re-shuffling data packet attack (RSA) using any one of the following two approaches: a) In this method, the attacker node uses a fixed size of buffer and wait till the number of packets are equal to the size of the buffer once the number of data packets are equal to the used re-order buffer size the attacker shuffles all the packets and forward them one-by-one. For example, if the re-order buffer size is set to 3 then as soon as the re-order buffer has 3 data packets stored in it the attacker shuffles them in any random or predefined order and forward the data packets. b) In the second method, the attacker node may vary the size of the reorder buffer during the communication duration and uses a random re-order buffer size for some duration while uses some other size for the rest or some other period. In this way, the attacker makes itself more secure from the detection mechanisms if applied by the source node to detect the attackers. To perform any attack method either first or second the attacker should be one of the intermediate nodes on the active TCP or UDP based route using for data communication process. Pseudo Code for proposed Delay-Aware Routing Protocol
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 496 Processing of Data Packet Received by an Attacker Node Shorthand used in the Algorithm: //////////////////////////////////// S = Source node D = Destination node A = Attacker node I = Intermediate node IP_OQ(N) = IP output queue of node N RO_buffer_size = x; where x is between 1 to 5 ////////////////////////////////// IF1 (I got a data packet) I check its AODV routing table IF2 (Route is present in the routing table) IF3 (I != A) I forward the data packets from its IP output queue using FIFO approach towards D ELSE //this node is an attacker node A checks whether the IP output queue has number of data packets that are greater than or equals to its RO_buffer_size IF4 (RO_buffer_size (A) >= number of packets in IP_OQ(A)) A either send the data packet or it pauses the data packet till the re-shuffle buffer of its IP output queue is filled with the required packets ELSE //attackers re-shuffle buffer is full A re-shuffle the data packets either using a fixed re-order pattern or randomly After re-shuffling send the packets from the re-order buffer using FIFO approach ENDIF4 ENDIF3 ENDIF2 ENDIF1 4. SIMULATION RESULTS AND PERFORMANCE EVALUATION In this section, we present the detailed performance analysis and impact analysis of the proposed Re-shuffling data packet attack (RSA) on different variants of TCP protocol over mobile ad-hoc networks. The network scenarios used in the simulation process are designed in such a way so that the effects of the wireless channel and environment can be mitigated. This is done to discover the exact impact of Re- shuffling data packet attack on the TCP-based MANETs. Therefore, we ignore the congestion and mobility induced situation from the network scenarios used for simulation process. As already mentioned above that the network simulator used for the simulation process is the trail version of the well knows network simulator called EXata. Table1. Simulation Parameter Table Parameters Values Simulator EXata Network Size 900 x 900 meter square Simulation time 750 Seconds Application Layer Process File transfer protocol (FTP) Transport Layer Protocols TCP (Tahoe, Reno, NewReno) and UDP Routing protocol AODV, DSR, OLSR Number of Nodes 30 Mobility model None MAC specification IEEE 802.11 Network Bandwidth 15 Mbps Performance Metrics Network Throughput, Packet Delivery Ratio end-to-end delay and Number of Retransmissions PHY Specification 802.11a/g Parameters Values A .Simulation Setup Furthermore, the performance measurement metrics used are as follows and the graphs will show that the attack is independent from the effect of routing protocol on both TCP as well as UDP: a) Network throughput: The network throughput is defined as the ratio of the total number of data bytes received to the total duration of the communication process. b) Packet delivery ratio (PDR): The ratio of the application data packets that are received without any error at destination nodes to the total data packets generated by the CBR sources are called Packet delivery ratio (PDR) of the network. c) Average end-to-end delay of data packets: This metric is calculated by the destination node whenever it receives a data packet. The destination node will calculate the delay of each received data packet by using its send timestamp and its received timestamp at the destination. d) Number of retransmission (NOR): This is the important evaluation metric as we are using TCP- based MANETs. In TCP a data packet is re- transmitted when its retransmission timer expires or the TCP receives the three acknowledgment packets for the same data packet. These retransmissions waste network bandwidth and lead to lower network throughput.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 497 B. Performance Evaluation 1. Effects of Increase in Re-Shuffle Buffer Size In this section, the effects of increase in the size of the re- shuffle buffer of an attacker node are analyzed using the two metrics (i.e., network throughput and number of retransmissions). Fig.1 Network throughputs with increase in shuffle size when using all three routing protocols (TCP-based MANETs) Fig.2 Number of Retransmissions with increase in shuffle size when using all three routing protocols (TCP-based MANETs) 2. Effects of Increase Number of Attackers in TCP- Based Manets In this section, we analyze the performance of three TCP protocol variants with the increase in the number of attackers in an active route between any source-destination pair. The metrics used for the analysis are network throughput and number of re-transmissions caused during the whole duration of data communication of a data session. Fig.3 Network throughputs with increase in number of attackers when using all three routing protocols (TCP-based MANETs) Fig.4 Number of Retransmissions with increase in number of attackers when using all three routing protocols (TCP-based MANETs) 3. Effects of Increase Number of Attackers in UDP- Based Manets In the previous section, we have shown the effect of the proposed attack on TCP-based transmissions over mobile ad- hoc networks. In this section, we analyze the effects of the proposed attack on the UDP-based transmissions. As we are using UDP as a transport layer protocol therefore there is no re-transmission of data packets so we have used different metrics to analyze the effects of our proposed attack on the source-destination pair and overall network. To show through the simulation process that the attack is independent on the routing protocol used, we have also configure the OLSR and DSR as the routing protocols in conjunction with the AODV protocol and the results are given below. This change is due to their different types of route discovery methods used for route discovery and different levels of routing overhead. These factors affect the network metrics values. Figure 5 End-to-end delays with increase in number of attackers in all three routing protocols (UDP-based MANETs) Figure 6: End-to-end delay with increase in number of attackers in all three routing protocols (UDP-based MANETs)
