CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

Size: px
Start display at page:

Download "CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL"

Transcription

1 63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery of GMR, a location based routing protocol. In the route discovery of GMR, a set of malicious nodes are injected, and the PDR, throughput and energy consumption performance metrics are studied. The data structures and algorithms used in the implementation are discussed in this chapter. 4.2 WORKING OF THE GMR Juan Sanchez et al (2007) proposed an energy efficient routing protocol for WSN called GMR, which is one of the location based routing protocols. The GMR calculates the position of the sensor nodes from the GPS or from the virtual coordinates. Each sensor node communicates its position to its neighbors, using periodic beacons. The GMR routes the message, using a common path to the destination nodes. Then the message is split, using the Gabriel graph at the end of the path, as given in Figure 4.1(a). The GMR multicast algorithm is based on the Cost Over Progress (COP) ratio. In the case of the unicast, COP is the relationship between the cost incurred in the next hop, and the progress achieved by the next hop node. The multicast extension minimizes the number of selected next hop nodes, over the progress

2 64 achieved by the selected set. Progress is measured as the difference between the sum of all the individual distances between the current forwarding node and the destinations, and the sum of the distances of each next hop node and the destinations covered by the node. A node is said to cover a destination, if the destination is closest to that node when compared to all the other next hop nodes. The GMR describes an efficient neighbor set selection strategy. Since the GMR is greedy as well, only the node set providing positive progress is considered. Consequently, a message can get caught in a network, and greedy recovery may become an issue. A plain face recovery strategy applies the traditional unicast face traversal for each destination node individually. In order to save the communication bandwidth, messages traveling in the same direction are aggregated into one single message. The GMR forms a multicast tree to send a data packet from a source to multiple destinations, using a single broadcast transmission. Each forwarding node selects a subset of its neighbors in the direction of the destination as relay nodes based on the COP ratio. The cost is equal to the number of selected neighbors. Progress is the reduction of the remaining distance to the destination. The hop count is assumed to be proportional to the distance. The COP metric is explained with respect to Figure 4.1(b). The remote source node S broadcasts the message M to a set of destinations {D1, D2, D3, D4, and D5}. The forwarding node C receives the message M from the source S and selects its neighbors A 1 and A 2 as the relay nodes, using the Greedy Set Partition Selection (GSPS) algorithm. The multicasting task could be given to one neighbor, or it could be handled by several neighbors. Each neighbor could address a set of destinations.

3 65 Figure 4.1 (a) Gabriel graph D 1 A 1 D 2 C D 3 A 2 D 4 D 5 Figure 4.1(b) GMR neighbor selection From node C the total distance for multicasting is T 1 using Equation (4.1). Then the forwarding node (node C) applies the GSPS algorithm, and selects A 1, as the relay node responsible for destinations D 1, D 2 and D 3. The node A 2 is chosen as the relay node for the destinations D 4 and D 5. For the next level of the multicast tree, a new total distance T 2 is

4 66 calculated according to Equation (4.2). The progress is the difference of T 1 and T 2. The COP ratio for the new relay nodes {A 1, A 2 } is given by Equation (4.3). The node C informs its neighbors A 1 and A 2, that they are selected as the relay nodes, using the header in Figure 4.2. The GMR prefixes this header to the data message. The value 2 in the numerator in Equation (4.3) denotes the number of relay nodes. T 1 = CD 1 + CD 2 + CD 3 + CD 4 + CD 5 (4.1) T 2 = A 1 D 1 + A 1 D 2 + A 1 D 3 + A 2 D 4 + A 2 D 5 (4.2) COP = 2 / (T 1 T 2 ) (4.3) C ID A 1(ID),{D 1(ID), D 2(ID),D 3(ID) } A 2(ID),{D 4(ID), D 5(ID) } Figure 4.2 Header format of the GMR message In Figure 4.2, the first field represents the forwarding node, namely, node C, which applies the GSPS algorithm. The other fields represent the relay nodes. A 1 in Figure 4.2 is the first relay node. The destinations it has to handle, namely {D 1, D 2, D 3 }, are the set in the second field. The third field is the second relay node A 2, and the set of destinations {D 4, D 5 } it handles. Thus, the sender forwards the message to the relay node. It reaches the destination by the selective forwarding algorithm. Hence, the energy and bandwidth consumption are minimized. The next section explains how the rushing attack is introduced in GMR. 4.3 RUSHING ATTACK IN GMR The rushing attack (Hoang et al 2008) is a kind of denial of service attack. When the source node floods the network with route discovery packets to find routes to the destinations, each intermediate node processes only the

