SlideShare uma empresa Scribd logo
1 de 5
Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.201-205
201 | P a g e
Performance Analysis of AODV under Worm Hole Attack
through Use of NS2 Simulator
Ankur Ratmele*
and Asst. Prof. Rajesh Dhakad**
*Research Scholar, Department of Computer Engineering, SGSITS, Indore (M.P), India.
**Asst. Prof., Department of Computer Engineering, SGSITS, Indore (M.P), India
ABSTRACT-
Wireless networks are gaining
popularity to its peak from past, as the users
want wireless connectivity irrespective of their
geographic position. There is an increasing threat
of attacks on the Mobile Ad-hoc Networks
(MANET). Any node in mobile ad hoc networks
operates not only as end terminal but both as an
intermediate router and client. In this way,
multi-hop communication occurs in MANETs
and thus it is a difficult task to establish a secure
path between source and destination. It generally
works by broadcasting the information and used
air as medium. Its broadcasting nature and
transmission medium also help attacker, whose
intention is to spy or disrupt the network. When
two malicious nodes forward packet through a
private “tunnel” in the network, in which one
node is nearer to the source and other node is
nearer to the destination and packet travelled
through this malicious nodes. This type of
activity is known as wormhole attack. NS2 is
chosen as a simulation environment because it is
one of the leading environments for network
modeling and simulation.
Keywords- Mobile Ad hoc network,ns-2,
Wormhole attack.
INTRODUCTION-
Mobile wireless ad hoc networks are
fundamentally different from wired networks, as
they use wireless medium to communicate, do not
rely on fixed infrastructure and can arrange them
into a network quickly and efficiently. In a Mobile
Ad Hoc Network (MANET) [1], each node serves as
a router for other nodes, which allows data to travel,
utilizing multi-hop network paths, beyond the line
of sight without relying on wired infrastructure.
Security in such networks, however, is a great
concern .The open nature of the wireless medium
makes it easy for
Outsiders to listen to network traffic or
interfere with it. Lack of centralized control
authority makes Deployment of traditional
centralized security mechanisms difficult, if not
impossible. Lack of clear network entry points also
makes it difficult to implement perimeter-based
defense mechanisms such as firewalls. Finally, in a
MANET nodes might be battery-powered and might
have very limited resources, this may make the use
of heavy-weight security solutions undesirable.
MANETs often suffer from security attacks because
of its features like open medium, changing its
topology dynamically, lack of central monitoring
and management, cooperative algorithms and no
clear defense mechanism. These factors have
changed the battle field situation for the MANETs
against the security threats [2].
The MANETs work without a centralized
administration where the nodes communicate with
each other on the basis of mutual trust. This
characteristic makes MANETs more vulnerable to
be exploited by an attacker inside the network.
Wireless links also makes the MANETs more
susceptible to attacks, which make it easier for the
attacker to go inside the network and get access to
the ongoing communication [3, 4]. Mobile nodes
present within the range of wireless link can
overhear and even participate in the network.
Wormhole attack is a network layer attack
[5]. In a typical wormhole attack at least two
colluding node in the network are located at
different places that are not in direct communication
range of each other i.e. one near to the source node
and another near to the destination node thus
bypassing information from source node to
destination node and disrupting proper routing.
In this paper, we concentrate on the
throughput analysis of an Ad-hoc network
consisting of 16 nodes. We use Ad-hoc on demand
Routing (AODV) protocol and carry out simulations
to evaluate the performance of wireless ad-hoc
network.
NS2[6] is selected to carry out the
simulation. Ns2 provide technologies, protocols,
communication devices for academic research,
assessment and improvement. It is efficient robust
and highly reliable which grant the user the ease of
graphical interface, developing and running the
simulation and validation of the results. Network
Simulator (Version 2), widely known as ns-2, is
simply a discrete event driven network simulation
tool for studying the dynamic nature of
Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.201-205
202 | P a g e
communication networks. It is an open source
solution implemented in C++ and Otcl programming
languages. ns-2 provides a highly modular platform
for wired and wireless simulations supporting
different network element, protocol (e.g., routing
algorithms, TCP, UDP, and FTP), traffic, and
routing types. In general, ns-2 provides users with a
way of specifying network protocols and simulating
their corresponding behaviors.
