Abstract

In this research, we attempted to investigate about the features and behaviors of network layer based active and passive attacks in Ad-hoc On-Demand Vector (AODV) routing protocol in Mobile Ad-hoc Networks (MANET). Through the literature survey, we try to understand the features of each attacks and examine the behaviors of these attacks through simulations via Network Simulator 2 (NS2). Blackhole, Grayhole and Wormhole attacks are used in this simulation study. Each attacks are introduced independently into the network to find the impacts on network performances that are evaluated through Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, Average Data Dropping Rate (ADDR) and Simula-tion Processing Time at Intermediate Nodes (SPTIN). To obtain more accurate results, simulation parameters are maintained same in each simulation. A controller network is simulated to compare with each attack simulation. Simulations are repeated by changing the number of connected intermediate nodes (hops) in the network. We observed at collected data analysis, the lowest SPTIN in the network that contained a Blackhole or Grayhole attack out of these three attacks. The network which is affected by a Blackhole attack shows higher amount of ADDR than controller network. Furthermore data forwarding rate is higher in the network which is affected by a Wormhole attack. Finally, according to the simulation studies, we are able to understand that Blackhole and Grayhole attacks cause more damage to the network performances than Wormhole attacks.

Highlights

  • Open network boundary, infrastructure-less nature and dynamic network topology are some fundamental characters of a Mobile Ad-hoc Networks (MANET)

  • Readings are recorded by changing the number of connected intermediate nodes (10, 15, 20, 25 and 30) at each simulation and different attacks are introduced into the network to check the impacts on the Performance Matrixes (PM): Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED) and Throughput

  • In order to investigate on the impacts of each Hole attacks, network performances evaluate with PDR, EED and Throughput

Read more

Summary

Introduction

Infrastructure-less nature and dynamic network topology are some fundamental characters of a MANET. These characters expose MANET into different types of security attacks on each OSI layers and routing protocols are operated on Network layer of OSI model. Proactive routing protocols need to maintain routing information even if there are no demand for a communication [4]–[6]. These types of protocols are only suitable for stationary and fewer number of nodes [7]. Hybrid routing protocols are combination of proactive and reactive routing protocols. Still it has the limitation of Proactive routing protocols [7], [9]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.