Sei sulla pagina 1di 7

Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)

IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

Security Enhancement of AODV Routing


Protocol in Mobile Ad Hoc Network
Ashish Kumar Jain1, Ankita Choorasiya2
Institute of Engineering & Technology, Devi Ahilya University
Khandwa Road, Indore(M.P.)India
1
ajain@ietdavv.edu.in
2
ietankita29@gmail.com

ABSTRACT
computing trust value of the node of MANET. The
Mobile ad hoc Network (MANET) is a collection of
approach uses generation of dummy packets by the
network devices which are connected through the
source node and send to the destination node. Problem
wireless links. It is used to exchange the information.
is taken as, to develop an approach that can secure and
Thus in order to make the communication in MANET
enhance the performance of Reactive Routing Protocol
more secure we are exploring an approach based on
family.
trust method to secure MANETs against attacks such as
black hole attack, gray hole and DOS attack. The
Key Words: Key Words: MANET, Black Hole Attack,
proposed approach detects malicious node by
Gray Hole Attack, DOS Attack, Trust Computation

and when the malicious node find a data packet most


1. INTRODUCTION of the data is dropped. This affects the performance
of network by increasing the end to end delay, and
MANET is very useful in disaster & rescue decreasing throughput of network [5][6].
operation, household, commercial application, and
military battle field purpose [1][2].. Security in MANET is a necessity to those areas where proper
MANET is the most important concern for the infrastructure based lay out is difficult. MANETs are
primary functionality of network. MANETs is mobile, easy to deploy, work without any centralized
mostly suffer from security issues like different kind monitoring authority and the number of participating
of attacks because of its features s u c h a s open nodes are flexible. But this mobility also hampers in
medium, dynamically topology, lack of central fine working of the network. The basic principle of
monitoring. These factors have changed the battle MANET allows every aspiring node to become a part
field situation for the MANETs against the security of the network. This is possible due to on-demand
threats [3]. type of routing. Thus comes reactive routing
protocols into the picture. This protocol family meets
The proposed research work is an attempt to secure with the continuously changing needs of the
AODV routing protocol against all three attacks and MANET. They are light in weight, requires very less
in our work; we compared different scenarios of computation power. Thus a perfect routing protocol
modified AODV with normal AODV. We for the condition [7][8].
observed that, our implementation technique shows
superior performance over AODV affected with IETF MANET Working Group started research in
black hole attack, gray hole attack and DOS attacks, MANET because of its possibilities in areas like
due to better PDR and throughput values and less end natural calamities, war scenarios, alien territories. But
to end delay [4][5]. soon it was realized that security of information is as
important as delivery of information. There are a
In this presented work the security is major area of number of possible attacks that could cause some
interest. Therefore an optimum solution is desired to serious damage to the network. Problems like black
find for preventing the black hole and gray hole hole attack where a node poses itself as a contender
attack. In both of the attack conditions using the to become a part of the network, gets the access and
routing protocols the malicious attacker is deployed soon after the node starts dropping the packets [5].
and these attackers node advertise for having the very These types of attacks are known as Denial of
short path between source and destination. Thus most Service Attacks (DOS Attacks). These types of
of the traffic in network is attracted by these nodes attacks are very common in MANETs. There has

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 958


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

been a continuous research in the field but no Proposed Algorithm


standards have been defined.
If (PDR (Node) <= 30% of threshold || Request
2. Objective (Node) >= 80% of threshold){
Weight (node) = -5;
The main aim is to accomplish the following //add to blacklist
objectives after successfully implementation of the }
desired work. If (PDR (Node) >= 30% of threshold && PDR
(Node) <= 50% of threshold || Request (Node)
1. Detection and prevention of black hole, >= 50% of threshold && Request (Node) < =80%
gray hole attack and DOS attack. of threshold)
{
2. Performance preserving during attack Weight (node) = -2;
conditions. }
If (PDR (Node) >= 50% of threshold && PDR
3. Enhancing the performance and security in (Node) < =80% of threshold || Request (Node) >=
traditional AODV routing. 30% of threshold && Request (Node) <= 50% of
threshold) {
3 Operations Weight (node) = +1;
}
In order to support and prevent the malicious nodes If (PDR (Node) >= 80% of threshold || Request
in network the following operations are performed by (Node) <=30% of threshold)
the routing protocol. {
Weight (node) = +5;
1. Finding the PDR. }

