Professional Documents
Culture Documents
Empirical Studyof NDTAODVSAODVand AODVRouting
Empirical Studyof NDTAODVSAODVand AODVRouting
net/publication/322200650
CITATION READS
1 127
2 authors, including:
Nirbhay Chaubey
Gujarat Technological University
36 PUBLICATIONS 158 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Call for participation "One Week Short Term Training Program (STTP) on Network, Network Simulation, Sensor Network & Information Security" from 26-31 December 2016.
View project
All content following this page was uploaded by Nirbhay Chaubey on 02 January 2018.
Table 2. RREQ_count
Fig. 1. AODV Route Discovery Process [10] RREQ_ID RREQentry TimeStamp
Requester1 Id 5 0.34566
Requester2 Id 1 0.55346
2.2 Fundamental working of Secure AODV
(SAODV) NDTAODV uses FloodTimer and CacheTimer.
FloodTimer which continuously sends the request packet
Earlier in 2002-2004, M. G. Zapata and N. Asokan [11, as the value 0.009 seconds. Every 0.009 second, attacker
12] proposed secure AODV routing protocol called Secure broadcast the request packet in the network and
AODV(SAODV). SAODV include two schemes (i) nodes CacheTimer is used to observe request table entry for the
signing the control messages (using digital signature) and expire time and request count entry. Hello Alarm
(ii) protecting the mutable information such as the hop- Technique (HAT) is applied in this protocols to inform
count using Hash Chain. The node authenticity is nodes in the network about the existence of malicious node
guaranteed through the knowledge of public keys in each [13].
node of the network. The originators of routing messages Proposed algorithm-NDTAODV to flush RREQ_Count
verify each authenticity digital signature content which table entry
ensures that nodes do not impersonate other nodes.
However, hash chains are applied to the hop count
certification where on each note for every hop can verify
that the calculation of the hop was not maliciously reduced.
Due to asymmetric key cryptographic nature of SAODV, it
is unable to verify the digital signature of nodes in
MANET as they have the processing power and limited
battery life, which ultimately leads end to end delay.
RREQ packets to eliminate bandwidth and communication and NDTAODV efficiently detect the malicious nodes and
nodes, where valid communication cannot be continued isolate them from the active route to make the network
between the nodes. Injected packets are fake packets; the available.
attacker node has made this attack more dangerous by In 2013, Madhavi, S. and K Duraiswamy [18] considered
putting its set value in REE packet. Throughout the hello flooding attack; performance of SAODV and
network, Flooding RREQ packets consume a lot of Flooding Attack Aware SAODV (FAA-SAODV) was
resources of the network. AODV protocol adopts evaluated to decrease the control overhead by 2%.
following method to reduce congestions: Limits the In 2012, Humaira Ehsan, Farrukh Aslam Khan, et al., [19]
number of messages originating from a node to studied sinkhole attack, blackhole attack, selfish node
RREQ_RATELIMIT RREQ messages per second [13]. behavior and RREQ flood attacks through the simulation.
Result demonstrate an enormous routing overhead in
RREQ floods and hello floods.
4. Related work
In this section, some of the proposed solutions based on 5. Experimental setup and network scenario
cryptographic and or trust mechanisms to enhance security
and improve performances of AODV routing protocols are This section gives details about the simulation set up and
discussed. network scenario. Network Simulator (NS-2) [20] is used
In 2016, Houda Muwdani, Mohammad Er-Ruedi, et al., in the proposed NDDADOV to test and measure the
[14] proposed a technique for attacking the blackhole and performance metrics. Simulation setup, network scenario,
analyzed its effectiveness using network simulator NS-2. and performance metrics are briefed in the following table.
The results confirm that the flood and infiltration attacks
have less impact as compared to blackhole attack on the Table 3. Outline of simulation setup
performance of the network. Parameter Value
In 2015, Kuldeep Singh et al., [15] implemented Blackhole, Simulator NS-2(ver.2.35)
Grayhole, Flooding and Rushing attacks. Their impact is Simulation Time 100 s
Number of Nodes 70
studied on the protocols using parameters like AT, PDF,
Routing Protocols NDTAODV, SAODV,
NRL, Packet Loss and Mean Hop Count.