5 67 first non-duplicate packet, and discards the other duplicate packets that arrive at a later time. A rushing attacker exploits this duplicate suppression mechanism by quickly forwarding the route discovery packets, in order to gain access to the forwarding nodes. RUSHING ATTACK: Takes a set of [1..M] malicious nodes as the input, and successfully injects it. 1. [Initialize] for all nodes do set bestcop = 1 // Initialize the best COP ratio end for; 2. //M={M 1,M 2,M 3, M n } //M i = Malicious Node i for i=1 to n do set Queuing delay as d 2 for M i // Malicious nodes end for; 3. for i =1 to n do set Queuing delay as d 1 ms for N i // Normal nodes end for; 4. // node C receives a multicast message from source node S if (GMRneighbourID == ID of node C) then G = get the neighbor list (C); call GSPS(G); else drop PKT; end if; 5. end. Figure 4.3 Algorithm for introducing the rushing attack in GMR

6 68 The impact of the rushing attack on GMR has been studied, and the results are presented. GMR is implemented with a source node (C), initiating a data message to 20 destinations. The malicious nodes are uniformly distributed throughout the network, and the COP ratio is calculated. Figure 4.3 is the pseudo code of the rushing attack introduced in GMR. In this simulation, the data packets queuing delay is set as d 1 ms for all the normal nodes in Step 3 of Figure 4.3. For the rushing nodes (M) the queuing delay is set to d 2 ms and the value of d 1 is greater than the value of d 2. Therefore, node M i is chosen as the relay node by the GSPS algorithm of GMR, since it has the best COP ratio. In the pseudo code, the neighbor node with the best COP ratio is taken as the relay node for the routing. For instance, node C in Figure 4.1(b) receives a multicast message from its neighbor node S. Node C reads the header and gets the forwarding node s ID. If node C finds its ID, then it starts calculating the COP ratio, by calling the GSPS algorithm; otherwise, the packets are dropped. The next section explains the algorithm used for introducing the blackhole attack in GMR. 4.4 BLACKHOLE ATTACK IN GMR When all the messages are redirected to a specific node, it is defined as the blackhole attack (Mukesh Tiwari et al 2009). The node could be a malicious node. The traffic migrates into that malicious node. The node would not exist after a blackhole attack. A blackhole attack has two stages. In the first stage, the blackhole exploits the routing protocol to advertise itself as having a valid route to the destination, even though the route is spurious. In the second stage, the node consumes the intercepted packets and suddenly disappears.

7 69 The blackhole attack is introduced in the GMR protocol, using the pseudo code given in Figure 4.4. A set of malicious nodes (M) with d 2 ms queuing delay is launched. The normal nodes are set with a queuing delay of d 1 ms. The blackhole node advertises its ID and location information to its one hop neighbor by a beacon message. Then, the GMR partition algorithm is executed. Since the blackhole nodes have less queuing delay and hence the best COP, they are selected as the relay nodes. In the implementation, initially 6 nodes were selected as the forwarding nodes in the first iteration. So, the loop was repeated until all the 10 malicious nodes were selected as the forwarding nodes in the multicast tree. After 100 ms of simulation time, the malicious nodes dropped the packets. When 200 ms was reached the energy was set to zero. So, the blackhole nodes disappeared from the multicast tree. BLACKHOLE ATTACK: Takes a set of [1..M] malicious nodes as the input, and successfully launches it. 1. repeat RUSHING (M); until all malicious nodes are selected as forwarding nodes. 2. if (SimulationTime >= 100ms) && (SimulationTime < 200 ms) then else M drops the PKT. if (SimulationTime >= 200ms) then end if; 3. Stop. end if; for i = 1 to n do set energy of M i as 0; end for; Figure 4.4 Pseudo code to introduce the blackhole attack in GMR