2. Preparations of variance (threshold) values. On the basis of the assigned weight for the network
nodes we select the node as next hop node. The
3. Computations of trust of routing nodes. selection of next node is performed which has the
max weight or trust. This process is taken place after
4. Supporting the one hop acknowledgment a specified time interval. This process is repeated for
and reply. all the network nodes but when any node continue 3
times find below the threshold limit then the node is
5. Find the secure path. added to the blacklist and permanently block that
node communication for the whole network.
4. Proposed Technique

The proposed routing technique is a modification of Table 1: Simulation Setup


the traditional routing protocol namely AODV. In Simulation Values
order to perform the detection and prevention of the properties
black hole, gray hole and DDOS the following Antenna model Omni Antenna
process is taken place. In order to find the solution Dimension 750 X 550
for the black hole and gray hole attack in mobile ad
hoc network a new solution is presented . Therefore Radio-propagation Two Ray Ground
in this network the sender node first generate the
dummy packets. These packets send from original Channel Type Wireless Channel
source to destination by using watchdog method.
Then after for every node in network number of send, No of Mobile Nodes 50
received and forward packets are calculated. For this CBR Packet Size 512 byte
according to the packet delivery ratio the weights are Routing protocol AODV
assigned to every node in network. In next step Time of simulation 10.0 Sec.
required to find out the variance of all the nodes PDR NS Version Ns-allinone-2.35
(packet delivery ratio). Using the estimated variance
Traffic Pattern CBR Sessions
of the PDR a trust value is computed. Than assign
weights to nodes for the following conditions present
in algorithm.

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 959


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

5. Results Analysis End to end delay on network refers to the time taken
for a packet to be transmitted across a network from
Different performance parameters of the proposed source to destination device. In order to simulate the
network security technique are reported in this performance X axis contains the malicious nodes and
section. the Y axis contains the end to end delay in terms of
milliseconds. According to the obtained performance
5.1 End to End Delay of the networks the proposed algorithm consumes
less time for propagation of data as compared to the
traditional routing protocol under attack conditions.

Figure 1: End to End Delay for Black Hole Attack

Figure 2: End to End Delay for Gray Hole Attack

Figure 3: End to End Delay for DOS Attack

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 960


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

5.2 Throughput
comparative throughput of the two different
It is defined as packets delivered over the total configurations under attack condition is simulated in
simulation time. It is the usual rate of successful these diagram the X axis contains the malicious
delivery of a message over a communication nodes and Y axis contains the throughput of the
medium. The throughput is measured in the form of network according to the obtained results the
bits or bps, and occasionally is measured in the form throughput of the proposed algorithm is much
of data packets per time slot or data packets per efficient than the traditional routing technique.
second. The

Figure 4: Throughput for Black Hole Attack

Figure 5: Throughput for Gray Hole Attack

Figure 6: Throughput for DOS Attack

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 961


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

5.3 Packet Delivery Ratio Given diagram shows the performance of the
Packet delivery ratio (PDR) provides information networks under attack conditions in terms of PDR. In
about the performance of any routing protocols, this diagram the X axis contains malicious nodes and
where PDR is estimated using the formula given [5] the Y axis contains the PDR in terms of percentage.
According to the obtained results the performance of
the proposed algorithm is much better in attack
conditions.

Figure 7: Packet Delivery Ratio Black Hole Attack

Figure 8: Packet Delivery Ratio Gray Hole Attack

Figure 9: Packet Delivery Ratio DOS Attack

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 962


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

5.4 Broadcasting Request in DOS Attack Y axis contains no of request send. According to the
Given diagram shows the performance of the obtained performance of the network the proposed
networks under attack conditions in terms of total algorithm consumes less broadcasting request for
broadcasting request in simulation time. In this packet as compared to the traditional routing protocol
diagram the X axis contains malicious nodes and the under attack conditions.

Figure 10: Number of Request of DOS Attack

5.5 Proposed Integrated Routing Protocol end delay, packet delivery ratio, throughput is
The implementation of the proposed integrated expected and compared with the traditionally
routing protocol is performed in NS 2 environment. available routing protocol. The performance
the generated trace files the performance outcomes summaries of the implemented integrated routing
are evaluated. During results evaluation the end to protocols are given using table 2 & 3.

