This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...IJNSA Journal
The wireless ad hoc network is particularly vulnerable to DOS attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, decentralization of the protocols, and lack of a clear line of defense is a growing problem in networks today. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DOS) are possible because of the inherent limitations of its routing protocols. In this paper we will secure the MANET from the DDOS attack. DDOS attacks are similar to DOS attacks but there is a difference between them and that is DDOS attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. Very often, systems that use for attack is a part of the networks and users of these systems don’t know about that, their systems used for attack to another systems. This kind of attack, consume more bandwidth and uses more sources in network. . In this work, we study the effect of one of the important attacks that called DDOS in MANET on most vulnerability protocol that named AODV. The product of this study is detection of DDOS attack by
using AODV (adhoc on demand distance vector) protocol. Proposed scheme is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well..
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...IJNSA Journal
The wireless ad hoc network is particularly vulnerable to DOS attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, decentralization of the protocols, and lack of a clear line of defense is a growing problem in networks today. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DOS) are possible because of the inherent limitations of its routing protocols. In this paper we will secure the MANET from the DDOS attack. DDOS attacks are similar to DOS attacks but there is a difference between them and that is DDOS attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. Very often, systems that use for attack is a part of the networks and users of these systems don’t know about that, their systems used for attack to another systems. This kind of attack, consume more bandwidth and uses more sources in network. . In this work, we study the effect of one of the important attacks that called DDOS in MANET on most vulnerability protocol that named AODV. The product of this study is detection of DDOS attack by
using AODV (adhoc on demand distance vector) protocol. Proposed scheme is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well..
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
This cross sectional study was conducted at Department of Biochemistry, Govt. Medical College Srinagar Kashmir. A total of 120 Kashmiri Type 2 diabetic patients and 30 normal controls were randomly selected. Diabetic dyslipidaemia is characterized by raised triglycerides, low high density lipoprotein and raised low density lipoprotein. Determination of serum lipid levels in people with diabetes is considered a standard of care because detection and treatment of dyslipidaemia is one means of reducing cardiovascular disease risk. The lipid profiles and lipoprotein levels of 120 known diabetic patients were studied. Total cholesterol (TC), Triacylglycerol’s (TG) Low density lipoprotein-cholesterol (LDL-C), and high density lipoprotein cholesterol (HDL-C) levels were assayed for each group using standard biochemical methods. Dyslipidaemia was defined using the national cholesterol education programme – adult treatment panel III (NCEP-AT III) criteria. BMI and waist and hip circumferences were measured.
This research paper is on a study of how Zimbabwe can produce a democratic people-driven constitution as a permanent solution to the country's problems of poor governance, violent political conflicts, economic collapse, social disintegration, and international isolation. The purpose of the study was to explore a people-driven democratic constitution-making process that Zimbabweans want. Two groups of research units comprised of 1 120 individuals and 67 institutions were used. The inquiry discovered contextual meaning of six phenomena associated with a people-driven democratic constitution-making process. The study recommends a constitution-making process model that Zimbabwe should adopt to produce a people-driven constitution democratically.
This paper proposed a new sparce matrix converter with Z-source network to provide unity voltage transfer ratio. It is an ac-to-ac converter with diode-IGBT bidirectional switches. The limitations of existing matrix converter like higher current THD and less voltage transfer ratio issues are overcome by this proposed matrix converter by inserting a Z-source. Due to this Z-source current harmonics are totally removed. The simulation is performed for different frequencies. The simulation results are presented to verify the THD and voltage transfer ratio and compared with the existing virtual AC/DC/AC matrix converter. The experimental output voltage amplitude can be varied with the variable frequencies.
In this research paper, we have conducted work on modeling of local broker policy based on workload profile in Network cloud. For this we are using workload based applications. To handle workload based applications, two Scheduling Policies Random Non-overlap and Workload profile based be used. We compare these two scheduling policies based on three parameters Execution (mean) time, Response (mean) time and Waiting (mean) time. Workload based profile policy gave better results than Random-Non overlap policy in terms of time performance parameter.