In this we investigate the throughput of
wireless ad-hoc network simulation considering
AODV protocol. We compare the throughput
simulation results of AODV without wormhole
attack and with the wormhole attack.
II.Related Work
The most commonly cited wormhole
prevention mechanism is „packet leashes‟ by Hu et
al [7], proposed to add secure „leash‟ containing
timing and/or Global Positioning System (GPS)
information to each packet on a hop-by-hop basis.
Based on the information contained in a packet
leash, a node receiving the packet would be able to
determine whether the packet has traveled a distance
larger than physically possible.
Hu proposed two different kinds of leashes:
geographical leashes and temporal leashes.
Geographic leashes require each node to have access
to up-to-date GPS information, and rely on loose (in
the order of ms) clock synchronization. When
geographical leashes are used, a node sending a
packet appends to it the time the packet is sent t
s
and
its location p
s
. A receiving node uses its own
location p
r
and the time it receives a packet t
r
to
determine the distance the packet could have
traveled. Keeping in mind maximum possible node
velocity v, clock synchronization error Δ, and
possible GPS distance error Δ, the distance between
the sender and the receiver d
sr
is upper-bounded by:
d
sr
<||p
s
-p
r
||+2v(t
r
-t
s
+Δ)+Δ ……..(i)
Geographical leashes should work fine
when GPS coordinates are practical and available.
However, modern GPS technology has significant
limitations that should not be overlooked. While the
price of GPS devices is going down, it remains
substantial.
Finally, GPS systems are not versatile, as
GPS devices do not function well inside buildings,
under water, in the presence of strong magnetic
radiation, etc. As opposed to geographical leashes,
temporal leashes require much tighter clock
synchronization (in the order of nanoseconds), but
do not rely on GPS information. When temporal
leashes are used, the sending node specifies the time
it sends a packet t
s
in a packet leash, and the
receiving node uses its own packet reception time t
r
for verification. In a slightly different version of
temporal packet leashes, the sending node calculates
an expiration time t
e
after which a packet should not
be accepted, and puts that information in the leash.
This is to prevent a packet from traveling farther
than distance L
t
e
=t
s
+L/C-Δ,
….(ii)
where, C is the speed of light and Δ is the maximum
clock.
One possible way to prevent wormholes, as
used by Capkun et al[8] , Hu et al[9] , Hong et
al[10] , and Korkmaz et al[11], is to measure round-
trip travel time of a message and its
acknowledgement, estimate the distance between
the nodes based on this travel time, and determine
whether the calculated distance is within the
maximum possible communication range. The basis
of all these approaches is the following. The Round
Trip Travel Time (RTT) δ of a message in a wireless
medium can, theoretically, is related to the distance
d between nodes, assuming that the wireless signal
travels with a speed of light c:
d=(δc) / 2and δ=2d/c ………………….. iii)
The neighbor status of nodes is verified if d
is within the radio transmission range R for R > d (d
within transmission range): R >δc/2 and δ<2R/c. In
essence, the use of RTT eliminates the need for tight
clock synchronization required in temporal leashes:
a node only uses its own clock to measure time.
However, this approach, while accounting for
message propagation, completely ignores message
processing time. When a message is sent by one
node and is acknowledged by another, the time it
takes for a node to process a message and to reply to
it is generally non-negligible, particularly in the
context of bounding short distances using signals
whose speed is similar to that of light in vacuum.
After all, it takes the light less than 0.2 seconds to
circle the entire Earth around the equator.
Outstanding clock precision and practically
nonexistent errors are required to bind distances on
the order of hundreds of meters.