Table 2: Performance Summary of Integrated Routing Protocol


S. no. Parameters Traditional routing Proposed Integrated routing

1 End to End delay 38 ms 24 ms


2 Throughput 35 kbps 230 kbps
3 Packet Delivery Ratio 28 % 87 %

Table 3: Performance Summary


Proposed
S. no. Parameters Traditional routing Proposed routing
Integrated routing
1 End to End delay High Low Low
2 Throughput Low High High

3 Packet Delivery Ratio Low High High

6. Conclusion configuration of network the network is always


The mobile ad hoc network is kind of wireless suffers from the performance and the security issues.
network and the network devices are connected In this context the proposed work is intended to
through each other through this wireless links. The provide a secure routing protocol and the high
due to wireless connectivity among the network performance network. Therefore the work involves
nodes the network is enabled to be support the the security investigation of the mobile ad hoc
mobility in network. Due to mobility and ad hoc network and their performance enhancement.

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 963


Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)
IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

Thus in order to investigate the security issues there The implementation of the proposed routing protocol
are a number of research articles are explored and the is performed in network simulator 2 environment and
attacks and their effect in network are studied. After using the generated trace files the performance
that a crucial attack namely black hole, gray hole, outcomes are evaluated. During results evaluation the
DOS attack is selected for finding the effective end to end delay, packet delivery ratio, throughput
solution. Thus using the AODV routing protocol and routing overhead is expected and compared with
improvement a new secure routing protocol is the traditionally available routing protocol. The
developed. The proposed secure routing protocol first performance outcomes demonstrate the effectiveness
evaluates the network characteristics and using the of the proposed routing protocol as compared to other
network behavior the threshold (variance) values are methods available. According to the given
estimated then it compare with node’s PDR. These performance summary the proposed routing protocol
threshold values are used for taking decisions in is much adoptable as compared to the traditional
network for discovering the secure path which protect routing protocols.
from Black hole, Gray hole and DOS attack in
network.

7. References

[1] A. Boukerch, L. Xu and K. EL-Khatib, “ Trust-based [6] A. Jain and V. Tokekar. Classification of denial of service
security for wireless ad hoc and sensor networks ” attacks in mobile ad hoc networks. In Proceedings of
Computer Communications, no. 30, pp. 2413–2427, 2007. International Conference on Computational Intelligence
[2] Kannan Govindan, Member IEEE and Prasant and Communication Networks (CICN), pages 256–261,
Mohapatra, “ Trust Computations and Trust Dynamics in 2011.
Mobile Adhoc Networks: A Survey ” IEEE [7] Perkins, C. Belding-Royer, E. Das, “ Adhoc on- Demand
COMMUNICATIONS SURVEYS & TUTORIALS, Distance Vector (AODV) Routing” ,July 2003.
VOL. 14, NO. 2, SECOND QUARTER 2012 279, 1553- [9] L. Tamilselvan, and V. Sankarnarayanam, “ Preventing of
877X/12/$31.00 c_ 2012 IEEE. Blackhole Attack in MANET ”. The Second International
[3] Nikita Verma, Ashish kumar jain, “Trust Management in Conference on Wireless Broadband and Ultra Wideband
mobile ad hoc networks : A Survey ” International Communication 2007,vol, no, pp21,Sydney.
Conference on Electronics, Communication & Aerospace [1 Ashish Kumar Jain, Vrinda Tokekar, “Security
Technology (ICECA 2017) 453-458 IEEE 21-22 April, 0] Enhancement in MANETs using Fuzzy based Trust
2017 Coimbatore. Computation against Black hole Attacks” International
Congress on Information Communication Technology
[4] Ravi Parihar, Ashish Jain, “Support Vector Machine (ICICT), 11-12 December, 2016 Bangkok.
through Detecting Packet Dropping Misbehaving Nodes [1 Shweta Shah, Madhu Sharma, Ashish Jain, “Wormhole
in MANET ” International Conference on Electronics, 1] Attacks in Mobile Ad hoc Networks”, Symposium on
Collasal Data Analysis and Networking, IEEE, 18-19
Communication and Aerospace Technology (ICECA
March, 2016, Pages: 1 - 4, DOI:
2017) 481-486 IEEE 21-22 April, 2017 Coimbatore. 10.1109/CDAN.2016.7570868.
[5] Jain, A.K.; Tokekar, V., “Mitigating the effects of Black
hole attacks on AODV routing protocol in mobile ad hoc
networks”, Pervasive Computing (ICPC), 2015
International Conference Year: 2015 , Pages:1 - 6,
DOI: 10.1109/PERVASIVE.2015.7087174 IEEE
Conference Publications.

978-1-5090-5013-0/17/$31.00 ©2017 IEEE 964

Potrebbero piacerti anche