Beruflich Dokumente
Kultur Dokumente
Abstract—MANET consists of a collection of nodes which addressed [3] Each node in the MANET network is an ad hoc
dynamically can be made anywhere without using a fixed network which is always moving so that it affects the MANET network
infrastructure such as a base station so that MANET becomes because of its changing properties along with the movement
vulnerable to network attacks. The black hole attack is one of
several types of attacks that occurs in MANET. A black hole of the node. As each node is a free-moving router, the proper
attack is an attack that causes packets around the attacking MANET network protocol is essential to help nodes sending
node to disappear as of the network loses several information data quickly and more efficiently.
and can reduce its performances. Choosing the right routing The dynamic MANET network makes it very vulnerable
protocol is one of the efforts to minimize the impact of black to attacks that occur from within and outside of the network.
hole attacks in MANET. This study was done to compare which
is better between AODV and DSR routing protocol during black There are several types of attacks on the MANET network, one
hole attack in MANET. From the simulation results, the AODV of which is a black hole attack. The black hole attack works
routing protocol shows better values compared to DSR routing by taking a packet that passes on the node around the black
protocol from several QoS parameters such as throughput, delay, hole node, then the packet will be discarded. Black hole nodes
and packet loss; either before being hit by black hole attacks or place themselves in the midst of sending packets between the
after being hit by single black hole and collaborative black hole
attacks. sending and the receiving nodes. Black hole attacks can easily
enter the network because the attack mechanism is simple and
I. I NTRODUCTION it can have a negative impact on the network.
A study that compares the performance of Ad-Hoc On-
Mobile Ad hoc ad-hoc Network (MANET) consists of a Demand Distance Vector (AODV) and Dynamic Source Rout-
set of wireless device points (nodes) that are dynamic and ing (DSR) protocols in MANET has been carried out by [4].
temporary without using an existing network infrastructure The results of this study indicate that AODV protocol has a
such as a base station. The MANET network does not require better throughput value than DSR. However, AODV routing
infrastructure that uses large costs; therefore, there is no protocol shows longer delay due to rerouting when a link was
need to construct physical communication networks in places broken compared to DSR protocol. Another study comparing
where the infrastructures are difficult to build such as on the the performance of AODV and DSR routing protocols was
battlefield, in natural disasters area, forests, and oceans [1]. done by [5]. The node formation used in this study was
Each node on the MANET network not only functions random with the scenario of increasing the number of nodes.
as a host but can also function as a router to forward data The simulation results using Network Simulator 2 (NS2)
packets from one device to another. In ad hoc networks, show that the AODV routing protocol shows better results
the route between nodes on an ad hoc network is multihop; than the DSR routing protocol. Moreover, the DSR routing
thus, communication between nodes utilizes other nodes as protocol had lower Quality of Service (QoS) values when the
intermediaries if the direct communication range is outside number of nodes is increased. Meanwhile, a study of black
the communication destination node [2]. Ad hoc is a simple hole attacks detection on MANET networks was done by [6],
wireless Local Area Network mode because it does not require where detection and intervention of the black holes attacks are
an access point. Each host has a transmitter and receiver to done by using the AODV routing protocol. The author uses
communicate directly. the scheme to increase the number of nodes and utilize the
The routing protocol is a standardized setting of a node to previous routing table by adding isolation information to the
forward packets from one node to another. On the MANET nodes that have been affected. A.A. Chavan [7] et al analyzed
network, each node is a router that determines the route to be AODV and Destination Sequenced Distance Vector (DSDV)
978-1-5386-6670-8/18/$31.00
2018
c IEEE routing protocol performances during black hole attack. In this
paper, simulation was done by increasing number of nodes that
involved in data transmission.
Black hole attacks on the MANET network are proven to
reduce network performance in terms of the QoS [8]. Previous
studies [4]– [6] show that the AODV protocol has advantages
over DSR routing protocols. However, in black hole attacks,
the AODV protocol performance decreases when it is hit by a
black hole attack. Nevertheless, apart from AODV and DSDV, S: Source
D: Destination
other networks have not been tested for their routing protocols
performance in black hole attacks. Therefore, this study aimed
Fig. 1. AODV routing scheme
to analyze the impact of black hole attacks on the AODV and
DSR routing protocol on the MANET network. The analysis
was done before and after being hit by single and collaborative Routing loops can be defined as the conditions when a packet
black hole attacks to show how much black hole attacks that is transmitted on a route never reaches the destination.