III. Overview of AODV Protocol
Ad hoc On-Demand Distance Vector
(AODV) routing is a routing protocol for mobile ad
hoc networks and other wireless ad-hoc networks. It
is jointly developed in Nokia Research Centre of
University of California, Santa Barbara and
University of Cincinnati by C. Perkins and S. Das. It
is an on-demand and distance-vector routing
protocol, meaning that a route is established by
AODV from a destination only on demand. AODV
is capable of both unicast and multicast routing. It
keeps these routes as long as they are desirable by
the sources. Additionally, AODV creates trees
which connect multicast group members. The trees
are composed of the group members and the nodes
needed to connect the members. The sequence
Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.201-205
203 | P a g e
numbers are used by AODV to ensure the freshness
of routes. It is loop-free, self-starting, and scales to
large numbers of mobile nodes. AODV defines
three types of control messages for route
maintenance:
RREQ- A route request message is
transmitted by a node requiring a route to a node. As
an optimization AODV uses an expanding ring
technique when flooding these messages. Every
RREQ carries a time to live (TTL) value that states
for how many hops this message should be
forwarded. This value is set to a predefined value at
the first transmission and increased at
retransmissions. Retransmissions occur if no replies
are received. Data packets waiting to be transmitted
(i.e. the packets that initiated the RREQ). Every
node maintains two separate counters: a node
sequence number and a broadcast_ id. The RREQ
contains the following fields.
The pair <source address, broadcast ID> uniquely
identifies a RREQ. Broadcast_id is incremented
whenever the source issues a new RREQ.
RREP- A route reply message is unicast
back to the originator of a RREQ if the receiver is
either the node using the requested address, or it has
a valid route to the requested address. The reason
one can unicast the message back, is that every route
forwarding a RREQ caches a route back to the
originator.
RERR- Nodes monitor the link status of
next hops in active routes. When a link breakage in
an active route is detected, a RERR message is used
to notify other nodes of the loss of the link. In order
to enable this reporting mechanism, each node keeps
a ―precursor list'', containing the IP address for
each its neighbors that are likely to use it as a next
hop towards each destination.
Wormhole Attack
Wormhole attack is a network layer attack.
In a typical wormhole attack at least two colluding
nodes in the network are located at different places
that are not in direct communication range of each
other i.e. one near to the source node and another
near to the destination node thus bypassing
information from source node to destination node
and disrupting proper routing. In Fig. 1, M1 and M2
are two colluding nodes. The malicious node M1
takes data near the source node then tunnels it to M2
placed near the destination node. Communication of
data occurs via path having this low latency link all
the times due to less number of hops.
Fig.1 wormhole attack
IV. Simulation Description
The ns-2 simulator is the most popular
network simulator today Ns2 is a discrete event
simulator targeted at networking research. It
provides substantial support for simulation of TCP,
routing and multicast protocols over wired and
wireless networks. It consists of two simulation
tools. The network simulator (ns) contains all
commonly used IP protocols. The network animator
(nam) is use to visualize the simulations. Ns2 fully
simulates a layered network from the physical radio
transmission channel to high level applications.Ns2
is an object oriented simulator written in C++ and
OTcl. The simulator supports a class hierarchy in
C++ and a similar class hierarchy within the OTcl
interpreter. There is a one-to-one correspondence
between a class in the interpreted hierarchy and one
in the compile hierarchy.
Simulation Parameter
Parameter Value
Mobility Model Two Ray Ground Model
Nodes (Wifi) 16
Simulation Time 20sec
Packet Size 1000 bytes
Node Speed 10m/s
Traffic model CBR
Simulation Scenario
Following are the simulation Scenarios in which
there are 16 nodes. Node 0 is source node and node
4 is the destination node.
1. Simulation of AODV without wormhole
Attack
Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.201-205
204 | P a g e
Fig.2 simulation of aodv
2. Simulation of AODV with wormhole attack
Fig.3 Simulation of attack
In this node 3 and node 4 are the malicious nodes
and wormhole link is established as shown. Packet
is travelled through these malicious nodes. So
packets will not reach to the destination.
V. Performance Evaluation:
The following are the graphs shown below. These
graphs are the throughput-time graph.
a. Throughput/Time Graph without wormhole
attack
Fig.4 Graph without wormhole attack
a. Throughput/Time Graph with wormhole attack
Fig.5 Graph with wormhole attack
VI. Conclusion
In this paper we carried out the simulation
using ns2.We used AODV protocol. In Fig.4 shown
without wormhole attack packet reached to the
destination. Varying throughput with time indicate
that the packet reached to the destination but in the
Fig.5 shown with the wormhole attack there is
constant line i.e zero throughput ,which indicate that
no packet is reached to the destination because
malicious node dropped all the received packet. So
no packet is received at the destination.
