Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks

نویسندگان

  • Gaurav Garg
  • Sakshi Kaushal
  • Akashdeep Sharma
چکیده

A temporary collection of wireless mobile nodes in decentralized manner is known as Mobile Ad hoc Network (MANET). In a hostile environment of MANET, security is the primary concern to achieve protected communication between mobile nodes. A number of nontrivial challenges to security designs mandate the demand of building multi-fence security solutions that achieve both extended protection and adorable network performance.MANET’s are vulnerable to many security attacks because of shared channel, insecure operating environment, lack of central authority, limited resource availability, dynamically changing network topology and resource constraints. Wormhole attack, black hole attack and grayhole attack are different network layer attacks and wormhole is the dominant attack of all. In this work, wormhole attack is implemented in Qualnet 4.5 with three different modes i.e., all pass, all drop and threshold mode with varying the network size comprising of 15, 20, 25, 30 and 35 nodes. Performance of four reactive protocols i.e., AODV, DSR, DYMO and ANODR is analyzed in the presence of wormhole attack with four parameters, i.e., throughput, average end-to-end delay, average jitter and packet delivery ratio in mobility and non-mobility domain. Simulations revealed that AODV protocol is more vulnerable to wormhole attack in mobility domain which results into low packet delivery ratio (PDR) of AODV protocol in mobility domain. DSR protocol is least vulnerable to wormhole attack in non-mobility domain. DSR protocol experiences high PDR in non-mobility mode due to pre specified route in route cache which does not changes due to non-mobility. DYMO and ANODR protocol experiences constant throughput in non-mobility domain and shows variations in throughput for mobility domain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Secure neighbor discovery and wormhole localization in mobile ad hoc networks

Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. In this article we present Mobil...

متن کامل

An Approach for Detection and Removal of Wormhole Attacks in Mobile Adhoc Network

The infrastructure of a Mobile Adhoc Network (MANET) has no routers for routing and all nodes must share the same routing protocol to assist each other while transmitting messages. Almost all common routing protocols at present consider performance as first priority and have little defense capability against the malicious nodes. Many researchers have proposed protocols of higher safety to defen...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015