affecting the performance of both routing protocols. In AODV, if there is a packet delivery request to a node, the
This paper is organized as follows. Chapter 2 provides a RREQ packet will be distributed to the surrounding nodes. If
brief description of the functions and mechanisms of routing the node receiving the RREQ packet has information of the
protocols as well as an explanation of black holes attacks on route to the destination node, the node will reply by sending
MANET networks. Meanwhile, Chapter 3 explains the system the RREP packet to the source node as in Fig. 1. However, if
that was built and the parameters used to simulate the MANET the node doesn’t know it, the RREQ message will be broadcast
network with and without black hole attacks. Chapter 3 also again by the node to the surrounding nodes after the hop
presents graphs and analysis of simulation results. Finally, counter value is added.
Chapter 4 provides the conclusions of the paper. In AODV, nodes use sequence numbers to keep correct in-
formation of reverse paths leading to the source node. Reverse
II. MANET ROUTING P ROTOCOLS
path is formed when RREQ goes through the intended node,
A routing protocol is standardization of node settings for where each RREQ will be identified from the surrounding
route search. MANET routing protocols are classified into nodes that sent the RREQ earlier. When the destination node
three, namely reactive, proactive, and hybrid [9]. This study has the route information and receives the RREQ packet, the
compared the protocols from the reactive class, namely AODV sequence number value in RREQ will be compared. If the
and DSR. Proactive protocol routing works by flooding nodes sequence number value in RREQ is greater than the value in
that are connected to information regarding their neighbors. the receiving node, then the RREQ packet will be forwarded
Proactive routing protocols store routing information and to the surrounding node. In contrast, if the sequence number
maintain it up to date, by exchanging packages to neighbors. value on the receiving node is the same or greater than the
Examples of proactive protocols are DSDV, OLSR, WRP, value in RREQ, then the RREP packet will be sent by the node
and others [10]. Meanwhile, reactive routing protocol works to return to the source node using the reverse path that was
only when there is a node that requests to find the route to created previously. Thus, the function of the Reverse Path is
the destination. This reduces the overhead that occurs in the to enable the destination node to reach the source node, which
proactive protocol. Examples of reactive protocols are AODV, will be used as a route for sending data packets [13].
DSR, and others [9]. The hybrid class protocol works by Furthermore, if the route has been formed, then the source
combining the advantages of reactive and proactive classes node is responsible for maintaining the route. If there is an
[11]. error in the future, the Route Maintenance will send the RERR
packet to the damaged node and to all the nodes in the network
A. Ad-Hoc On Demand Distance Vector (AODV)
until it is back to the source. AODV routing protocol can
AODV is one of the reactive protocols in MANET that adapt to its changing node formation dynamically. Moreover,
works according to demand. In AODV, the route from one the routing head size of this protocol is small so that the
node to another will be created if the source node wants the bandwidth can be used efficiently [14]. Still, because AODV
packet to be sent to the selected destination node. Nodes in routing protocol only creates route table based on request, not
AODV will store the routing table for only one destination periodically, the transmission of a new node with different
node for one route [12]. In AODV routing, if the route is not topology will result in longer delay [14].
used at the specified time, the route will be removed from the
routing table. The route search process on AODV is divided B. Dynamic Source Routing (DSR)
into two types, namely, route discovery and route maintenance. DSR is also one of the few reactive routing protocols
Route discovery uses two packages, Request Route (RREQ) available like AODV. DSR has a few similar mechanisms with
and Route Reply (RREP). Meanwhile, Route Maintenance AODV. DSR uses two mechanisms to connect routes by Route
using the Route Error (RERR) package. To generate a routing Discovery and Route Maintenance using the RREP, RREQ,
loop-free route, AODV uses the sequence number feature. and RRER packages.
S: Source
RREQ
S: Source
D: Destination D: Destination Fake RREP
One of the differences between DSR and AODV is that In this way, the source node will reject the RREP packet
the DSR route selection is based on the source node. DSR from another node that has replied to the RREQ packet, even
does not have a periodic messaging feature like AODV. DSR though the reply route is the correct one. Therefore, the route
has a Cache Memory feature that functions as a storage for between the source and the attacker will be formed and then
all routing information available on the network. The cache the packet will be discarded by the attacking node [13]. The
memory makes the process of network recovery easier if the illustration of the black hole attack is shown in Fig. 3.