8 70 The next section explains the algorithm used for introducing the sybil attack in GMR. 4.5 SYBIL ATTACK IN GMR When the malicious node illegitimately takes on multiple identities, it is a sybil attack (Hai Feng Yu et al 2008). A single node duplicates its ID and presents itself in multiple locations. The node, which presents multiple identities to other nodes in the network, could be the malicious node. A sybil attack has two stages. In the first stage, the node exploits the routing protocol to advertise itself as having a valid route to the destination, even though the route is spurious. In the second stage, the node consumes the intercepted packets for a replay, wormhole or sinkhole attack. The sybil attack is introduced in the GMR protocol. During normal operation, the node advertises its ID and location information to its one hop neighbor by a beacon message. Since there is no authentication in the GMR, the duplicate nodes also participate in multicasting. The COP ratio is calculated. The malicious node M exhibits high energy and minimal distance, as compared to the normal node. It starts the attack from the root of the multicast tree. The GSPS algorithm of the GMR selects node M as a relay node, since it has the best COP ratio. Figure 4.5 is the pseudo code for implementing the sybil attack in the GMR protocol. In the pseudo code given in Figure 4.5, the neighbor node with the best COP ratio is taken as the forwarding node for routing. For instance, node C receives a multicast message from source node S shown in Figure 4.1(b). In Step 2, the node C reads the data header and gets the forwarding node s ID. If it finds its ID, then it starts calculating the COP ratio, using the GSPS algorithm. Node C gets the neighbor s ID list N. Initially, the best distance between node C and all its neighbors is set high (i.e. equal to the radius of the communication range of node C).

9 71 The set of malicious nodes (M) and the normal nodes (N) are combined together and a new set MN is generated as in Step 1. The set of all subsets of N forms a set A. In the subset, each node N i which has the same distance from C is retained in the same subset A i. D is a set of all destinations of the multicast message. Set G is equal to the set of all destinations with the same distance from node C. The GSPS algorithm is executed. For each element of A i, the COP ratio for all the subsets of G is calculated. G i and G j are the subsets of G. Set G i is merged with G j if for any subset of A i, the subsets G i and G j provide a higher improvement in the overall COP ratio. This procedure is repeated for all the subsets of A and G. The resultant set A forms the relay node for the set of destinations D, as shown in Figure 4.6. SYBIL ATTACK: Takes a set of M malicious nodes as the input and successfully launches it. // if the second node creates multiple identities, the nodes would be called as A 20 to A 2t depending on the number of duplicates t. 1. // N = set of normal nodes. // M = set of 10 malicious nodes. N = { A 1, A 2,A 3,A 4..A n } M = {A 20, A 21, A 22, A 23, A 24, A 25, A 26, A 27, A 28, A 29 } MN = N union M A = {set of all subsets of N} G = {set of all destinations with the same distance} 2. [ If GMR neighbor ID list has the ID of the CurrentNode, then, find the best forwarding node from the neighbor list of the CurrentNode] if (GMRNeighborID == CurrentNodeID) then G=get NeighborList(CurrentNode) call GSPS(G); end if; 3. End. Figure 4.5 Pseudo code for the sybil attack in GMR

10 72 Algorithm : GSPS(G) The Greedy Set Partitioning Selection algorithm takes a group of nodes and selects one or more neighbors as relay nodes for a set of destination nodes. [Calculation of COP] 1. G={set of all destinations, each destination set has the same advance} for i=1 to M do TotalProgress + = Progress[i]; end for; COP = M/TotalProgress; 2. [Selection of relay nodes] repeat Best_COP =0; for all pairs of {G i,g j } element of G do G ij = {G i } union {G j }; T = count(g); for i = 1 to t do TotalProgress += Progress[i] end for; Figure 4.6 Greedy set partition selection algorithm

11 73 COP = T / TotalProgress; Min_COP=COP(G K ); if (Min_COP > Best_COP) then Best_COP = Min_COP; Best_Dest={M i,m j }; end if; end for; if (Best_COP>0) then G={G 1,G 2,G 3 G k, G m }; end if; until Best_COP = 0; 3. end; Figure 4.6 (Continued)

