Skip to main content
Erschienen in: Wireless Personal Communications 1/2017

28.04.2017

Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet

verfasst von: Parvinder Kaur, Dalveer Kaur, Rajiv Mahajan

Erschienen in: Wireless Personal Communications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a part of any network at any time that’s why it is susceptible to different types of attacks. Wormhole attack is most threatening security attack in ad hoc network where an attacker node receives packet at one location and replay them at other location which is remotely located far. In this paper, we study and compare the performance of AODV, DSR and ZRP under the impact of multiple wormhole attacker nodes. Diverse scenarios are characterized as like average of 50 runs and mobility. By statistical placement of multiple wormhole nodes across the network, we evaluate the performance in terms of throughput, packet delivery ratio, packet loss, average end to end delay and jitter. Finally based on the simulation we investigated the most affected routing protocol in terms of network metrics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ho, Yao H., Ho, Ai H., & Hua, Kien A. (2008). Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. Computer Communications, 31(12), 2767–2780.CrossRef Ho, Yao H., Ho, Ai H., & Hua, Kien A. (2008). Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. Computer Communications, 31(12), 2767–2780.CrossRef
2.
Zurück zum Zitat Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. IEEE Communications Magazine, 40(5), 20–22.CrossRef Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. IEEE Communications Magazine, 40(5), 20–22.CrossRef
3.
Zurück zum Zitat Bansal, M., Rajput, R., & Gupta, G. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society. Bansal, M., Rajput, R., & Gupta, G. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society.
4.
Zurück zum Zitat Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55.CrossRef Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55.CrossRef
5.
Zurück zum Zitat Giordano, S. (2002). Mobile ad hoc networks, In Handbook of wireless networks and mobile computing (pp. 325–346). Giordano, S. (2002). Mobile ad hoc networks, In Handbook of wireless networks and mobile computing (pp. 325–346).
6.
Zurück zum Zitat Nguyen, Hoang Lan, & Nguyen, Uyen Trang. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef Nguyen, Hoang Lan, & Nguyen, Uyen Trang. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef
7.
Zurück zum Zitat Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef
8.
Zurück zum Zitat Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef
9.
Zurück zum Zitat Sesay, S., Yang, Z., & He, J. (2004). A survey on mobile ad hoc wireless network. Information Technology Journal, 3(2), 168–175.CrossRef Sesay, S., Yang, Z., & He, J. (2004). A survey on mobile ad hoc wireless network. Information Technology Journal, 3(2), 168–175.CrossRef
10.
Zurück zum Zitat Das, Samir R., Castañeda, Robert, & Yan, Jiangtao. (2000). Simulation-based performance evaluation of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 5(3), 179–189.CrossRefMATH Das, Samir R., Castañeda, Robert, & Yan, Jiangtao. (2000). Simulation-based performance evaluation of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 5(3), 179–189.CrossRefMATH
11.
Zurück zum Zitat Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. Communications Surveys & Tutorials, IEEE, 10(4), 78–93.CrossRef Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. Communications Surveys & Tutorials, IEEE, 10(4), 78–93.CrossRef
12.
Zurück zum Zitat Mahajan, V., Natu, M., & Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANET. In MILCOM 2008-2008 IEEE Military Communications Conference. IEEE. Mahajan, V., Natu, M., & Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANET. In MILCOM 2008-2008 IEEE Military Communications Conference. IEEE.
13.
Zurück zum Zitat Awerbuch B., et al. (2004) Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, p. 16. Awerbuch B., et al. (2004) Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, p. 16.
14.
Zurück zum Zitat Arora, M., Challa, R. K., & Bansal, D. (2010). Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In Second International Conference on Computer and Network Technology (pp. 102–104). IEEE. Arora, M., Challa, R. K., & Bansal, D. (2010). Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In Second International Conference on Computer and Network Technology (pp. 102–104). IEEE.
15.
Zurück zum Zitat Garg, G., Kaushal, S., & Sharma, A. (2014, July). Reactive protocols analysis with wormhole attack in ad-hoc networks. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1–7). IEEE. Garg, G., Kaushal, S., & Sharma, A. (2014, July). Reactive protocols analysis with wormhole attack in ad-hoc networks. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1–7). IEEE.
16.
Zurück zum Zitat Sanaei, M. G., Isnin, I. F., & Bakhtiari, M. (2013). Performance evaluation of routing protocol on AODV and DSR under wormhole attack. International Journal of Computer Networks and Communications Security, 1. Sanaei, M. G., Isnin, I. F., & Bakhtiari, M. (2013). Performance evaluation of routing protocol on AODV and DSR under wormhole attack. International Journal of Computer Networks and Communications Security, 1.
17.
Zurück zum Zitat Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of impact of wormhole attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of impact of wormhole attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
18.
Zurück zum Zitat Dong, D., Li, M., Liu, Y., Li, X. Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking (TON), 19(6), 1787–1796.CrossRef Dong, D., Li, M., Liu, Y., Li, X. Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking (TON), 19(6), 1787–1796.CrossRef
19.
Zurück zum Zitat Hu, Y-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies (Vol. 3). IEEE. Hu, Y-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies (Vol. 3). IEEE.
20.
Zurück zum Zitat Poovendran, Radha, & Lazos, Loukas. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef Poovendran, Radha, & Lazos, Loukas. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef
21.
Zurück zum Zitat Chiu, H. S., & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International Symposium on Wireless Pervasive Computing (pp. 6-pp). IEEE. Chiu, H. S., & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International Symposium on Wireless Pervasive Computing (pp. 6-pp). IEEE.
