Performance Analysis of Prevention of AODV-based Mobile AdHoc Networks under Cooperative Wormhole Attacks

Author(s):  
A. S. Bhandare ◽  
B. S. Patil ◽  
M. A. Khade ◽  
S. D. Patil

A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure called as Mobile Ad-hoc Network (MANET). As MANET does not have fixed infrastructure and central administration, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of nodes. Wormhole attack is one of the severe attacks which absorb all data packet instead of sending it to destination. An Enhanced HSAM technique is used in order to compare the different performance parameters with HSAM and the results are monitored with the use of network simulator.

Author(s):  
Ganesh Kumar ◽  
A. Arivazhagan

<p>The aim of this paper is to model the Portable Manager and allow it to aid in communication among Mobile Ad-hoc Networks (MANETs) carrying information across the mobile nodes in the network. In this article, Modeling Portable Manager aiding in the MANET Communication (MMAC) is proposed. The novelty is present in the use of node performance parameter called as α defined as the ratio of the packet received, packet loss and delay of the node which could be used for the next hop selection in the mobile ad hoc network. The Portable Manager (PM) is used to find out the relay node in the network. The working of the PM with a minimal number of nodes is analyzed and presented through the simulations in the network simulator.</p>


Author(s):  
Ujwala D. Khartad ◽  
R. . K. Krishna

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. A Mobile Ad-hoc Network (MANET) is based on self organizing, dynamic structure and freedom of mobility idea. The characteristics like dynamic structure, limited power, restricted bandwidth and continuously changing network routes makes MANET more vulnerable to the attacks and providing the security to it proves to be a challenging area. In this paper, we describe that how the flooding attack occur and the effect of flooding attack. Finally, we present simulation results to show the detrimental effects of Flooding Attack.


Author(s):  
U Kumaran ◽  
A Ramachandran ◽  
J Jegan ◽  
E.K. Subramanian

<p>A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network).  Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms to understand the strengths &amp; threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks. The methodology of honeypot detects and isolates the attacks of the black hole. The results prove better delivery of packets with decreased load of the network.</p>


Author(s):  
Mai Abu Baqar ◽  
Hamza Aldabbas ◽  
Tariq Alwadan ◽  
Mai Alfawair ◽  
Helge Janicke

Mobile Ad Hoc Network (MANET) and Vehicular Ad Hoc Network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured, and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be set-up and deployed anywhere and anytime because it has a simple infrastructure set-up and no central administration. Distributing information between these nodes over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it, especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging. They are explored in this chapter.


Author(s):  
Yunhai Guo ◽  
Zhengxiang Li ◽  
Rui Lv ◽  
Zhanxin Yang

The Linear Wireless Ad-Hoc Network (Linear WANET), as a branch of the Ad-Hoc network, refers to a self-organizing multi-hop wireless network in which nodes are arranged linearly. Frame aggregation and RTS/CTS schemes are introduced in IEEE 802.11 aims to improve network transmission performance. However, the traditional mechanisms may not have good adaptability in linear multi-hop networks. Thus, we defined a Linear WANET simulation model based on the IEEE 802.11 protocol. We established this model on the NS-3 network simulator to perform A-MSDU, A-MPDU, and two-level frame aggregation simulation and analyzed the aggregation performance under different channel environments. Meanwhile, the RTS/CTS and TXOP mechanisms were also simulated in this paper. We analyzed the performance of each mechanism in a Linear WANET under saturated and unsaturated environments. We found that in a Linear WANET, the A-MSDU mechanism can improve system performance to a limited extent, but at the same time, it will increase the packet loss rate and delay. Although the A-MPDU mechanism can reduce the retransmission overhead, the higher A-MPDU Limit cannot further improve the throughput of the Linear WANET. Meanwhile, in the case of single A-MPDU aggregation, there has a lowest data delivery interval that the Linear WANET system can withstand. Besides, we also found that the native TXOP mechanism cannot effectively improve the system efficiency of Linear WANET. And the RTS/CTS mechanism can improve the performance of Linear WANETs, especially in a saturated throughput environment.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 170
Author(s):  
Meenu . ◽  
Dr Vivek Jaglan ◽  
Akshat Agrawal