This paper discusses the possible applications of particle swarm optimization (PSO) in the Power system. One of the problems in Power System is Economic Load dispatch (ED). The discussion is carried out in view of the saving money, computational speed – up and expandability that can be achieved by using PSO method. The general approach of the method of this paper is that of Dynamic Programming Method coupled with PSO method. The feasibility of the proposed method is demonstrated, and it is compared with the lambda iterative method in terms of the solution quality and computation efficiency. The experimental results show that the proposed PSO method was indeed capable of obtaining higher quality solutions efficiently in ED problems.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Secure routing proposals in manets a reviewijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
SECURE ROUTING PROPOSALS IN MANETS: A REVIEWijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
"Heart failure is a typical clinical accompanied by symptoms syndrome (e.g. shortness of breath, ankle swelling and fatigue) that lead to structural or functional abnormalities of the heart (e.g. high venous pressure, pulmonary edema and peripheral edema).
In recent years, the significant role of B-type natriuretic peptide has been revealed in the pathogenesis of heart disease and the use of the drug sacubitril/valsartan has started. It has a positive effect on the regulation of the level of B-type natriuretic peptide in the body. It is obviously seen from the the world literature that natriuretic peptides play an important role in the pathophysiology of heart failure. For this reason, many studies suggest that the importance of natriuretic peptides in the diagnosis and treatment of heart failure is recommended.
Due to this, we tried to investigate the effects of a comprehensive medication therapy with a combination of sacubitril/valsartan in the patients with chronic heart failure."
Parallel generators of pseudo random numbers with control of calculation errors
U0 vqmtq2o tk=
1. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Performance Analysis of AODV and TORA under
DDoS Attack in MANETs
Sachin Garg
Punjabi University, Patiala, India
Abstract: Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic
position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of
service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service
(DDoS) attack is launched from various attacking nodes, hence called DDoS. DDoS is an improved form of denial of service attack.
MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide
secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing
protocols and security measures within the networks were proposed. An ad hoc network is a collection of wireless mobile nodes
dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Two
popular MANET routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV) and Temporally Ordered Routing
Algorithm (TORA) have been implemented. The scope of this thesis is to study the effects of DDoS attack in MANET using both Ad-Hoc
on Demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA). Comparative analysis of DDoS attack for
both protocols is taken into account. The impact of DDoS attack on the performance of MANET is evaluated finding out which protocol
is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light
of throughput, end-to-end delay, network load and various other parameters. In this project an attempt has been made to compare the
performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: AODV and TORA, under the normal
conditions and DDoS attack situations. The simulation model is created using the Network Simulator 2 (NS-2) with MANET essential
configurations and compatible physical layer models are used to study the performance of the AODV and TORA. The On-demand
protocol, AODV has performed better than the TORA protocol under the both conditions.. Although AODV and TORA share similar on-demand
behavior, the differences in the protocol mechanics can lead to significant performance differentials. The performance
differentials are analyzed using normal and attack situations.
Keywords: Mobile ad-hoc networks, DDoS attack, AODV, TORA, Security
1. Introduction
Mobile Ad Hoc Networks are autonomous and decentralized
wireless systems. MANETs consist of mobile nodes that are
free to move in and out in a network. Nodes are the systems
or devices i.e. mobile phone, laptop, personal digital
assistance, MP3 player and personal computer that are
participating in the network and are mobile. These nodes can
act as host/router or both at the same time. They can form
arbitrary topologies depending on their connectivity with
each other in the network. These nodes have the ability to
configure themselves and because of their self configuration
ability, they can be deployed urgently without the need of
any infrastructure. Internet Engineering Task Force (IETF)
has MANET working group (WG) that is devoted for
developing IP routing protocols. Routing protocols is one of
the challenging and interesting research areas. Many routing
protocols have been developed for MANETS, i.e. AODV,
DSR and TORA.