Effects of wormhole attack
Effect of wormhole attack in the network is that
packet is not reached to the destination as shown in
the fig.5.
REFERNCES
[1] C.Siva Ram Murthy and B. S. Manoj. “Ad
hoc wireless networks: Architecture and
Protocols”. Prentice Hall Publishers, May
2004, ISBN 013147023X.
[2] P.V.Jani, “Security within Ad-Hoc
Networks,” Position Paper, PAMPAS
Workshop, Sept. 16/17 2002.
[3] P.V.Jani, “Security within Ad-Hoc
Networks,” Position Paper, PAMPAS
Workshop, Sept. 16/17 2002.
[4] K.Biswas and Md. Liaqat Ali, “Security
threats in Mobile Ad-Hoc Network”,
Master Thesis, Blekinge Institute of
Technology” Sweden, 22nd March 2007.
[5] Mishra Amitabh, Nadkarni Ketan M., and
Ilyas Mohammad. “Chapter 30: Security in
wireless ad-hoc networks, the handbook of
Ad hoc wireless network”.CRC PRESS
Publisher, 2003.
Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.201-205
205 | P a g e
[6] The ns2 network simulator,”
http://www.isi.edu/snam/
[7] Y.-C. Hu, A. Perrig, D. B. Johnson;
“Packet leashes: a defense against
wormhole attacks in wireless networks”;
INFOCOM 2003, Twenty-Second Annual
Joint Conference of the IEEE Computer
and Communication Societies, Vol. 3, pp.
1976-1986, 2003.
[8] S.Capkun, L. Buttyan, J.-P. Hubaux;
“SECTOR: Secure Tracking of Node
Encounters in Multi-Hop Wireless
Networks”; Proc. of the 1st ACM
Workshop on Security of Ad Hoc and
Sensor Networks; 2003.
[9] Y-C Hu, A. Perrig, D. Johnson; “Rushing
Attacks and Defense in Wireless Ad Hoc
Network Routing Protocols”; Proc. of
WISE 2003, September 19, San Diego,
California, USA, 2003.
[10] Korkmaz T.; “Verifying Physical Presence of
Neighbours against Replay-based Attacks
in Wireless Ad Hoc Networks”; Proc.
International Conference on Information
Technology: Coding and Computing 2005,
ITCC 2005, pp. 704-709, 2005.
[11] M.Parsons and P.Ebinger, “Performance
Evaluation of the Impact of Attacks on
mobile Ad-Hoc networks.

Mais conteúdo relacionado

Mais procurados

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksCSCJournals
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET Journal
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 

Mais procurados (18)

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
IJET-V2I6P5
IJET-V2I6P5IJET-V2I6P5
IJET-V2I6P5
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 

Destaque

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destaque (8)

Plancompensacionnuskin
PlancompensacionnuskinPlancompensacionnuskin
Plancompensacionnuskin
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a Performance analysis of AODV under wormhole attack

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...IJNSA Journal
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Semelhante a Performance analysis of AODV under wormhole attack (20)

E42043640
E42043640E42043640
E42043640
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Performance analysis of AODV under wormhole attack

  • 1. Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.201-205 201 | P a g e Performance Analysis of AODV under Worm Hole Attack through Use of NS2 Simulator Ankur Ratmele* and Asst. Prof. Rajesh Dhakad** *Research Scholar, Department of Computer Engineering, SGSITS, Indore (M.P), India. **Asst. Prof., Department of Computer Engineering, SGSITS, Indore (M.P), India ABSTRACT- Wireless networks are gaining popularity to its peak from past, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate router and client. In this way, multi-hop communication occurs in MANETs and thus it is a difficult task to establish a secure path between source and destination. It generally works by broadcasting the information and used air as medium. Its broadcasting nature and transmission medium also help attacker, whose intention is to spy or disrupt the network. When two malicious nodes forward packet through a private “tunnel” in the network, in which one node is nearer to the source and other node is nearer to the destination and packet travelled through this malicious nodes. This type of activity is known as wormhole attack. NS2 is chosen as a simulation environment because it is one of the leading environments for network modeling and simulation. Keywords- Mobile Ad hoc network,ns-2, Wormhole attack. INTRODUCTION- Mobile wireless ad hoc networks are fundamentally different from wired networks, as they use wireless medium to communicate, do not rely on fixed infrastructure and can arrange them into a network quickly and efficiently. In a Mobile Ad Hoc Network (MANET) [1], each node serves as a router for other nodes, which allows data to travel, utilizing multi-hop network paths, beyond the line of sight without relying on wired infrastructure. Security