Skip to main content
Top
Published in: Wireless Personal Communications 1/2017

28-04-2017

Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet

Authors: Parvinder Kaur, Dalveer Kaur, Rajiv Mahajan

Published in: Wireless Personal Communications | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a part of any network at any time that’s why it is susceptible to different types of attacks. Wormhole attack is most threatening security attack in ad hoc network where an attacker node receives packet at one location and replay them at other location which is remotely located far. In this paper, we study and compare the performance of AODV, DSR and ZRP under the impact of multiple wormhole attacker nodes. Diverse scenarios are characterized as like average of 50 runs and mobility. By statistical placement of multiple wormhole nodes across the network, we evaluate the performance in terms of throughput, packet delivery ratio, packet loss, average end to end delay and jitter. Finally based on the simulation we investigated the most affected routing protocol in terms of network metrics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ho, Yao H., Ho, Ai H., & Hua, Kien A. (2008). Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. Computer Communications, 31(12), 2767–2780.CrossRef Ho, Yao H., Ho, Ai H., & Hua, Kien A. (2008). Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. Computer Communications, 31(12), 2767–2780.CrossRef
2.
go back to reference Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. IEEE Communications Magazine, 40(5), 20–22.CrossRef Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. IEEE Communications Magazine, 40(5), 20–22.CrossRef
3.
go back to reference Bansal, M., Rajput, R., & Gupta, G. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society. Bansal, M., Rajput, R., & Gupta, G. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society.
4.
go back to reference Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55.CrossRef Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55.CrossRef
5.
go back to reference Giordano, S. (2002). Mobile ad hoc networks, In Handbook of wireless networks and mobile computing (pp. 325–346). Giordano, S. (2002). Mobile ad hoc networks, In Handbook of wireless networks and mobile computing (pp. 325–346).
6.
go back to reference Nguyen, Hoang Lan, & Nguyen, Uyen Trang. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef Nguyen, Hoang Lan, & Nguyen, Uyen Trang. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef
7.
go back to reference Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef
8.
go back to reference Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef
9.
go back to reference Sesay, S., Yang, Z., & He, J. (2004). A survey on mobile ad hoc wireless network. Information Technology Journal, 3(2), 168–175.CrossRef Sesay, S., Yang, Z., & He, J. (2004). A survey on mobile ad hoc wireless network. Information Technology Journal, 3(2), 168–175.CrossRef
10.
go back to reference Das, Samir R., Castañeda, Robert, & Yan, Jiangtao. (2000). Simulation-based performance evaluation of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 5(3), 179–189.CrossRefMATH Das, Samir R., Castañeda, Robert, & Yan, Jiangtao. (2000). Simulation-based performance evaluation of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 5(3), 179–189.CrossRefMATH
11.
go back to reference Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. Communications Surveys & Tutorials, IEEE, 10(4), 78–93.CrossRef Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. Communications Surveys & Tutorials, IEEE, 10(4), 78–93.CrossRef
12.
go back to reference Mahajan, V., Natu, M., & Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANET. In MILCOM 2008-2008 IEEE Military Communications Conference. IEEE. Mahajan, V., Natu, M., & Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANET. In MILCOM 2008-2008 IEEE Military Communications Conference. IEEE.
13.
go back to reference Awerbuch B., et al. (2004) Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, p. 16. Awerbuch B., et al. (2004) Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, p. 16.
14.
go back to reference Arora, M., Challa, R. K., & Bansal, D. (2010). Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In Second International Conference on Computer and Network Technology (pp. 102–104). IEEE. Arora, M., Challa, R. K., & Bansal, D. (2010). Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In Second International Conference on Computer and Network Technology (pp. 102–104). IEEE.
15.
go back to reference Garg, G., Kaushal, S., & Sharma, A. (2014, July). Reactive protocols analysis with wormhole attack in ad-hoc networks. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1–7). IEEE. Garg, G., Kaushal, S., & Sharma, A. (2014, July). Reactive protocols analysis with wormhole attack in ad-hoc networks. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1–7). IEEE.
16.
go back to reference Sanaei, M. G., Isnin, I. F., & Bakhtiari, M. (2013). Performance evaluation of routing protocol on AODV and DSR under wormhole attack. International Journal of Computer Networks and Communications Security, 1. Sanaei, M. G., Isnin, I. F., & Bakhtiari, M. (2013). Performance evaluation of routing protocol on AODV and DSR under wormhole attack. International Journal of Computer Networks and Communications Security, 1.
17.
go back to reference Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of impact of wormhole attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of impact of wormhole attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
18.
go back to reference Dong, D., Li, M., Liu, Y., Li, X. Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking (TON), 19(6), 1787–1796.CrossRef Dong, D., Li, M., Liu, Y., Li, X. Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking (TON), 19(6), 1787–1796.CrossRef
19.
go back to reference Hu, Y-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies (Vol. 3). IEEE. Hu, Y-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies (Vol. 3). IEEE.
20.
go back to reference Poovendran, Radha, & Lazos, Loukas. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef Poovendran, Radha, & Lazos, Loukas. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef
21.
go back to reference Chiu, H. S., & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International Symposium on Wireless Pervasive Computing (pp. 6-pp). IEEE. Chiu, H. S., & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International Symposium on Wireless Pervasive Computing (pp. 6-pp). IEEE.