The Mobile Ad-Hoc network is a self-governing wireless network having dynamic topology and scattered mobile nodes. Limited power supply is the major challenge in wireless Ad-Hoc networks. Thus, for overall functioning of the ad-hoc network, efficient power conser-vation mechanism becomes the critical and most important component in ad-hoc network. Various power aware routing mechanism have been evolved to preserve energy, prolonging the life span of its nodes and thus of the network itself. Various other metrics for preserving energy also considered viz. selecting shortest path from source to destination, remaining battery power , fair distribution of traffic load among the nodes and minimizing the total transmission power with a view to increase the network life span and link stability. In this paper, various proposed protocols and recent energy conservation mechanisms are studied for mobile ad-hoc network. After analyzing the existing works it has been observed that there are still several areas where we can give more focus in the future.


Author(s):  
SHRADDHA RAUT ◽  
SD CHEDE

This paper gives information about the detection technique of black hole in the MANET. An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the central administration. Hence it becomes more susptable to the attacker .Mostly used on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand DistanceVector) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole” attack. In this attack, a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route.


Author(s):  
Mohammed Ahmed Jubair ◽  
Mustafa Hamid Hassan ◽  
Salama A. Mostafa ◽  
Hairulnizam Mahdin ◽  
Aida Mustapha ◽  
...  

<p>A Mobile Ad-hoc Network (MANET) refers to a dynamic and wireless network, which can be designed without an existing infrastructure as every node serves as a router. A MANET is a self-configuring system of mobile nodes that are connected wirelessly. Every node serves as a sink, as well as a router to send packets. The movement of the nodes is not restricted as they can move in any direction, and they have the ability to get organized into a network. Due to their free and independent movement, they do not have a fixed position; they often change positions. In this study, the Dynamic Source Routing (DSR) and Ad-hoc On Multipath Demand Distance Vector (AOMDV) protocols are compared using Network Simulator NS2.35. DSR is a reactive gateway discovery algorithm whereby the connection of a MANET mobile device is established only on demand. Basically, AOMDV was specially tailored for ad-hoc networks that are highly dynamic to respond to link failures and breakages in the network. It ensures that the paths for destinations are sustained, and it defines the new routing information using destination serial numbers to ensure loop freedom always while avoiding problems. More so, it is a protocol that is based on a timer that can discover ways through which the mobile nodes respond to link breakages and change in topology. A comparison of protocols has been carried out individually and jointly with the aim of evaluating their performance. The performance is measured in terms of End-to-End Delay, Packet Delivery Ratio, Packet Loss Ratio, and Routing Overhead Ratio. The performance of the routing protocols was done using two scenarios; when there is a change in the simulation time and when there is a change in the number of nodes.</p>


Author(s):  
N A Azeez

There has been a great increase in the use of wireless networks over the years; Mobile Ad hoc Network is an example of such wireless network. It functions without any central administration and the network is made up of a collection of nodes within a radio frequency. Security in mobile network has been an area of great research over the years mainly because most ad hoc protocols do not provide the basic security framework and services. This paper aims at simulating access control in wireless ad-hoc networks. The objectives are to ensure that the network is not vulnerable and should also devoid of any form of malicious attack that could prevent authorized access. Two metrics (packet delivery ratio and traffic overhead) were used to measure the effectiveness and efficiency of the networks. Through a detailed simulation study, we show that the protocol is efficient and allows a trade-off between security and performance. This research focuses on designing an access control mechanism that was incorporated within ad-hoc routing protocols with the aim of adding an extra layer of security against threats in the network. The three stage-process for access control was implemented with NS-2 v 35. The nodes in the simulation were created dynamically, the movement between nodes was generated randomly and the connections between the nodes were done using Constant Bit Rate (CBR) connection which was aimed at enabling the network to mimic a real life scenario. Through different experiments and simulations done, it was observed that the access control model works and also provides a higher level of security for ad-hoc networks even when under security threats and attacks.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


Sign in / Sign up

Export Citation Format

Share Document