Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
II. METHODOLOGY
We designed WiMAX based mobile adhoc network by
using NS2 software. The wormhole attack is done by the node
in the mobile adhoc network. The wormhole detection process
is given in figure 3.
III. SIMULATION PARAMETERS & NETWORK MODEL The design steps of the network model are given in figure
The simulation parameters to design WiMAX based 4. The WiMAX based mobile adhoc network is formed in
mobile adhoc network is given in the table 1. WiMAX works NS2. Firstly the WiMAX parameters as well as simulation
on the licensed as well as unlicensed frequency bands. To parameters which are given in the table 1 are set. Then the
design WiMAX based MANET system we choose unlicensed source and destinations positions of all sender and receiver
2.4 GHz frequency which comes under the band of line of mobile nodes are set with some fixed mobility’s. Here all
sight frequency band for WiMAX standard. The bandwidth of mobile nodes will change their locations so as to change the
the channel is 20 MHz. here we used two ray ground topology of the network. Now connect UDP and CBR agents
propagation model for transmission of the packets by multiple to all sender mobile nodes and NULL agent to all receiver
paths. Mac type is IEEE 802.16 i.e. WiMAX. Routing nodes. Now start the simulation. Before data transmission and
protocol plays crucial role in any adhoc network. Here we reception wormhole attack will be detected by the system and
choose AODV reactive routing protocol to determine the if it occurs then it will be prevented. Now it’s time to calculate
various routes for the transmission of the data. Total number performance parameters of the network. Here we calculate
of mobile node in this mobile adhoc network is 10. The total throughput, delay and packet delivery ratio of the designed
simulation time is 10 sec and the simulation area is 500m X system.
500m.
IV. RESULT
TABLE 1. Simulation parameters of designed network
The designed WiMAX based mobile adhoc network
scenario consists of 10 mobile nodes and one base station. In
Parameter Quantity WiMAX based mobile adhoc network packet always transfer
Frequency 2.4 GHz through base station towards the receiver node. Figure 5
shows that data transmission and reception takes place in
Bandwidth 20 MHz
between two mobile nodes through base station. Circle
Propagation Model Two Ray Ground Propagation indicates coverage area of the network.
Mac 802.16 (WiMAX)
Routing Protocol AODV
No. of Nodes 10
Simulation time 10 Sec
Simulation Area 500m X 500m
UDP protocol we can use TCP protocol also to transmit and [5] Brijendra Kumar Joshi and Megha Soni, “Security Assessment of
AODV Protocol under Wormhole and DOS Attacks”, IEEE
receive the data packets. If one increases the simulation area
Conference, 2016.
then relay stations may increase so anyone can work on the [6] Susheel Kumar, Vishal Pahal and Sachin Garg, “Wormhole attack
technique which will increase the packet delivery ratio of the in Mobile Ad Hoc Networks: A Review”, IRACST – Engineering
system. Science and Technology: An International Journal (ESTIJ), ISSN:
2250-3498, Vol.2, No. 2, pp. 268-275, April 2012.
REFERENCES [7] A.VANI and D.Sreenivasa Rao, “A Simple Algorithm for
Detection and Removal of Wormhole Attacks for Secure Routing
[1] Mohan Patsariya and Anand Rajavat, “Hybrid Routing Approach In Ad Hoc Wireless Networks”, International Journal on Computer
and WIMAX Network for Minimization Routing Overhead and Science and Engineering (IJCSE), ISSN : 0975-3397, pp. 2377-
Increasing Radio Range in MANET”, IEEE Fourth International 2384, June 2011.
Conference on Computational Intelligence and Communication [8] Majid Khabbazian, Hugues Mercier and Vijay K. Bhargava,
Networks, 2012. “Wormhole Attack in Wireless Ad Hoc Networks: Analysis and
[2] Shoma Nakahara, Tomoyuki Ohta, and Yoshiaki Kakuda, Countermeasure”, IEEE, 2006.
“Experimental Evaluation of MANET Based on Autonomous [9] Priya Maidamwar and Nekita Chavhan, “A Survey on Security
Clustering and P2P Overlay Network”, IEEE First International Issues to Detect Wormhole Attack in Wireless Sensor Network”,
Symposium on Computing and Networking, 2013. International Journal on AdHoc Networking Systems (IJANS) Vol.
[3] Hao Zhang and Jinxu Guo, “Application of Manet Routing 2, No. 4, DOI: 10.5121/ijans.2012.2404, pp. 37-50, October 2012.
Protocol in Vehicular Ad Hoc Network Based on NS3”, IEEE [10] Zuber Patel and Upena Dalal,” Implementation and Evaluation of
Conference, 2017. Dynamically Weighted Low Complexity Fair Queuing (DWLC-
[4] Supriya Khobragade and Puja Padiya, “Detection and Prevention FQ)Algorithm for Packet Scheduling in WiMAX Networks”,
of Wormhole Attack Based on Delay Per Hop Technique for protocols and algorithms, China Communications, pp. 128-140,
Wireless Mobile Ad-hoc Network”, International conference on May 2016.
Signal Processing, Communication, Power and Embedded System
(SCOPES)-2016.