Security in Mobile Ad Hoc Network is the most important
concern for the basic functionality of network. The
availability of network services, confidentiality and integrity
of the data can be achieved by assuring that security issues
have been met. MANETs often suffer from security attacks
because of its features like open medium, changing its
topology dynamically, lack of central monitoring and
management, cooperative algorithms and no clear defense
mechanism. These factors have changed the battle field
situation for the MANETs against the security threats.
The MANETs work without a centralized administration
where the nodes communicate with each other on the basis
of mutual trust. This characteristic makes MANETs more
vulnerable to be exploited by an attacker inside the network.
Wireless links also makes the MANETs more susceptible to
attacks, which make it easier for the attacker to go inside the
network and get access to the ongoing communication.
Mobile nodes present within the range of wireless link can
overhear and even participate in the network.
MANETs must have a secure way for transmission and
communication and this is a quite challenging and vital issue
as there is increasing threats of attack on the Mobile
Networks. Security is the cry of the day. In order to provide
secure communication and transmission, the engineers must
understand different types of attacks and their effects on the
MANETs. Wormhole attack, Black hole attack, Sybil attack,
flooding attack, routing table overflow attack, Denial of
Service (DoS), selfish node misbehaving, impersonation
attack are kind of attacks that a MANET can suffer from. A
MANET is more open to these kinds of attacks because
communication is based on mutual trust between the nodes,
there is no central point for network management, no
authorization facility, vigorously changing topology and
limited resources[4].
2. Literature Survey
Tariq A. Alahdal et. al. have worked on performance of
Standardized Routing Protocols in Ad-hoc Networks. In this
paper, authors study and compare the performance of the
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: SEP14699 297
Licensed Under Creative Commons Attribution CC BY
2. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
following routing protocols AODV, DSR, DSDV, RAODV,
AOMDV, and TORA. The authors have proved that that
AOMDV has better performance than AODV and RAODV
on the basis of delay. P.Kuppusamy and
Dr.K.Thirunavukkarasu have conducted a study and
comparison of olsr, aodv and tora routing protocols in ad
hoc networks. This research paper describes the
characteristics of ad hoc routing protocols OLSR, AODV
and TORA based on the performance metrics like packet
delivery ratio, end–to–end delay, routing overload by
increasing number of nodes in the network. This
comparative study proves that AODV, TORA performs well
in dense networks than OLSR in terms of packet delivery
ratio. Lamyaa M.T. Harb et. al. have conducted a detailed
performance analysis of mobile ad hoc networks under
attack. The authors have discussed AODV, DSR, TORA and
DSDV for MANETs. The authors have addressed the
security concerns in MANET operations under the attack
situations. Asma Tuteja et. al have performed a comparative
performance analysis of dsdv, aodv and dsr routing
protocols in manet using ns2. In this paper, authors have
compared mobile ad-hoc network routing protocols DSDV,
AODV and DSR. The performane of all of the three
protocols is compared with teach other to fetch the best
performing candidate. The performance analysis has been
conuded on the basis of PDR, Throughput, Delay and
Routing overhead as performance parameters. Samir R. Das
et. al, have worked on the comparative performance
evaluation of routing protocols for MANETs. Authors
evaluate several routing protocols for mobile, wireless, ad
hoc networks via packet level simulations. The protocol
suite includes routing protocols specifically designed for ad
hoc routing, as well as more traditional protocols, such as
link state and distance vector used for dynamic networks.
Performance is evaluated with respect to fraction of packets
delivered, end-to-end delay and routing load for a given
traffic and mobility model. It is observed that the new
generation of on-demand routing protocols use a much lower
routing load. However the traditional link state and distance
vector protocols provide, in general, better packet delivery
and delay performance. Gaurav Kumar Gupt and Mr.
Jitendra Singh have presented a paper on DDoS Attack in
mobile ad-hoc networks. In this paper authors has evaluated
that How to thwart the DoS attacks differently and
effectively and keep the vital security-sensitive ad hoc
networks available for its intended use is essential.
