Beruflich Dokumente
Kultur Dokumente
net/publication/262979806
CITATIONS READS
0 1,038
1 author:
Dr Mukesh Kumar
The Technological Institute of Textile and Sciences
73 PUBLICATIONS 185 CITATIONS
SEE PROFILE
All content following this page was uploaded by Dr Mukesh Kumar on 01 July 2014.
Abstract: Ad hoc is used to describe solutions that are developed AODV is a source initiated on-demand routing protocol. It is
on-the-fly for a specific purpose or Ad hoc is used to indicate an on-demand and distance-vector routing protocol, meaning
something that is done at the time without planning ahead of that a route is established by AODV from a destination only
time. In this paper, we have analyzed the performance of Mobile on demand [7]. Every mobile node maintains a routing table
Ad-hoc Networks (MANET) under Black hole and wormhole
that maintains the next hop node information for a route to the
attack. As for any network the delay, throughput are main
parameter so here we are analyzing the throughput of the destination node. When a source node wishes to route a packet
network. The NS2 network simulator has been used and graphs to a destination node, it uses the specified route if a fresh
have been produced using xgraph. enough route to the destination node is available in its routing
table. If not, it starts a route discovery process by broadcasting
Keywords: MANET, Black hole, wormhole, NS-2. the Route Request (RREQ) message to its neighbors, which is
further propagated until it reaches an intermediate node with a
I. INTRODUCTION: fresh enough route to the destination node specified in the
Mobile Ad-hoc Network (MANET) is formed by some RREQ, or the destination node itself.
wireless nodes communicating each other without having any
central coordinator to control their function. Such a network is Black Hole Attack
helpful in creating communication between nodes that may
not be in line-of-sight and outside wireless transmission range A black hole attack is referred to as a node dropping all
of each other. Similar wireless networks have important packets and sending forged routing packets to route packets
applications in a wide range of areas covering from health, over itself. A malicious node absorbs all data packets in itself,
environmental control to military systems. In MANET, as the similar to a hole which sucks in everything in. In this way, all
nodes are utilizing open air medium to communicate, they packets in the network are dropped.
face acute security problems compared to the wired medium.
Two such critical problems are Black Hole attack and A malicious node dropping all the traffic in the network
Wormhole attack. A black hole attack is referred to as a node makes use of the vulnerabilities of the route discovery packets
dropping all packets and sending forged routing packets to of the on demand protocols, such as AODV. In route
route packets over itself. A malicious node absorbs all data discovery process of AODV protocol, intermediate nodes are
packets in itself, similar to a hole which sucks in everything responsible to find a fresh path to the destination, sending
in. In this way, all packets in the network are dropped [1]. discovery packets to the neighbor nodes. Malicious nodes do
Under Wormhole attack, two faraway malicious nodes can not use this process and instead, they immediately respond to
collude together using either wired link or directional antenna, the source node with false information as though it has fresh
to give an impression that they are only one hop away. enough path to the destination [1].
Wormhole attack can be launched in hidden or in participation
mode. Wormholes can either be used to analyze the traffic
through the network or to drop packets selectively or Wormhole Attack
completely to affect the flow of information [2].
In Wormhole attack if more than one node is compromised, it
II. ROUTING PROTOCOL: is reasonable to assume that these nodes interact in order to
gain an additional advantage. This allows the adversary to
There are many types of routing protocol like Flat routing, perform a more effective attack. In Wormhole attack two
Geographical routing and Hierarchical. For our purpose here adversaries collude by tunneling packets between each other
we are using the ad hoc on demand distance vector (AODV) in order to create a shortcut (or Wormhole) in the network.
protocol which is a kind of Flat Routing protocol. The adversaries can send a route request and discover a route
across the ad hoc network, then tunnel packets through the
Ad hoc On Demand Distance Vector Routing (AODV) non-adversarial nodes to execute the attack. The adversaries
44
III. RESULTS
Average Throughput
Average throughput or network throughput is the average rate
of successful message delivery over a communication
channel. This may be delivered over a physical or logical link
or pass through a certain network node. The throughput is
usually measured in bits per second (bps) and sometimes in
data packets per second or data packets per time slot.
We evaluate the throughput of simple AODV using different
values of mobility and we also evaluate the average
throughput with black hole and wormhole attack using AODV
and we note the variation in average throughput with the Figure 2: Average Throughput (Black Hole)
variation in the value of mobility.
Here figure 2 is showing the Average Throughput vs mobility
Below figure 1 is showing the Average Throughput vs
graph for the black hole attack. The figure shows that the
mobility graph for AODV protocol. The figure shows that the
Average Throughput is varying with the mobility. Here x-axis
average throughput is varying with the mobility. Here x-axis
represents the mobility and y-axis represents the Average
represents the mobility and y-axis represents the average
Throughput.
throughput.
45
Packet Delay:
The delay of a network specifies how long it takes for a bit of
data to travel across the network from one node or end point
Figure 7: Packet Delay (Black Hole)
to another. It is typically measured in multiplies or fractions of
46
The figure is showing the delay vs mobility graph for the Figure 9: Comparison of AODV and Black Hole Attack for Delay
black hole attack. The figure shows that the delay in packets
transfer is varying with the mobility. Here x-axis represents
the mobility and y-axis represents the delay.
The results of comparison between AODV Protocol and
Wormhole attack for Delay is noticed from the simulation run
and are shown earlier in the tables. The comparison graph
between these two is shown below.
Comparison
The results of comparison between AODV Protocol and Black IV. CONCLUSION
Hole attack for Delay is noticed from the simulation run and
are shown earlier in the tables. The comparison graph between The proposed work is about the analysis of Black hole attack
these two is shown below. and Wormhole attack with AODV protocol. The proposed
work is about to improve the AODV protocol in terms of
security. As in case of multicast network because of lot of
communication the networks suffer from some attack that
results the packet loss over the network. The proposed work is
about to minimize this packet loss over the network. The work
will increase the throughput. The system is implemented in a
wireless network with AODV protocol. For this purpose, we
implemented an AODV protocol with Black Hole attack and
Wormhole attack in NS-2. Having simulated the Black Hole
attack and Wormhole attack, we saw that the packet loss is
increased. There is also decrease in the Throughput of the
network. Tables of simulation results show the difference
between the output with and without the Black Hole and
Wormhole attack. This also shows that Black Hole attack and
Wormhole attacks affects the overall network connectivity
and the data loss could show the existence of Black Hole and
Wormhole attack in the network. If the number of Black Hole
nodes is increased then the data loss would also be expected to
increase.
47
REFERENCES
48