22.
Zurück zum Zitat Xu, Y., et al. (2007) Detecting wormhole attacks in wireless sensor networks. In International Conference on Critical Infrastructure Protection. Springer US. Xu, Y., et al. (2007) Detecting wormhole attacks in wireless sensor networks. In International Conference on Critical Infrastructure Protection. Springer US.
23.
Zurück zum Zitat Mbarushimana, C., & Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In AINAW’07 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, (Vol. 2). IEEE. Mbarushimana, C., & Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In AINAW’07 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, (Vol. 2). IEEE.
24.
Zurück zum Zitat Saeed, N. H., Abbod, M. F., & Al-Raweshidy, H. S. (2012). MANET routing protocols taxonomy. In 2012 International Conference on Future Communication Networks (ICFCN), (pp. 123–128). IEEE. Saeed, N. H., Abbod, M. F., & Al-Raweshidy, H. S. (2012). MANET routing protocols taxonomy. In 2012 International Conference on Future Communication Networks (ICFCN), (pp. 123–128). IEEE.
25.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561). Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561).
26.
Zurück zum Zitat Chaurasia, U. K., & Singh, V. (2013). MAODV: Modified wormhole detection AODV protocol. In 2013 Sixth International Conference on Contemporary Computing (IC3), (pp. 239–243). IEEE. Chaurasia, U. K., & Singh, V. (2013). MAODV: Modified wormhole detection AODV protocol. In 2013 Sixth International Conference on Contemporary Computing (IC3), (pp. 239–243). IEEE.
27.
Zurück zum Zitat Kim, Seongkwan, et al. (2011). Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networks. Ad Hoc Networks, 9(7), 1343–1358.CrossRef Kim, Seongkwan, et al. (2011). Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networks. Ad Hoc Networks, 9(7), 1343–1358.CrossRef
28.
Zurück zum Zitat Johnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks. Draft-ietf-manet-dsr-09. Txt. Johnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks. Draft-ietf-manet-dsr-09. Txt.
29.
Zurück zum Zitat Chen, L., Yang R., & Huang, M. (2016). Ad hoc high-dynamic routing protocol simulation and research. In Wireless Communications, Networking and Applications (pp. 399–408). Springer India. Chen, L., Yang R., & Huang, M. (2016). Ad hoc high-dynamic routing protocol simulation and research. In Wireless Communications, Networking and Applications (pp. 399–408). Springer India.
30.
Zurück zum Zitat Boukerche, Azzedine. (2004). Performance evaluation of routing protocols for ad hoc wireless networks. Mobile Networks and Applications, 9(4), 333–342.CrossRef Boukerche, Azzedine. (2004). Performance evaluation of routing protocols for ad hoc wireless networks. Mobile Networks and Applications, 9(4), 333–342.CrossRef
32.
Zurück zum Zitat Beijar, N. (2002). Zone routing protocol (ZRP) (pp. 1–12). Espoo: Networking Laboratory, Helsinki University of Technology. Beijar, N. (2002). Zone routing protocol (ZRP) (pp. 1–12). Espoo: Networking Laboratory, Helsinki University of Technology.
33.
Zurück zum Zitat Sharma, D., Kumar, V., & Kumar, R. (2016). Prevention of wormhole attack using identity based signature scheme in MANET, In Computational Intelligence in Data Mining—Volume 2 (pp. 475–485), Springer India. Sharma, D., Kumar, V., & Kumar, R. (2016). Prevention of wormhole attack using identity based signature scheme in MANET, In Computational Intelligence in Data MiningVolume 2 (pp. 475–485), Springer India.
34.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370–380.CrossRef Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370–380.CrossRef
35.
Zurück zum Zitat Maulik, R., & Chaki, N. (2010). A comprehensive review on wormhole attacks in MANET. In International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE. Maulik, R., & Chaki, N. (2010). A comprehensive review on wormhole attacks in MANET. In International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE.
36.
Zurück zum Zitat Kaur, G., Jain, V. K., & Chaba, Y. (2011). Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Ad hoc networks. In World Congress on Information and Communication Technologies. Kaur, G., Jain, V. K., & Chaba, Y. (2011). Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Ad hoc networks. In World Congress on Information and Communication Technologies.
37.
Zurück zum Zitat Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M. K., Li, X., & Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PloS one, 10(1), e0115324.CrossRef Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M. K., Li, X., & Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PloS one, 10(1), e0115324.CrossRef
38.
Zurück zum Zitat Mohapatra, S., & Kanungo, P. (2012). Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. Procedia Engineering, 30, 69–76.CrossRef Mohapatra, S., & Kanungo, P. (2012). Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. Procedia Engineering, 30, 69–76.CrossRef
39.
Zurück zum Zitat Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in Manet: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in Manet: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef
40.
Zurück zum Zitat Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2. Berlin: Springer. Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2. Berlin: Springer.
41.
Zurück zum Zitat Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2002). Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, ACM. Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2002). Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, ACM.
42.
Zurück zum Zitat Kumar, J., Singh, A., Panda, M. K., & Bhadauria, H. S. (2016). Study and performance analysis of routing protocol based on CBR. Procedia Computer Science, 85, 23–30.CrossRef Kumar, J., Singh, A., Panda, M. K., & Bhadauria, H. S. (2016). Study and performance analysis of routing protocol based on CBR. Procedia Computer Science, 85, 23–30.CrossRef
Metadaten
Titel
Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet
verfasst von
Parvinder Kaur
Dalveer Kaur
Rajiv Mahajan
Publikationsdatum
28.04.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4150-2

Weitere Artikel der Ausgabe 1/2017

Wireless Personal Communications 1/2017 Zur Ausgabe

Neuer Inhalt