3. Experimental Design
This research project analyzes the AODV and TORA under
Denial of Service and Distributed Denial of Service attacks,
which are reactive and hybrid routing protocols respectively
in nature. These attacks can result as a long and unexpected
service downtime which can affect the cellular networks and
businesses at a large, can result in mass losses to the cellular
network services companies. To avoid these situation the
selection of the existing MANET protocols based on their
security mechanism becomes extremely important. Also the
existing popular routing protocol has to be improved
periodically to avoid the future developments in the security
attack mechanisms for MANETs. To make the selection and
improvements in the existing protocols it is extremely
important to analyze the performance of the existing
MANET protocols. The popular MANET protocols in these
days are AODV and TORA. In this research we will analyze
the performance of these protocols under DoS and DDoS
attacks. We will compare these protocols on the basis of
Load, Packet Loss, Delay, Throughput, Packet Delivery
Ratio, etc. These working scenarios has been simulated in
NS2 using AODV protocol.
AODV shares DSR’s on-demand characteristics in that it
also discovers routes on an as needed basis via a similar
route discovery process. However, AODV adopts a very
different mechanism to maintain routing information. It uses
traditional routing tables, one entry per destination. This is
in contrast to DSR, which can maintain multiple route cache
entries for each destination. Without source routing, AODV
relies on routing table entries to propagate an RREP back to
the source and, subsequently, to route data packets to the
destination. AODV uses sequence numbers maintained at
each destination to determine freshness of routing
information and to prevent routing loops. All routing packets
carry these sequence numbers. Route error propagation in
AODV can be visualized conceptually as a tree whose root
is the node at the point of failure and all sources using the
failed link as the leaves.
4. Simulation Model
In the simulation, both AODV and TORA are at first
simulated under the normal environment. All of the above
mentioned parameters have been obtained from the
simulations. AODV comes pre-configured in the Network
Simulator 2, where TORA protocol required a patch before
running its successfully.
Then both protocols, AODV and TORA have been tested
under the distributor denial of service attack. When both
protocols undergo the DDoS attack in the simulation, a lot of
backend coding had to be written. The DDoS nodes had to
be created using various network parameters. To generate
the DDoS attack, the nodes has been configured in a way to
transmit heavy data loads towards the targeted with tweaked
IP headers. The IP headers carry the falsified payload in its
header, which is responsible for the resource unavailability
on the target node due to the high density of data being
received. The latter mentioned parameters have been
collected from all of the four simulation sub-sets, i.e.
Normal AODV, Normal TORA, AODV under DDoS,
TORA under DDoS, etc.
5. The Traffic And Mobility Models
Continuous bit rate (CBR) and Variable bit rate (VBR)
traffic sources are used in this simulation. The source-destination
pairs are spread randomly over the network.
Only 512-byte to 1 Mb data packet rates are used in the
current simulation. The number of source-destination pairs
and the packet
The mobility model uses the random waypoint model in a
rectangular field. The field configurations used is: 800 m x
800 m field with 11 nodes. Here, each packet starts its
journey from a random location to a random destination with
a randomly chosen speed (uniformly distributed between 0–
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: SEP14699 298
Licensed Under Creative Commons Attribution CC BY
3. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
20 m/s). Once the destination is reached, another random
destination is targeted after a pause. The pause time, which
affects the relative speeds of the mobiles, is varied.
Simulations are run for 10 simulated seconds. Identical
mobility and traffic scenarios are used across protocols to
gather fair results. The performance metrics chosen for the
evaluation of Distributed Denial of Service attack are end-to-
end delay, throughput and network load.
The first two metrics are the most important for best-effort
traffic. The routing load metric evaluates the efficiency of
the routing protocol. Note, however, that these metrics are
not completely independent. For example, lower packet
delivery fraction means that the delay metric is evaluated
with fewer samples. In the conventional wisdom, the longer
the path lengths, the higher the probability of a packet drops.
