Professional Documents
Culture Documents
Tamils El Van 2007
Tamils El Van 2007
Latha Tamilselvan
BSA Crescent Engineering College,
Vandalur, Chennai, Tamilnadu, India,
Ph.: 91 44 2275 1375, Fax: 91 44 4211 4282,
Email: latatamil@hotmail.com
Abstract
An ad hoc network is a collection of mobile nodes
that dynamically form a temporary network. It operates
without the use of existing infrastructure. One of the
principal routing protocols used in Ad-Hoc networks is
AODV (Ad-Hoc On demand Distance Vector) protocol.
The security of the AODV protocol is compromised by
a particular type of attack called Black Hole attack
[1]. In this attack a malicious node advertises itself as
having the shortest path to the node whose packets it
wants to intercept. To reduce the probability it is
proposed to wait and check the replies from all the
neighboring nodes to find a safe route. Computer
simulation using GLOMOSIM shows that our protocol
provides better performance than the conventional
AODV in the presence of Black holes with minimal
additional delay and Overhead.
Dr. V Sankaranarayanan
BSA Crescent Engineering College,
Vandalur, Chennai, Tamilnadu, India,
Ph.: 91 44 2275 1375,
Email: sankarammu@yahoo.com
does the function of routing and relaying messages for
other mobile nodes [1].
Most important networking operations include
routing and network management [2]. Routing
protocols can be divided into proactive, reactive and
hybrid protocols, depending on the routing topology.
Proactive protocols are typically table-driven.
Examples of this type include DSDV, WRP. Reactive
or source-initiated on-demand protocols, in contrary,
do not periodically update the routing information. It is
propagated to the nodes only when necessary. Example
of this type includes DSR, AODV and ABR. Hybrid
protocols make use of both reactive and proactive
approaches. Example of this type includes TORA,
ZRP. Security is a major concern in all forms of
communication networks, but ad hoc networks face the
greatest challenge due to their inherent nature. As a
result, there exist a slew of attacks that can be
performed on an Ad hoc network. [1][4].
Keywords
1.
Introduction
RREQ
Data
RREP
M - Malicious
F
Data
RREP
Figure 1. Propagation of RREQ & RREP from
A to E
M
RREQ
RREP
4
Data
M - Malicious
}
}
Check (repeated NH)
{
select repeated NH(RREP) CRRT
Route_Data (secure route)
}
else
select random (RREP) CRRT
Route_Data
Figure 4. Algorithm to Prevent Black hole Attack
4. Simulation Results
Value
Nodes
25
Simulation Time
5M
Mobility
Load
Coverage Area
800 m by 800 m
4.1. Metrics
120
105
90
75
60
0
10
20
30
40
50
60
70
80
SAODV
120
Average End-to-End
Delay (Sec.)
End-to-End Delay
100
80
60
40
20
0.6
0.54
0.48
0.42
0.36
0.3
0.24
0.18
0.12
0.06
0
0
10
20
40
50
60
70
80
10
20
30
40
50
60
70
80
AODV
120
SAODV
AODV
100
80
0.1
Average End-to-End
Delay (Sec.)
SAODV
30
0.08
0.06
0.04
0.02
0
60
10
20
30
40
50
60
70
80
40
SAODV
20
0
0
10
20
30
40
50
60
70
80
AODV
End-to-End Delay
Source 1; Destination 5; Malicious 9
0.1
Average End-to-End
Delay (Sec.)
SAODV
0.08
0.06
0.04
0.02
0
0
10
20
30
40
50
60
70
80
AODV
Routing Overhead
Routing Overhead
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
0
Numbe r of Transactions
SAODV
AODV
6. References
[1] Hongmei Deng, Wei Li, and Dharma P. Agarwal,
Routing Security in Wireless Ad Hoc Networks, University
of Cincinnati, IEEE Communications magazine, October
2002..
[2] V. Karpijoki, Security in Ad Hoc Networks, Seminar
on Net Work Security, HUT TML 2000.
[3] C.E. Perkins, S.R. Das, and E. Royer, Ad-Hoc on
Demand Distance Vector (AODV), March 2000,
http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv05.txt