in such networks, however, is a great concern .The open nature of the wireless medium makes it easy for Outsiders to listen to network traffic or interfere with it. Lack of centralized control authority makes Deployment of traditional centralized security mechanisms difficult, if not impossible. Lack of clear network entry points also makes it difficult to implement perimeter-based defense mechanisms such as firewalls. Finally, in a MANET nodes might be battery-powered and might have very limited resources, this may make the use of heavy-weight security solutions undesirable. MANETs often suffer from security attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithms and no clear defense mechanism. These factors have changed the battle field situation for the MANETs against the security threats [2]. The MANETs work without a centralized administration where the nodes communicate with each other on the basis of mutual trust. This characteristic makes MANETs more vulnerable to be exploited by an attacker inside the network. Wireless links also makes the MANETs more susceptible to attacks, which make it easier for the attacker to go inside the network and get access to the ongoing communication [3, 4]. Mobile nodes present within the range of wireless link can overhear and even participate in the network. Wormhole attack is a network layer attack [5]. In a typical wormhole attack at least two colluding node in the network are located at different places that are not in direct communication range of each other i.e. one near to the source node and another near to the destination node thus bypassing information from source node to destination node and disrupting proper routing. In this paper, we concentrate on the throughput analysis of an Ad-hoc network consisting of 16 nodes. We use Ad-hoc on demand Routing (AODV) protocol and carry out simulations to evaluate the performance of wireless ad-hoc network. NS2[6] is selected to carry out the simulation. Ns2 provide technologies, protocols, communication devices for academic research, assessment and improvement. It is efficient robust and highly reliable which grant the user the ease of graphical interface, developing and running the simulation and validation of the results. Network Simulator (Version 2), widely known as ns-2, is simply a discrete event driven network simulation tool for studying the dynamic nature of
  • 2. Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.201-205 202 | P a g e communication networks. It is an open source solution implemented in C++ and Otcl programming languages. ns-2 provides a highly modular platform for wired and wireless simulations supporting different network element, protocol (e.g., routing algorithms, TCP, UDP, and FTP), traffic, and routing types. In general, ns-2 provides users with a way of specifying network protocols and simulating their corresponding behaviors. In this we investigate the throughput of wireless ad-hoc network simulation considering AODV protocol. We compare the throughput simulation results of AODV without wormhole attack and with the wormhole attack. II.Related Work The most commonly cited wormhole prevention mechanism is „packet leashes‟ by Hu et al [7], proposed to add secure „leash‟ containing timing and/or Global Positioning System (GPS) information to each packet on a hop-by-hop basis. Based on the information contained in a packet leash, a node receiving the packet would be able to determine whether the packet has traveled a distance larger than physically possible. Hu proposed two different kinds of leashes: geographical leashes and temporal leashes. Geographic leashes require each node to have access to up-to-date GPS information, and rely on loose (in the order of ms) clock synchronization. When geographical leashes are used, a node sending a packet appends to it the time the packet is sent t s and its location p s . A receiving node uses its own location p r and the time it receives a packet t r to determine the distance the packet could have traveled. Keeping in mind maximum possible node velocity v, clock synchronization error Δ, and possible GPS distance error Δ, the distance between the sender and the receiver d sr is upper-bounded by: d sr <||p s -p r ||+2v(t r -t s +Δ)+Δ ……..