12 74 The next section explains the method used for establishing the wormhole attack in GMR. 4.6 WORMHOLE ATTACK IN GMR A wormhole attack (Yih Chun Hu et al 2008) is one of the most sophisticated and severe attacks on the WSN. In this attack, a pair of colluding attackers records packets at one location, and replays them at another location using a private high speed network. An attack launcher situated close to a base station may be able to completely disrupt the routing, by creating a well-placed wormhole. An adversary could convince the nodes that would normally be at multiple hops from a base station, that they are only one or two hops away via the wormhole. In this work, a set of normal sensor nodes are uniformly distributed. Based on the communication range of the normal sensor nodes, all the sensor nodes that are within the immediate communication range are identified, and the neighbor list of each node is constructed. At 10 ms, the 20 malicious nodes with 5 times more than the communication range of the normal nodes, were introduced in the network, and these malicious nodes are distributed using normal distribution and the neighbor list is created. The node with NodeID 5, is the wormhole start point. The number of hops between the start point and end point of the wormhole is set; in this implementation, the value is set as 10. The malicious node situated at a 10 hop distance in the routing path is selected as the end point node of the wormhole. The number of hops between the start point and the end point of the wormhole is varied as 10, 15, 20, and 25 respectively. Whenever the start point node receives a message, it transmits it only to the end point node of the wormhole. The end point starts dropping the packet. The next section explains the simulation environment.

13 SIMULATION ENVIRONMENT The routing attacks have been introduced in GMR using NS-2. The size of the data payload is 512 bytes. This simulation considers 200 sensor nodes. The node with NodeID One is the base station, nodes 2 to 26 are the malicious nodes, and nodes are the normal sensor nodes. Table 4.1 represents the parameters used in the simulation. Table 4.1 Simulation parameters for introducing routing attacks in GMR Examined Protocol GMR Transmission range 250 m Simulator NS-2 Movement model Static Simulation time 250 Seconds Initial energy 5J Simulation area 150 m x 150 m RxPower 1.75 mw Number of sensor nodes 200 TxPower 1.75 mw Number of base station 1 SensePower 1.75 mw Number of malicious nodes 25 IdlePower 0.5 W 4.8 PERFORMANCE ANALYSIS Table 4.2 is the performance of GMR under no attack, and the blackhole, rushing, sybil and wormhole attacks, for 10 malicious nodes with 20 destinations. In Table 4.3, the number of malicious nodes was varied from 5 to 25, and the Packet Delivery Ratio (PDR), Network Throughput (NTh) and Energy Consumption (EC) metrics in the presence of the blackhole, rushing, sybil and wormhole attacks were studied Packet Delivery Ratio The PDR is calculated using Equation (3.1). Table 4.2, represents the packet delivery ratio measured for the GMR protocol in the presence of

14 76 ten malicious nodes. The packet delivery ratio decreases in the presence of the malicious nodes in the network. From Table 4.2, it is seen that the mean packet delivery ratio is 78 % when there is no attack. After the blackhole attack is launched, the mean packet delivery ratio decreases to 63 % because the blackhole node drops packets. In the case of the rushing attack, the mean packet delivery ratio decreases to 68% because of fast message forwarding. Due to the sybil attack, the packet delivery ratio is 72 %, because some of the packets are consumed by the duplicate nodes. In case of the wormhole attack the packet delivery ratio decreases to 66 % because of tunneling. Therefore, the packet delivery ratio is minimised in the presence of attacks Network Throughput The Network Throughput (NTh) is calculated using Equation (4.4). The network throughput is 274 Mbps when there is no attack, as seen in Table 4.2. The malicious agent is launched in the case of the blackhole attack. It starts flooding the data packets to all its neighbors. As a result, the mean throughput is reduced to 267 Mbps. In the presence of the rushing attack, the malicious node, starts dropping packets, and hence, the mean throughput is 268 Mbps. Network Throughput (NTh) = No of packets transmitted / Unit time (4.4)