Thus, with a lower delivery fraction, samples are usually
Simulation Results of AODV under Normal
Circumstances
The AODV has been implemented under the normal
conditions. Under the normal conditions, AODV is
considered the best protocols among its real-time
contenders. The AODV has been simulated with total 11
nodes. The nodes have been divided into four major parts:
sender nodes, receiver nodes, end routing nodes, traversing
nodes. There are total two paths between the sender nodes
and receiver nodes. First Path consisted of the end nodes 7
and 8, followed by end routing node 0, which is connected
to other end node 5 via nodes 1 and 2 to reach node 6.
Whereas, the second path consisted of everything similar
expect the two nodes 1 and 2. Instead of nodes 1 and 2 there
are nodes 3 and 4 traversing nodes have been used to
connect end nodes 0 and 5.
Figure 1: The graph of Data Drop.
Figure 2: The graph of Delay.
Figure 3: The graph of Jitter.
Figure 4: The graph of Network Load
All of the results displayed in this simulation scenario have
been recorded on the node 5 from first path. Data drop rate
(Figure 5.1) has shown a very good performance of the
AODV protocol under MANETs. A minimal data drop rate
(2 pps) has been observed in this simulation. Also, the
results have shown that a minimum delay (Figure 5.2) has
been recorded from the AODV MANET simulation under
normal conditions. The maximum delay observed in the
simulation touches maximum 16 milliseconds. In the figure
3 and 4, the jitter and network load has been recorded. A
usual amount of jitter has been recorded in the AODV
simulation under normal conditions. Also the recorded
network load also posses the usual performance metric.
Figure 5: The graph of Packet Efficiency
Figure 6: The graph of Packets Dropped
Figure 7: The graph of Routing Overhead
Figure 8: The graph of Throughput
The figure 5 and 6 shows the total number of packets
dropped and number of packets sent per second respectively.
The total number of packets dropped in the normal
simulation of AODV has been observed around 85. Packets
sent at the rate of almost 95 packets per second which is a
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: SEP14699 299
Licensed Under Creative Commons Attribution CC BY
4. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
quite good rate. The latter two properties have shown the
effectiveness of the AODV protocol in MANET under
normal conditions. Routing overhead and throughput has
been shown under the normal MANET over AODV protocol
shown in the figure 7 and 8 respectively. The Routing
overhead is pretty usual and also, the throughput is quite
higher as per usual desired results.
Simulation Results of TORA under Normal
Circumstances
The TORA has been implemented under the normal
conditions. Under the normal conditions, TORA is
considered the best protocols among its real-time
contenders. The TORA has been simulated with total 11
nodes. The nodes have been divided into four major parts:
sender nodes, receiver nodes, end routing nodes, traversing
nodes. Similarly, there are total two paths between the
sender nodes and receiver nodes. First Path consisted of the
end nodes 7 and 8, followed by end routing node 0, which is
connected to other end node 5 via nodes 1 and 2 to reach
node 6. Whereas, the second path consisted of everything
similar expect the two nodes 1 and 2. Instead of nodes 1 and
2 there are nodes 3 and 4 traversing nodes have been used to
connect end nodes 0 and 5.
Figure 9: The graph of Data Drop
Figure 10: The graph of Delay
Figure 11: The graph of Jitter
Figure 12: The graph of Network Load
Figure 13: The graph of Packet Dropped
Figure 14: The graph of Packets Sent
Similarly, all of the results displayed in this simulation
scenario have been recorded on the node 5 from first path.
Data drop rate (Figure 5.1) has shown a very good
performance of the TORA protocol under MANETs but It is
slightly lower than AODV in MANETs. Little higher usual
data drop rate (66 ppm) has been observed in this simulation
which shows significantly higher than AODV. Also, the
results have shown that an optimal delay of 38 milliseconds
(Figure 5.2) has been recorded from the TORA in MANET
simulation under normal conditions. The maximum delay
observed in the simulation ranges between 2 and 38
milliseconds. In the figure 11 and 12, the jitter and network
load has been recorded. A usual amount of jitter has been
recorded in the TORA simulation under normal conditions.