(i) Geographical leashes should work fine when GPS coordinates are practical and available. However, modern GPS technology has significant limitations that should not be overlooked. While the price of GPS devices is going down, it remains substantial. Finally, GPS systems are not versatile, as GPS devices do not function well inside buildings, under water, in the presence of strong magnetic radiation, etc. As opposed to geographical leashes, temporal leashes require much tighter clock synchronization (in the order of nanoseconds), but do not rely on GPS information. When temporal leashes are used, the sending node specifies the time it sends a packet t s in a packet leash, and the receiving node uses its own packet reception time t r for verification. In a slightly different version of temporal packet leashes, the sending node calculates an expiration time t e after which a packet should not be accepted, and puts that information in the leash. This is to prevent a packet from traveling farther than distance L t e =t s +L/C-Δ, ….(ii) where, C is the speed of light and Δ is the maximum clock. One possible way to prevent wormholes, as used by Capkun et al[8] , Hu et al[9] , Hong et al[10] , and Korkmaz et al[11], is to measure round- trip travel time of a message and its acknowledgement, estimate the distance between the nodes based on this travel time, and determine whether the calculated distance is within the maximum possible communication range. The basis of all these approaches is the following. The Round Trip Travel Time (RTT) δ of a message in a wireless medium can, theoretically, is related to the distance d between nodes, assuming that the wireless signal travels with a speed of light c: d=(δc) / 2and δ=2d/c ………………….. iii) The neighbor status of nodes is verified if d is within the radio transmission range R for R > d (d within transmission range): R >δc/2 and δ<2R/c. In essence, the use of RTT eliminates the need for tight clock synchronization required in temporal leashes: a node only uses its own clock to measure time. However, this approach, while accounting for message propagation, completely ignores message processing time. When a message is sent by one node and is acknowledged by another, the time it takes for a node to process a message and to reply to it is generally non-negligible, particularly in the context of bounding short distances using signals whose speed is similar to that of light in vacuum. After all, it takes the light less than 0.2 seconds to circle the entire Earth around the equator. Outstanding clock precision and practically nonexistent errors are required to bind distances on the order of hundreds of meters. III. Overview of AODV Protocol Ad hoc On-Demand Distance Vector (AODV) routing is a routing protocol for mobile ad hoc networks and other wireless ad-hoc networks. It is jointly developed in Nokia Research Centre of University of California, Santa Barbara and University of Cincinnati by C. Perkins and S. Das. It is an on-demand and distance-vector routing protocol, meaning that a route is established by AODV from a destination only on demand. AODV is capable of both unicast and multicast routing. It keeps these routes as long as they are desirable by the sources. Additionally, AODV creates trees which connect multicast group members. The trees are composed of the group members and the nodes needed to connect the members. The sequence
  • 3. Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.201-205 203 | P a g e numbers are used by AODV to ensure the freshness of routes. It is loop-free, self-starting, and scales to large numbers of mobile nodes. AODV defines three types of control messages for route maintenance: RREQ- A route request message is transmitted by a node requiring a route to a node. As an optimization AODV uses an expanding ring technique when flooding these messages. Every RREQ carries a time to live (TTL) value that states for how many hops this message should be forwarded. This value is set to a predefined value at the first transmission and increased at retransmissions. Retransmissions occur if no replies are received. Data packets waiting to be transmitted (i.e. the packets that initiated the RREQ). Every node maintains two separate counters: a node sequence number and a broadcast_ id. The RREQ contains the following fields. The pair <source address, broadcast ID> uniquely identifies a RREQ. Broadcast_id is incremented whenever the source issues a new RREQ. RREP- A route reply message is unicast back to the originator of a RREQ if the receiver is either the node using the requested address, or it has a valid route to the requested address. The reason one can unicast the message back, is that every route forwarding a RREQ caches a route back to the originator. RERR- Nodes monitor the link status of next hops in active routes. When a link breakage in an active route is detected, a RERR message is used to notify other nodes of the loss of the link. In order to enable this reporting mechanism, each node keeps a ―precursor list'', containing the IP address for each its neighbors that