network topology changes suddenly. DSR no longer needs to
route discovery if there is a topology change. DSR only needs III. S IMULATION AND A NALISYS
to find the route available in the cache memory that stores In this study, the performance of each protocol was assessed
routing information [14]. by making several different scenarios. The first scenario was
The route search mechanism on DSR is nearly similar with in the form of default settings when the node had not been
AODV, that is, if the source node wants to send data but hit by a black hole attack. The second scenario was when the
does not have information of the route to be passed, DSR second routing protocol was hit by a black hole attack. Finally,
will start the route search process by distributing the RREQ the last scenario was when the MANET network was hit by
packet to its nearest node. The RREQ package sent contains a black hole from a collection of attacker nodes that formed
the sender’s address and destination. The nodes that receive the collaborative black holes. Fig. 4 shows the MANET topology
RREQ packet will store information of the path into the cache with 3 colaborative attacks.
memory. If a route has been found, the node will send the
RREP packet to reply to its original route. The RREP package
is sent using the Reverse Path line that was formed when
sending the RREQ package. The route search process on DSR
can be seen in Fig. 2. DSR protocol is able to provide routes
with many paths and minimize route maintenance process that
usually should be done continuously [14]. Nevertheless, due to
its use of cache memory in storing paths, this protocol cannot
withstand too much additional network load [14].
250 3.5
216.14 3.072
207.33
197.9 3
200 2.521
Throughput (kbit/s)
2.5 2.246
Delay (ms)
150
2
1.5
100
73.42 70.18 64.75
1 0.719 0.718
0.623
50
0.5
0 0
Scenario 1 Scenario 2 Scenario 3 Scenario 1 Scenario 2 Scenario 3
without and with black hole attacks on the MANET network B. Delay analysis
for AODV and DSR routing protocols. The comparison of the delay results in all scenarios are
shown in Fig. 6. As can be seen in Fig. 6, the average delay
A. Throughput analysis in the AODV protocol was smaller than the DSR, which
Fig. 5 shows throughput results of the simulation. In terms means that the DSR protocol required a longer time in packet
of throughput, AODV and DSR routing protocol had the ability delivery. The high delay in DSR was related to the DSR route
to transmit different data. In AODV, in the no attack scenario, search that is based on Source Routing, which makes it has a
the throughput was 216.14 bit/s while the DSR only had 73.42 longer delay compared to the AODV protocol. However, the
bit/s. This was caused by several factors. One reason why DSR can still be categorized in the excellent category [16].
the DSR protocol had a lower throughput was that it uses When the MANET Network was given a single and collab-
the Source Routing mechanism when searching for the route, orative black hole, the two routing protocols gave nearly the
which makes the route search longer and affects its throughput. same response. When the attack occurs, the performance of
The second reason was the AODV uses periodic messages on the network became unstable, especially the delay parameters
nodes that have formed a route to maintain its route; thus, the became erratic. This was caused by the black hole node tried
AODV has greater throughput than DSR. to hold the packet at a certain time and then released it in a
In a single black hole scenario, the throughput of the AODV certain time too. This affects the latency of the two routing
routing protocol decreased by 4.25% while the DSR protocol protocols to fluctuate.
experienced a slightly different decrease of 4.62%. This was
caused by the influence of the malicious Black Hole node C. Packet Loss analysis
that makes the MANET network become unstable due to the As can be seen in Fig. 7, in the no attack scenario,
absorption process and the disposal of packages carried out by both routing protocols experienced a very small packet loss.
the black hole nodes and resulting in decreased throughput. However, in the single or collaborative black hole attack,
Meanwhile, in the collaborative black hole attacks sce- packet loss occurred in both protocols. Packet losses in the
nario, there was a significant throughput decrease of 9.21% AODV protocol for the single and collaborative black hole
and 13.38% for the AODV and DSR protocols, respectively, attack were 1.72% and 1.88%, respectively.
compared to the no attack scenario. This decline was caused The packet loss of the AODV was smaller than the DSR
by black hole attacks that were carried out in groups, which routing protocol. In DSR, the packet losses for the single and
resulted in a significant decrease in throughput. collaborative black hole attack were 2.16% and 6.06%, respec-
7.00% [8] J. Kumar, M. Kulkarni, and D. Gupta, ”Effect of Black Hole Attack
6.06% on MANET Routing Protocols,” International Journal of Computer
6.00% Network and Information Security, vol. 5, no. 5, pp. 64–72, 2013.
[9] A. Kumar B R, L. C. Reddy, and P. S. Hiremath, ”Performance
Packet Loss Ra!o (%)