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 498 5. PROPOSED DETECTION METHOD FOR RE- SHUFFLING DATA PACKET ATTACK In this section, we will propose an efficient yet simple method to detect the proposed Re-shuffling data packet attack. The source node TCP protocol uses the time-stamps to detect whether the re-transmission done by it is a false or true re- transmission. If the re-transmission done by the source is true than the TCP will work in the traditional way by applying its methods to control the congestion and network flow rates. On the other hand, if the re-transmission is detected as a false re- transmission the source TCP will not enter into the congestion control states. Due to this the network throughput of the network is maintained during the attack periods. The proposed method for the detection weather the current re- transmission at the source is true or false type is explained below with the help of the Figure Figure 7 Detection methods for packet re-shuffling attack When the source TCP sends a data packet, it also places a time-stamp in that data packet. The value of the time stamp is set equal to the current system time when the data packet is transmitted into the network. Let’s assume that node A sends four data packets with the time stamps t1, t2, t3 and t4 respectively. As, it can be seen in Figure 4.13 that the attacker node re-shuffles the packets before forwarding them towards the destination node When the receiver node E receives the data packet with the time-stamped equal to t4 it generates the duplicate ACK because it is waiting for the data packet which has the timestamp equal to t1. In this way, the node E will generate three duplicate ACKs for the first three received out of order data packets. CONCLUSIONS AND FUTURE WORK In this section, we have presented the conclusion and future work for the paper. As we are using UDP as a transport layer protocol therefore there is no re-transmission of data packets so we have used different metrics to analyze the effects of our proposed attack on the source-destination pair and overall network. For this we have studied all forms of existing attacks over Mobile ad-hoc networks. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. We have also seen that the proposed attack is independent on the underlying network protocol as the attack is done to interrupt the usual working of the TCP protocol. The attack exploits the TCP congestion avoidance algorithm and flow control process to disturb the regular data transmission process. In the paper, we have analyzed the impact of packet re- ordering attack over various TCP-variants using the MANET routing protocols named AODV and DSR. Although authors claim that they have investigated various versions of TCP but the simulation results show graphs for TCP-Reno and TCP- NewReno. Furthermore, the effect of packet re-ordering is not analyzed in UDP-based data communications. Also, the author’s uses only network throughput as an metric for the performance evaluation but other important metric such as number of retransmissions which greatly increases network congestion and delay in the network is not examined. Finally, it is not understandable that why the authors uses and compares AODV and DSR routing protocols in his paper because the re-ordering attack is used to effect the close-loop attacks only and are independent on the underlying protocol used for the routing. REFERENCES  George Hoffman, Yoko Ono, Akiko Kawakami, Kenichi Kusano, and Takashi Manabe Japan Communications 2012 Top 10 Predictions http://www.idc.com/getdoc.jsp?containerId=JP1376002 U.  Trends — Survey Says Wireless Net- works Expand for Mobile Growth. http://edtechdigest.wordpress.com/2011/10/18/trends- survey-says-wirele  Raza, I. and Hussain, S.A. and Ali, A. and Hassan Raza, M. : Persistent packet reordering attack in TCP based Ad hoc wireless networks, Information and Emerging Technologies (ICIET), 2010 International Conference, 2010.  C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999.  A. Mishra, R. Jaiswal, and S. Sharma. A novel approach for detecting and eliminating cooperative black hole attack using advanced dri table in ad hoc network. In Advance Computing Conference (IACC), 2013 IEEE 3rd International, 2013.  Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on , vol.24, no.2, pp.370,380, Feb. 2006.  Hoang Lan Nguyen and Uyen Trang Nguyen. A study of different types of attacks in mobile ad hoc networks. In Electrical Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on, 2012.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 499  M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy. A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In International Conference on Mobile and Ubiquitous Systems, Networking and Services, July 2005.  Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang, "Resisting flooding attacks in ad hoc networks," Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on , vol.2, no., pp.657,662 Vol. 2, 4-6 April 2005.  Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of- service attack-detection techniques," Internet Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb. 2006.  JOHNSON David B. The dynamic source routing protocol for mobile ad hoc networks (dsr). Internet- Draft, 2004.  Chen, S., Nahrstedt, K.: Distributed quality-of-service routing in ad hoc networks. Selected Areas in Communications, IEEE Journal 17, 1488–1505 (1999).  Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan and Irwin, Angela and Hassan, Aamir,” Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommunication Systems, Springer US, 2012.  Chakrabarti, S., Mishra, A.: QoS issues in ad hoc wireless networks. Communications Magazine, IEEE 39, 142–148 (2001).  Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1):13 – 64, 2003.  Tsu-Wei Chen and Gerla, M.: Global state routing: a new routing scheme for ad-hoc wireless networks, Communications, 1998. ICC 98. Conference Record. 1998 IEEE International Conference.  E.M. Royer and Chai-Keong Toh. A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2):46 –55, apr 1999.  P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. 3626, 2001.  Charles E. Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev., 24:234–244, October 1994.