Also the recorded network load also posses the usual
performance metric. But the network load and jitter are
higher than the AODV under normal situations.
Figure 15: The graph of Routing Overhead
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: SEP14699 300
Licensed Under Creative Commons Attribution CC BY
5. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Figure 16: The graph of Throughput
The figure 13 and 14 shows the total number of packets
dropped and number of packets sent per second respectively.
The total number of packets dropped in the normal
simulation of TORA has been observed around 19. Packets
sent at the rate of almost 38 packets per second which is a
quite good rate. The latter two properties have shown the
effectiveness of the TORA protocol in MANET under
normal conditions. Routing overhead and throughput has
been shown under the normal MANET over TORA protocol
shown in the figure 15 and 16 respectively. The Routing
overhead is pretty usual and also, the throughput is quite
higher as per usual desired results.
6. Simulation Results of AODV under DDoS
Volume 3 Issue 10, October 2014
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Attack
Also, the AODV has been implemented under the DDoS
attack. Under the distributed denial of service attack, AODV
has been tested and compared with TORA as its real-time
contender. Similarly, the AODV has been simulated with
total 11 nodes. The nodes have been divided into four major
parts: sender nodes, receiver nodes, end routing nodes,
traversing nodes. There are total two paths between the
sender nodes and receiver nodes. First Path consisted of the
end nodes 7 and 8, followed by end routing node 0, which is
connected to other end node 5 via nodes 1 and 2 to reach
node 6. Whereas, the second path consisted of everything
similar expect the two nodes 1 and 2. Instead of nodes 1 and
2 there are nodes 3 and 4 traversing nodes have been used to
connect end nodes 0 and 5. The nodes 7 and 8 are launching
the distributed denial of service attack on the node 1. This
move definitely decreases the performance of AODV. But in
this simulation, we had to test the results of AODV and
TORA under normal conditions and under DDoS attack.
:
Figure 17: The graph of Data Drop
Figure 18: The graph of Delay
Figure 19: The graph of Jitter
Figure 20: The graph of Network Load
Figure 21 : The graph of Packet Efficiency
Figure 22: The graph of Packets Dropped
All of the results displayed in this simulation scenario have
been recorded on the node 5 from first path. Data drop rate
(Figure 5.1) has shown a very good performance of the
AODV protocol under attack MANETs. A higher data drop
rate (60 ppm) has been observed in this simulation with
DDoS attack. Also, the results have shown that a higher
delay of almost 29 milliseconds (Figure 5.2) has been
recorded from the AODV MANET simulation under DDoS
attack. The maximum delay observed in the simulation
touches maximum 29 milliseconds and ranges between 0 to
29 milliseconds. In the figure 17 and 18, the jitter and
network load has been recorded. A high jitter and high
network load has been recorded in the AODV simulation
under DDoS attack. Also the recorded network load and
jitter shown a significant decrease in the performance of
MANET with AODV.
Paper ID: SEP14699 301
6. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Figure 23: The graph of Routing Overhead
Figure 24: The graph of Throughput
The figure 21 and 22 shows the total number of packets
dropped and number of packets sent per second respectively.
The total number of packets dropped in the simulation with
DDoS attack configured with AODV has been observed
around 100. Packets sent at the rate of almost 105 packets
per second which is due to the packet flooding done by the
DDoS attacker in the MANET cluster in this simulation. The
latter two properties have shown the effectiveness of the
AODV protocol to handle the network under the DDoS
attack in MANETs. Routing overhead and throughput has
been shown under the DDoS attack MANET over AODV
protocol shown in the figure 23 and 24 respectively. The
Routing overhead is recorded at higher rate and also, the
throughput is significantly higher than the usual and desired
results recorded in the normal AODV or TORA simulations.
7. Simulation Results of TORA Under DDoS
Volume 3 Issue 10, October 2014
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Attack
Also, the TORA protocol also has been implemented in NS2
under the DDoS attack. Under the distributed denial of
service attack, TORA has been thoroughly tested and
compared with TORA in normal conditions and AODV
under DDoS attack as its real-time contender. TORA
simulation is using the similar topology as the latter ones.