22.
go back to reference Xu, Y., et al. (2007) Detecting wormhole attacks in wireless sensor networks. In International Conference on Critical Infrastructure Protection. Springer US. Xu, Y., et al. (2007) Detecting wormhole attacks in wireless sensor networks. In International Conference on Critical Infrastructure Protection. Springer US.
23.
go back to reference Mbarushimana, C., & Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In AINAW’07 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, (Vol. 2). IEEE. Mbarushimana, C., & Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In AINAW’07 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, (Vol. 2). IEEE.
24.
go back to reference Saeed, N. H., Abbod, M. F., & Al-Raweshidy, H. S. (2012). MANET routing protocols taxonomy. In 2012 International Conference on Future Communication Networks (ICFCN), (pp. 123–128). IEEE. Saeed, N. H., Abbod, M. F., & Al-Raweshidy, H. S. (2012). MANET routing protocols taxonomy. In 2012 International Conference on Future Communication Networks (ICFCN), (pp. 123–128). IEEE.
25.
go back to reference Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561). Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561).
26.
go back to reference Chaurasia, U. K., & Singh, V. (2013). MAODV: Modified wormhole detection AODV protocol. In 2013 Sixth International Conference on Contemporary Computing (IC3), (pp. 239–243). IEEE. Chaurasia, U. K., & Singh, V. (2013). MAODV: Modified wormhole detection AODV protocol. In 2013 Sixth International Conference on Contemporary Computing (IC3), (pp. 239–243). IEEE.
27.
go back to reference Kim, Seongkwan, et al. (2011). Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networks. Ad Hoc Networks, 9(7), 1343–1358.CrossRef Kim, Seongkwan, et al. (2011). Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networks. Ad Hoc Networks, 9(7), 1343–1358.CrossRef
28.
go back to reference Johnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks. Draft-ietf-manet-dsr-09. Txt. Johnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks. Draft-ietf-manet-dsr-09. Txt.
29.
go back to reference Chen, L., Yang R., & Huang, M. (2016). Ad hoc high-dynamic routing protocol simulation and research. In Wireless Communications, Networking and Applications (pp. 399–408). Springer India. Chen, L., Yang R., & Huang, M. (2016). Ad hoc high-dynamic routing protocol simulation and research. In Wireless Communications, Networking and Applications (pp. 399–408). Springer India.
30.
go back to reference Boukerche, Azzedine. (2004). Performance evaluation of routing protocols for ad hoc wireless networks. Mobile Networks and Applications, 9(4), 333–342.CrossRef Boukerche, Azzedine. (2004). Performance evaluation of routing protocols for ad hoc wireless networks. Mobile Networks and Applications, 9(4), 333–342.CrossRef
32.
go back to reference Beijar, N. (2002). Zone routing protocol (ZRP) (pp. 1–12). Espoo: Networking Laboratory, Helsinki University of Technology. Beijar, N. (2002). Zone routing protocol (ZRP) (pp. 1–12). Espoo: Networking Laboratory, Helsinki University of Technology.
33.
go back to reference Sharma, D., Kumar, V., & Kumar, R. (2016). Prevention of wormhole attack using identity based signature scheme in MANET, In Computational Intelligence in Data Mining—Volume 2 (pp. 475–485), Springer India. Sharma, D., Kumar, V., & Kumar, R. (2016). Prevention of wormhole attack using identity based signature scheme in MANET, In Computational Intelligence in Data MiningVolume 2 (pp. 475–485), Springer India.
34.
go back to reference Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370–380.CrossRef Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370–380.CrossRef
35.
go back to reference Maulik, R., & Chaki, N. (2010). A comprehensive review on wormhole attacks in MANET. In International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE. Maulik, R., & Chaki, N. (2010). A comprehensive review on wormhole attacks in MANET. In International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE.
36.
go back to reference Kaur, G., Jain, V. K., & Chaba, Y. (2011). Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Ad hoc networks. In World Congress on Information and Communication Technologies. Kaur, G., Jain, V. K., & Chaba, Y. (2011). Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Ad hoc networks. In World Congress on Information and Communication Technologies.
37.
go back to reference Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M. K., Li, X., & Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PloS one, 10(1), e0115324.CrossRef Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M. K., Li, X., & Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PloS one, 10(1), e0115324.CrossRef
38.
go back to reference Mohapatra, S., & Kanungo, P. (2012). Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. Procedia Engineering, 30, 69–76.CrossRef Mohapatra, S., & Kanungo, P. (2012). Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. Procedia Engineering, 30, 69–76.CrossRef
39.
go back to reference Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in Manet: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in Manet: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef
40.
go back to reference Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2. Berlin: Springer. Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2. Berlin: Springer.
41.
go back to reference Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2002). Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, ACM. Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2002). Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, ACM.
42.
go back to reference Kumar, J., Singh, A., Panda, M. K., & Bhadauria, H. S. (2016). Study and performance analysis of routing protocol based on CBR. Procedia Computer Science, 85, 23–30.CrossRef Kumar, J., Singh, A., Panda, M. K., & Bhadauria, H. S. (2016). Study and performance analysis of routing protocol based on CBR. Procedia Computer Science, 85, 23–30.CrossRef
Metadata
Title
Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet
Authors
Parvinder Kaur
Dalveer Kaur
Rajiv Mahajan
Publication date
28-04-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4150-2

Other articles of this Issue 1/2017

Wireless Personal Communications 1/2017 Go to the issue