Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks
نویسندگان
چکیده
A temporary collection of wireless mobile nodes in decentralized manner is known as Mobile Ad hoc Network (MANET). In a hostile environment of MANET, security is the primary concern to achieve protected communication between mobile nodes. A number of nontrivial challenges to security designs mandate the demand of building multi-fence security solutions that achieve both extended protection and adorable network performance.MANET’s are vulnerable to many security attacks because of shared channel, insecure operating environment, lack of central authority, limited resource availability, dynamically changing network topology and resource constraints. Wormhole attack, black hole attack and grayhole attack are different network layer attacks and wormhole is the dominant attack of all. In this work, wormhole attack is implemented in Qualnet 4.5 with three different modes i.e., all pass, all drop and threshold mode with varying the network size comprising of 15, 20, 25, 30 and 35 nodes. Performance of four reactive protocols i.e., AODV, DSR, DYMO and ANODR is analyzed in the presence of wormhole attack with four parameters, i.e., throughput, average end-to-end delay, average jitter and packet delivery ratio in mobility and non-mobility domain. Simulations revealed that AODV protocol is more vulnerable to wormhole attack in mobility domain which results into low packet delivery ratio (PDR) of AODV protocol in mobility domain. DSR protocol is least vulnerable to wormhole attack in non-mobility domain. DSR protocol experiences high PDR in non-mobility mode due to pre specified route in route cache which does not changes due to non-mobility. DYMO and ANODR protocol experiences constant throughput in non-mobility domain and shows variations in throughput for mobility domain.
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملSecure neighbor discovery and wormhole localization in mobile ad hoc networks
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. In this article we present Mobil...
متن کاملAn Approach for Detection and Removal of Wormhole Attacks in Mobile Adhoc Network
The infrastructure of a Mobile Adhoc Network (MANET) has no routers for routing and all nodes must share the same routing protocol to assist each other while transmitting messages. Almost all common routing protocols at present consider performance as first priority and have little defense capability against the malicious nodes. Many researchers have proposed protocols of higher safety to defen...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کامل