Total 11 numbers of nodes has been simulated in the
simulation. Each node functions according to following four
categories: sender nodes, receiver nodes, end routing nodes,
traversing nodes. There are total two paths between the
sender nodes and receiver nodes. First Path consisted of the
end nodes 7 and 8, followed by end routing node 0, which is
connected to other end node 5 via nodes 1 and 2 to reach
node 6. Whereas, the second path consisted of everything
similar expect the two nodes 1 and 2. Instead of nodes 1 and
2 there are nodes 3 and 4 traversing nodes have been used to
connect end nodes 0 and 5. The nodes 7 and 8 are launching
the distributed denial of service attack on the node 1. This is
pretty sure that DDoS attack has a definite tendency towards
a decrease in the performance of TORA. But in this
simulation, we had to test the results of TORA under normal
conditions and under DDoS attack with each other and with
AODV under DDoS attack.
Figure 25: The graph of Data Drop
Figure 26: The graph of Delay
Figure 27: The graph of Jitter
Figure 28: The graph of Network Load
Figure 29: The graph of Packet Efficiency
Paper ID: SEP14699 302
7. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Figure 30: The graph of Packets Dropped
All of the results displayed in this simulation scenario have
been recorded on the node 5 from first path. Data drop rate
(Figure 25) has shown poor performance of the TORA
protocol under attack situations in the MANETs. A higher
data drop rate has been recorded in this simulation where
TORA is under DDoS attack. Also, the results have shown
that a higher delay of almost 70 milliseconds (Figure 5.2)
has been recorded from the TORA MANET simulation
under DDoS attack. The maximum delay observed in the
simulation touches maximum 70 milliseconds and ranges
between 3 to 70 milliseconds. In the figure 27 and 28, the
jitter and network load has been recorded. A higher jitter and
higher network load has been recorded in the TORA
simulation under DDoS attack. Also the recorded network
load and jitter shown a significant decrease in the
performance of MANET with TORA. TORA performance
on the basis of these four performance properties shows the
poor performance in comparison with AODV under attack in
MANETs.
Figure 31: The graph of Routing Overhead
Figure 32: The graph of Throughput
The figure 29 and 30 shows the total number of packets
dropped and number of packets sent per second respectively.
The total number of packets dropped in the simulation with
DDoS attack configured with TORA has been observed very
high whereas, Packets sent at the rate of almost 21 packets
per second which is very slow and reason behind it is the
packet flooding done by the DDoS attacker in the MANET
cluster in this simulation. The latter two properties have
shown the effectiveness of the TORA protocol to handle the
network under the DDoS attack in MANETs. Routing
overhead and throughput has been shown under the DDoS
attack MANET over TORA protocol shown in the figure 31
and 32 respectively. The Routing overhead is recorded at
very higher rate and also, the throughput is pretty higher
than the AODV under attack and TORA and AODV under
normal situations results.
8. Conclusion
In this research, the performance evaluation survey has been
performed on AODV and TORA protocols. Both of the
protocols have been tested under the normal and attack
situations in MANET environments using Network
Simulator -2 (NS-2). The protocol performance has been
evaluated on the basis of various parameters such as, delay,
network load, packet drop rate, total no. of packets sent,
throughput, etc.