15 NA- No Attack BA-Blackhole Attack RA-Rushing Attack SA-Sybil Attack WA-wormhole Attack 77

16 78 For the wormhole attack, the mean throughput is 265 Mbps, whereas the sybil attack has the mean throughput of 267 Mbps. At 120 ms the sybil attack has the throughput of 265 Mbps, and 256 Mbps at 150 ms. After that, the throughput regularly decreases and ends with 241 Mbps. In the presence of the wormhole attack, the network throughput is 268 Mbps at 120 ms, and it drops further to 256 Mbps at 150 ms. The attacker starts tunneling the packet from 150 ms. So, the network throughput is highly reduced to 225 Mbps at 210 ms, and ends with 214 Mbps at 240 ms. The network throughput is minimised in the presence of attacks Energy Consumption From Table 4.2 it is seen that the total energy consumption is 200 joules in the case of no attack at 150 ms. At 150 ms after introducing the rushing and blackhole attacks the total energy consumption rises to 270 joules and 300 joules respectively. At the end of the simulation at 240 ms the blackhole attack consumes a total energy of 450 joules and the rushing attack consumes a total energy of 350 joules. Because of the sudden disappearance of the blackhole nodes, the total energy consumption increased to 450 joules. The wormhole attack consumes a total energy of 420 joules at 240 ms. Because of the energy consumption, the battery power of the sensor nodes is drained by the malicious nodes in the presence of the wormhole attack. In the case of the sybil attack, the duplicate nodes start troubling the routing. So, it consumes 75 joules to 350 joules at the end of the simulation. Therefore, the energy consumption is maximized in the presence of attacks.

17 79 Table 4.3 shows the performance of the GMR, when the number of malicious nodes was varied from 5 to 25. From Table 4.3 it is seen that when the number of malicious nodes is 5, in the presence of the sybil and wormhole attacks, the packet delivery ratio is 75 % and 69 %, and for the blackhole and rushing attacks the packet delivery ratio is 66 % and 70 % respectively. When the malicious nodes increase from 5 to 25, the packet delivery ratio of the wormhole drops to 42 %. The sybil attack reduces the packet delivery ratio from 75 % to 46 %, and the blackhole reduces the packet delivery ratio from 66 % to 45 %. The network throughput of the blackhole and wormhole attacks is 269 Mbps and 268 Mbps respectively for 5 malicious nodes. The mean network throughput of the sybil and rushing attacks is 270 Mbps in the presence of 5 malicious nodes. When 25 malicious nodes are introduced in the network, the throughput drops to 196 Mbps for the blackhole attack, 199 Mbps for the wormhole attack, 201 Mbps for the sybil and 218 Mbps for the rushing attack. The mean network throughput of the sybil attack is 238 Mbps, and for the rushing attack the throughput is 251 Mbps. Therefore, the attacks cause more damage in the route discovery of the GMR by minimizing the throughput.

18 NA- No Attack BA- Blackhole Attack RA- Rushing Attack SA-Sybil Attack WA- Wormhole Attack 80

19 MN Malicious Node PDR Packet Delivery Ratio NTh Network Throughput EC Energy Consumption

20 82 The energy consumption by 5 malicious nodes in the presence of the blackhole, rushing, sybil and wormhole attacks are 250 joules, 210 joules, 200 joules and 210 joules respectively. When the malicious nodes are increased from 5-25 nodes, the energy consumed by the blackhole attack is 306 joules, rushing attack 288 joules, 305 joules by the sybil attack and 302 joules by the wormhole attack. From the mean value it is observed, that the blackhole drains the battery power more than the other attacks. The value of queuing delay d 1 was varied from 10 to 100 ms and d 2 from 0 to 75 ms, for varying number of malicious nodes. The mean values for the rushing attack are tabulated in Table 4.4. In Table 4.4, the queuing delay of the normal nodes (d 1 ) is varied as 10, 25 and 100 ms. The queuing delay of the malicious nodes (d 2 ) are 0 and 75 ms. The number of malicious nodes was also varied from 5 to 25. From Table 4.4 it is seen that, as the queuing delay of the malicious nodes varies, the packet delivery ratio and network throughput drops gradually. The energy consumption decreased by small units. Varying the queuing delay degrades the packet delivery ratio and network throughput of the GMR, in the presence of the rushing attack. 4.9 CONCLUSION Blackhole, rushing, sybil and wormhole active attacks have been introduced in GMR. The number of malicious nodes was varied from 5 to 25 in a network of 200 sensor nodes. Performance metrics, such as the packet delivery ratio, network throughput and energy consumption have been studied. The active attacks affect the functioning of the GMR, by minimising the packet delivery ratio and throughput. Also, the attacks maximize the energy consumption, and affect the functioning of the GMR. Therefore, routing need to be secure to prevent the impact of active attacks on the GMR. So, the next chapter uses the TESLA based certificate for secure routing in the GMR, to resist the active routing attacks.

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16 Presented by: Mariam Ahmed Moustafa elansary.mam@gmail.com Faculty of Engineering, Alexandria University, Egypt 24 March 2016 RIPE NCC / MENOG 16 } Is a talented Researcher, Teaching Assistant, Co-Founder

More information

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks Defending Against Resource Depletion Attacks in Wireless Sensor Networks Cauvery Raju M. Tech, CSE IInd Year, JNNCE, Shimoga Abstract: One of the major challenges wireless sensor networks face today is

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

Secure Multi-Hop Infrastructure Access

Secure Multi-Hop Infrastructure Access Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) 600.647 Advanced Topics in Wireless Networks Wireless Infrastructure

More information

Performance measurement of MANET routing protocols under Blackhole security attack

Performance measurement of MANET routing protocols under Blackhole security attack IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. IV (Mar Apr. 2015), PP 89-93 www.iosrjournals.org Performance measurement of MANET routing

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 9 CMPE 257 Winter'10 1 Announcements Student presentations: March 8th: Daniel and Teddy March

More information

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

Review:- EN-efficient Approaches for MANETs in Rushing Attacks Review:- EN-efficient Approaches for MANETs in Rushing Attacks Rashmi Vishwakarma Sumit Dhariwal Mohmmed.Imran Deptt.Of CSE Deptt.Of CSE HOD,Deptt.Of CSE JNCT Rewa M.P, India SIRTE Bhopal M.P, India JNCT

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

A Technique for Improving Security in Mobile Ad-hoc Networks

A Technique for Improving Security in Mobile Ad-hoc Networks A Technique for Improving Security in Mobile Ad-hoc Networks By Ahmed Mahmoud Abdel Mo men A Master Thesis Submitted to the Faculty of Computers and Information Cairo University Information Technology

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs IEEE 2012 Transactions on Dependable and Secure Computing, Volume: 9, Issue: 2 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Abstract The multi-hop routing in wireless sensor

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Winter'11 1 Announcements: Student presentations: Security: Jim. Seth: security in

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

IPv6 migration challenges and Security

IPv6 migration challenges and Security IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks Vidya.M Department of Computer Science and Engineering, Atria Institute of Technology, Bangalore, India Vidya.M1389@gmail.com

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,

More information

[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETECTION OF BLACK HOLE ATTACK USING CONTACT-BASED WATCHDOG Prashantkumar Wagh*, Amutha Jayakumar Department of Electrical Engineering,Veermata

More information

MANET ROUTING ATTACKS

MANET ROUTING ATTACKS MANET ROUTING ATTACKS Black Hole Attack Detection And Prevention Strategy In DYMO For MANET DYMO is advance version of AODV routing protocol develop to improve the network performance. Here, a mitigation

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:

More information

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network Vol.2, Issue.1, Jan-Feb 2012 pp-534-539 ISSN: 2249-6645 Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network G. Mona Jacqueline 1 and Mrs. Priya Ponnusamy 2 1 (II M.E., Computer Science

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Configuring IPv6 First-Hop Security

Configuring IPv6 First-Hop Security This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,

More information

Defense Against Packet Injection in Ad Hoc Networks

Defense Against Packet Injection in Ad Hoc Networks Defense Against Packet Injection in Ad Hoc Networks Qijun Gu 1 Peng Liu 2 Chao-Hsien Chu 2 Sencun Zhu 3 1 Department of Computer Science Texas State University, San Marcos, TX 78666 2 School of Information

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

EFFECT OF BLACKHOLE INTRUSION IN WIRELESS NETWORKS Mr. Vishal S. Badgujar 1, Prof. Sudhir N. Dhage 2

EFFECT OF BLACKHOLE INTRUSION IN WIRELESS NETWORKS Mr. Vishal S. Badgujar 1, Prof. Sudhir N. Dhage 2 International Journal of Computer Engineering and Applications, Volume VII, Issue III, September 14 EFFECT OF BLACKHOLE INTRUSION IN WIRELESS NETWORKS Mr. Vishal S. Badgujar 1, Prof. Sudhir N. Dhage 2

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Secure routing in ad hoc and sensor networks

Secure routing in ad hoc and sensor networks Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless

More information

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2 A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2 Marwan Aziz Mohammed Dept. of Software Engineering Faculty of Engineering, Koya University,

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Balanced Multicast Routing Performance in Autonomous Sensor Networks

Balanced Multicast Routing Performance in Autonomous Sensor Networks Advances in Networks 2016; 4(2): 21-33 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20160402.12 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) Balanced Multicast Routing Performance

More information