AODV
In 2015, Chaubey N., Aggarwal A. et al. [16] proposed Traffic Model CBR
Trust Based Secure On-Demand Routing Protocol Number of Malicious Nodes 2
(TSDRP), studied the simulation based outcome of in the Network
blackhole attack and compared the result with that of Terrain Area 1000m x 1000m
AODV for making it secure. TSDRP performs better than Mobility Model Random Waypoint
that of the AODV with respect to almost all performance Size of the packet 512 bytes
metrics. Packet Rate 4pkt/s
In 2015, Chaubey et al.[17] studied Effect of Pause Time IEEE 802.11 with
MAC Protocol
on AODV and TSDRP Routing Protocols under Blackhole RTS/CTS
Attack and DoS Attacks in MANET. The simulation Propagation Model Used Two-Ray Ground Model
results illustrate that performance of TSDRP is enhanced Antenna Type Omni Antenna
than that of AODV in relation to NRL, AT, AED, PDF. Flood Interval 0.009 sec
Cache Interval 1 sec
In 2014, TSDRP protocol was proposed by Aggarwal A.,
Peak Value 10 (no. of request)
Chaubey N., Gandhi R. et al. [10] and further, evaluated
Entry Expiry Time CURRENT_TIME+1
the result using network simulator by changing the number
of malicious nodes and also source node communicating in Table 4. Outline of network scenarios
the network. TSDRP confirms that the packets are not Sr. Network
assigned to the malicious nodes in the network, and the Description
No. Scenario
packet delivery ratio is very high, the AED is low while Malign
Sources node communicating
AT is maintained. 1. environment
1- 4
In 2014, A. Aggarwal et al. in [13] proposed NDTAODV a (with attack)
simple and effective technique to secure AODV routing
protocol against flood attacks with different pause times by Table 5. Outline of Performance Metrics
varying malicious nodes in small size network with 20 Performance
Sr.
Metrics Description
nodes. Simulations based results show that attacks have a No.
significant effect on the network performance and security
1. PDF Ratio of the number of packets
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017 93
[20] “The Network Simulator-NS-2”, Homepage, [Online] Drona Award 2008” and “Developer Super Star 2011” in the
http://www.isi.edu/nsnam/ns/ns-build.html national level software development program organized by IBM.
[21] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network He has served as a resource person for many workshops in the
Simulator “ns.” http://www.isi.edu/nsnam/ns/tutorial/ area of open source software, process mining, etc. He has
[22] Network Simulator - 2 (NS-2) http://mohit.ueuo.com/NS- received research granted projects and published research papers
2.html and books.
[23] Tcl Developer Xchange, Main Tcl developer site, [Online]
http://www.tcl.tk/
[24] Manish M. Patel, Akshai Aggarwal, Nirbhay Chaubey
“Wormhole Attacks and Countermeasures in Wireless
Sensor Networks: A Survey.” International Journal of
Engineering and Technology (IJET), ISSN 0975- 4024
(Online), Vol.9, No.2, January 2014
[25] Manish M. Patel, Akshai Aggarwal, Nirbhay Chaubey,
“Detection of Wormhole Attack in Static Wireless Sensor
Networks” 2nd International Conference on Computer,
Communication and Computational Sciences (IC4S- 2017),
Phuket, Thailand, 11-12 October 2017, Springer series:
book on Advances in Intelligent Systems and Computing.
[26] Manish M. Patel, Akshai Aggarwal, Nirbhay Chaubey,
“Analysis of Wormhole Attack in Wireless Sensor
Networks,” 5th International Conference on Advanced
Computing, Networking and Informatics[ICACNI- 2017],
NIT, Goa, India, 01-03 June 2017, Springer series: book
Advances in Intelligent Systems and Computing.
[27] Nirbhay Chaubey, Dharati H. Patel, “Routing Protocols in
Wireless Sensor Network: A Critical Survey and
Comparison,” International Journal in IT and
Engineering(IJITE), ISSN: 2321-1776[Online], Vol.04
Issue-02, February 2016, Page: 8-18
[28] Nirbhay K. Chaubey, "Security Analysis of Vehicular Ad-
hoc Networks (VANETs): A Comprehensive Study,"
International Journal of Security and Its Applications
(IJSIA) 2016, 10 (5) (2016), pp. 261-274