are likely to use it as a next hop towards each destination. Wormhole Attack Wormhole attack is a network layer attack. In a typical wormhole attack at least two colluding nodes in the network are located at different places that are not in direct communication range of each other i.e. one near to the source node and another near to the destination node thus bypassing information from source node to destination node and disrupting proper routing. In Fig. 1, M1 and M2 are two colluding nodes. The malicious node M1 takes data near the source node then tunnels it to M2 placed near the destination node. Communication of data occurs via path having this low latency link all the times due to less number of hops. Fig.1 wormhole attack IV. Simulation Description The ns-2 simulator is the most popular network simulator today Ns2 is a discrete event simulator targeted at networking research. It provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. It consists of two simulation tools. The network simulator (ns) contains all commonly used IP protocols. The network animator (nam) is use to visualize the simulations. Ns2 fully simulates a layered network from the physical radio transmission channel to high level applications.Ns2 is an object oriented simulator written in C++ and OTcl. The simulator supports a class hierarchy in C++ and a similar class hierarchy within the OTcl interpreter. There is a one-to-one correspondence between a class in the interpreted hierarchy and one in the compile hierarchy. Simulation Parameter Parameter Value Mobility Model Two Ray Ground Model Nodes (Wifi) 16 Simulation Time 20sec Packet Size 1000 bytes Node Speed 10m/s Traffic model CBR Simulation Scenario Following are the simulation Scenarios in which there are 16 nodes. Node 0 is source node and node 4 is the destination node. 1. Simulation of AODV without wormhole Attack
  • 4. Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.201-205 204 | P a g e Fig.2 simulation of aodv 2. Simulation of AODV with wormhole attack Fig.3 Simulation of attack In this node 3 and node 4 are the malicious nodes and wormhole link is established as shown. Packet is travelled through these malicious nodes. So packets will not reach to the destination. V. Performance Evaluation: The following are the graphs shown below. These graphs are the throughput-time graph. a. Throughput/Time Graph without wormhole attack Fig.4 Graph without wormhole attack a. Throughput/Time Graph with wormhole attack Fig.5 Graph with wormhole attack VI. Conclusion In this paper we carried out the simulation using ns2.We used AODV protocol. In Fig.4 shown without wormhole attack packet reached to the destination. Varying throughput with time indicate that the packet reached to the destination but in the Fig.5 shown with the wormhole attack there is constant line i.e zero throughput ,which indicate that no packet is reached to the destination because malicious node dropped all the received packet. So no packet is received at the destination. Effects of wormhole attack Effect of wormhole attack in the network is that packet is not reached to the destination as shown in the fig.5. REFERNCES [1] C.Siva Ram Murthy and B. S. Manoj. “Ad hoc wireless networks: Architecture and Protocols”. Prentice Hall Publishers, May 2004, ISBN 013147023X. [2] P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002. [3] P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002. [4] K.Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007. [5] Mishra Amitabh, Nadkarni Ketan M., and Ilyas Mohammad. “Chapter 30: Security in wireless ad-hoc networks, the handbook of Ad hoc wireless network”.CRC PRESS Publisher, 2003.
  • 5. Ankur Ratmele, Asst. Prof. Rajesh Dhakad / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.201-205 205 | P a g e [6] The ns2 network simulator,” http://www.isi.edu/snam/ [7] Y.-C. Hu, A. Perrig, D. B. Johnson; “Packet leashes: a defense against wormhole attacks in wireless networks”; INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, Vol. 3, pp. 1976-1986, 2003. [8] S.Capkun, L. Buttyan, J.-P. Hubaux; “SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks”; Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks; 2003. [9] Y-C Hu, A. Perrig, D. Johnson; “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols”; Proc. of WISE 2003, September 19, San Diego, California, USA, 2003. [10] Korkmaz T.; “Verifying Physical Presence of Neighbours against Replay-based Attacks in Wireless Ad Hoc Networks”; Proc. International Conference on Information Technology: Coding and Computing 2005, ITCC 2005, pp. 704-709, 2005. [11] M.Parsons and P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks.