Beruflich Dokumente
Kultur Dokumente
A Route Reply (RREP) message is received by the Figure 2. Route Discovery Process with RREP packets
source node unicasted by any node in one of the
following conditions: if the intermediate node is the
targeted destination node or if it is having an optimal 1 2
route to the targeted destination node in its routing
table. The RREP packet structure is as follows [5]:
S D
Destination
Source Destination Hop Expiration
Sequence
Address Address Count Time
Number
3
A node broadcasts a Route Error (RERR) packet
when a link with its neighboring node is broken. The Figure 3. Route Establishment
RERR packet structure is as follows [6]:
The Route Maintenance process is initiated when a
Unreachable Destination Unreachable Destination
IP Address Sequence Number
node is unreachable or a link is broken. Active nodes
broadcast a HELLO message periodically to get the
information about nodes movements. In Route
AODV mainly consists of two processes in it: Route
Maintenance process, source node will again initialize
Discovery process & Route Maintenance process [5].
a novel or a fresh route discovery process and flood the
The process of Route Discovery is initiated whenever entire network with RREQ packets to rediscover the
a source node needs to send out all the data packets to path to the destination node as shown in figure 4.
a required destination node. In this process, a RREQ
packet is broadcasted by a source node to all of its
neighboring nodes. After receiving the RREQ packet,
an intermediate node checks its routing table and
RREQ packet. This malicious
m (Black Hole) node
1 2 claims that it has a secu
cure and best suitable path to the
destination node and indicates
ind that data packets should
route through this mal alicious node; therefore all data
traffic will be routed through
t this malicious node as
S 4 shown in figure 5 [7].
3
RERR packet RSU RSU
Accident ahea
ead
1 2 RREQ packet
Malicious vehicles
S D Accident ahead
ad
3
Figure 6. Black
k Hole Attack in VANET
Figure 4. Route Maintena
nance Process
Figure 6 illustrates a Black
Bl Hole attack scenario where
The most significant advantages of
o the AODV routing attack is formed by a number
n of malicious vehicles &
protocol are that it offers loww overhead & uses they refuse to broadcascast the received messages from
sequence numbers to guarantee the
he novelty of routes. the legitimate vehicless to the other legitimate vehicles
behind them.
3. ANALYSIS OF BLACK
K HOLE
ATTACK The consequence of the Black Hole attack is that the
The Black Hole attack is one off the serious types of malicious vehicle can an either drop or misuse the
active routing attack in which ch a malicious node intercepted data packets
ets without forwarding them and
(vehicle) pretends to have an optimum
op route to the as a result network perfo
rformance degrades.
destination, sends fake routinging information and 4. SIMULATION
N ENVIRONMENT
indicates that data packets should
uld route through this We have used MOVE E (MObility model generator for
malicious node [4]. VEhicular network) toool to generate a realistic mobility
Black Hole
node model for our VANET T simulation. It is based on an
4
7 5 open source micro-traffaffic simulator called Simulation
of Urban Mobility (SUMO).(S MOVE generates a
mobility trace file so that
th it can be later on used by the
D
NS-2.35 simulation too ool to provide a realistic model
S 6 8 for vehicle movements. ts. In our work, NS 2.35 has been
used for the simulationon of original AODV and Black
Hole AODV. NS-2.355 is an open-source simulation
tool which works on U Unix-like O.S. It is a discrete
event simulator, which h is essentially utilized in various
3 networking related resesearches. It also provides support
2 REPLY to simulate various typepes of protocols like TCP, UDP,
REQUEST FTP, AODV etc…
FAKE
REPLY 4.1 Simulation Par
arameters
Figure 5. Black Hole Attac
ack on AODV Table 1 illustrates the number
nu of simulation parameters
which are used to cond nduct the simulation of original
For example, in AODV routing pprotocol, a malicious
AODV and Black Hole le AODV.
node transmits a fake RREP meessage to the source
node. This fake RREP messag age contains a false
destination sequence number whhich is either greater
than or equal to the sequence number held in the
Table 1. Simulation Parameters measured as the received throughput in bit per sec (b/s)
S.No. PARAMETERS VALUES
at the traffic destination.
4.2.3 Normalized Routing Load (NRL):
1. Simulator NS-2 (Version 2.35) In the theoretical parlance, NRL is considered as the
total number of routing packets transmitted as an
2. Routing Protocol AODV
overhead to resolve the routing for a unit of data
packets received at the destination node.
3. Channel Type Channel/WirelessChannel
Number of nodes
13. 20
(vehicles)
Number of malicious
14. 1
node (vehicle)
4.2.2 Throughput:
In the theoretical parlance, Throughput is measured as
the total number of packets transmitted by a source to
the respective destination node at per unit of time. It is
Figure 8. Throughput vs. Node Mobility Figure 10. Number of dropped packets vs. Node Mobility
5.3 Normalized Routing Load (NRL): Figure 11 illustrates that the Number of dropped data
Figure 9 illustrates that the NRL values for original packets for Black Hole AODV is high (200-500
AODV decreases sharply as compared to the NRL packets) when we vary node mobility from 30m/s to
values for Black Hole AODV which are high when we 40m/s.
vary node mobility from 30m/s to 40 m/s.