Total 11 numbers of nodes has been simulated in the
simulation. Each node functions according to following four
categories: sender nodes, receiver nodes, end routing nodes,
traversing nodes. There are total two paths between the
sender nodes and receiver nodes. First Path consisted of the
end nodes 7 and 8, followed by end routing node 0, which is
connected to other end node 5 via nodes 1 and 2 to reach
node 6. Whereas, the second path consisted of everything
similar expect the two nodes 1 and 2. Instead of nodes 1 and
2 there are nodes 3 and 4 traversing nodes have been used to
connect end nodes 0 and 5. The nodes 7 and 8 are launching
the distributed denial of service attack on the node 1. This is
pretty sure that DDoS attack has a definite tendency towards
a decrease in the performance of TORA. But in this
simulation, we had to test the results of TORA under normal
conditions and under DDoS attack with each other and with
AODV under DDoS attack. All of the simulations have been
simulated with total 11 nodes. The nodes have been divided
into four major parts: sender nodes, receiver nodes, end
routing nodes, traversing nodes. There are total two paths
between the sender nodes and receiver nodes. First Path
consisted of the end nodes 7 and 8, followed by end routing
node 0, which is connected to other end node 5 via nodes 1
and 2 to reach node 6. Whereas, the second path consisted of
everything similar expect the two nodes 1 and 2. Instead of
nodes 1 and 2 there are nodes 3 and 4 traversing nodes have
been used to connect end nodes 0 and 5. The observed
results of both of the TORA simulation have shown that
TORA under normal conditions has worked far better than
TORA under DDoS attack. Similarly, AODV under normal
conditions has performed way better than AODV under
DDoS attack. When the results of AODV and TORA, both
under normal situations have been compared, the AODV has
been observed as the better candidate in comparison with
TORA under the normal simulation. It means the AODV
protocol is recommended for the MANETs, where the
probability of attack is lesser or no attack. The AODV and
TORA under DDoS attack results have shown that TORA is
the poor performer than the AODV. The AODV is observed
effective to handle the MANETs under situation of DDoS
attack. In both scenarios, the AODV has been observed as
the perfect candidate out of the two compared.
9. Future Work
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: SEP14699 303
Licensed Under Creative Commons Attribution CC BY
8. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
In future, the new security mechanisms against DDoS,
balckhole or other variant of DDoS (like selective jamming
attack, packet dropping attack, etc.) AODV or TORA can
proposed. Also, the best considered AODV protocol can be
compared with the other candidate protocols used for
MANET simulations. AODV or TORA, or both of them can
be compared with more protocols or with each other under
different conditions in MANETs or other environments.
References
[1] Tariq A. Alahdal, Saida Mohammad, “Performance of
Standardized Routing Protocols in Ad-hoc Networks”,
ICCEEE, vol. 1, pp. 23-28, IEEE, 2013.
[2] P.Kuppusamy, Dr.K.Thirunavukkarasu, ” A Study and
Comparison of OLSR, AODV and TORA Routing
Protocols in Ad Hoc Networks”, pp. 143-147, IEEE,
2011.
[3] Lamyaa M.T. Harb, Dr. M. Tantawy, Prof. Dr. M.
Elsoudani, ”PERFORMANCE OF MOBILE AD HOC
NETWORKS UNDER ATTACK”, pp. 1201-1206,
IEEE 2013.
[4] Asma Tuteja et. al, “Comparative Performance Analysis
of DSDV, AODV and DSR Routing Protocols in
MANET using NS2”, ICACE, pp. 330-333, IEEE 2010.
[5] Samir R. Das et. al, “Comparative Performance
Evaluation of Routing Protocols for Mobile, Ad hoc
Networks”, ICCCN, pp. 153-161, IEEE, 1998.
[6] Jaya Jacob et. al, “ Performance Analysis and
Enhancement of Routing Protocol in Manet”, vol. 2,
issue 2, pp. 323-328, IJMER, 2012.
[7] Anuj K. Gupta, Dr. Harsh Sadawarti, “Performance
analysis of AODV, DSR & TORA Routing Protocols”,
IACSIT, vol. 2, no. 2, vol. 226-231, IJET, 2010.
[8] Anu Bala, Munish Bansal, Jagpreet Singh,
“Performance Analysis of MANET under Blackhole
Attack”, ICNC, vol. 1, pp. 141-145, IEEE 2009.
[9] Gaurav Kumar Gupt, Mr. Jitendra Singh, “Truth of D-DoS
Attacks in MANET”, vol. 10, issue 15, GJCST
Volume 3 Issue 10, October 2014
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
2010.
Paper ID: SEP14699 304