ANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2

Similar documents
Study Of Methods For Preventing Selective Jamming Attacks:A Review

SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES

Preventing Real-Time Packet Classification Using Cryptographic Primitives

Challenges in Mobile Ad Hoc Network

Reliable Data Transfer on Dynamic Nodes using Packed Hiding Methods in Ad Hoc Networks A.Umamaheswaran 1, S.Gopikrishnan 2, R.

Performance Evaluation of MANET through NS2 Simulation

Performance Improvement of Wireless Network Using Modern Simulation Tools

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Analysis of Routing Protocols in MANETs

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Routing Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Packet Estimation with CBDS Approach to secure MANET

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

IJMIE Volume 2, Issue 6 ISSN:

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS

A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

Enhancedsecure sensor protocol with information via negotiation(sspin)

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

A Simulation study : Performance comparison of AODV and DSR

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Figure 1: Ad-Hoc routing protocols.

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

ACCURATE ENERGY CONSUMPTION BASED ROUTING MECHANISM FOR WIRELESS ADHOC NETWORKS

A Review Paper on Secure Routing Technique for MANETs

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Clustering Based Effective and Ensures Data Dissemination in Wireless Sensor Network

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

Saving Wireless Networks By Detecting, And Designing Efficient From Masquerade Attacks

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

SUMMERY, CONCLUSIONS AND FUTURE WORK

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

CAODV Free Blackhole Attack in Ad Hoc Networks

A Novel Hybrid Routing Protocol for Mobile Adhoc Network

A Review paper on Routing Protocol Comparison

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Secure Routing with Detection Black Hole in MANET: A Study

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Analysis of MANET Routing Protocols OLSR and AODV

A Review on Black Hole Attack in MANET

A Comparative Study of Various Network Simulation Tools

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Comprehensive Study and Review Various Routing Protocols in MANET

Survey on Traffic Pattern Discovery System For MANETs

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Analysis of Three Routing Protocols for Varying MANET Size

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Defending MANET against Blackhole Attackusing Modified AODV

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

Security in Mobile Ad-hoc Networks. Wormhole Attacks

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

Implementation: Detection of Blackhole Mechanism on MANET

Congestions control through cloud computing with MANET

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Network Simulators: A Comparative Survey

Routing Protocols in MANETs

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Transcription:

ANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2 Mr.Ganesh R.Patil 1, Prof. Prashant S.Wankhade 2 1 PG Scholar,Dept of Electronics &Telecomm. Engg, ARMIET, Asangaon, Mumbai (India) 2 Assistant Professor, Dept of Electronics Engg, Datta Meghe College of Engineering, Airoli, Navi Mumbai, (India) ABSTRACT: The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The performance of the proposed scheme is to be evaluated through a series of simulations with the ns-2 network simulator. Keywords: WSN,NAM file,tcl file,ns2simulator. I. INTRODUCTION The network consists of a collection of nodes connected via wireless links. Nodes may communicate directly if they are within communication range, or indirectly multiple hopes. Nodes communicate both in unicast mode and broadcast mode. Communication can be either unencrypted or encrypted. For encrypted broadcast communications, sysmetric krys are shred among all intended receivers. These keys are established using preshared pairwise keys or asymmetric cryptography. Conventional anti-jamming techniques rely extensively on spread-spectrum (SS) communications or some form of jamming evasion (e.g., slow frequency hopping, or spatial retreats). SS techniques provide bit-level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model. We illustrate the impact of selective jamming attacks on the network performance. We used OPNET Modeler 14.5 to implement selective jamming attacks in two multihop wireless network scenarios. In the first scenario, the attacker targeted a TCP connection established over a multihop wireless route. In the second scenario, the jammer targeted network-layer control messages trans- mitted during the route establishment process. 1.1.Selective Jamming at the Transport Layer In the first set of experiments, we set up a file transfer of a 3 MB file between two users A and B connected via a multihop route. The TCP protocol was used to reliably transport the requested file. At the MAC layer, the RTS/ CTS mechanism was enabled. The transmission rate was set to 11 Mbps at each link. The jammer was placed within the proximity of one of the intermediate hops of the TCP connection. Four jamming strategies were considered: 1.Selective jamming of cumulative TCP-ACKs. 99 P a g e

2.Selective jamming of RTS/CTS messages. 3.Selective jamming of data packets. 4.Random jamming of any packet. 1.2 Selective Jamming at the Network Layer In this scenario, we simulated a multihop wireless network of 35 nodes, randomly placed within a square area. The AODV routing protocol was used to discover and establish routing paths. Connection requests were initiated between random source/destination pairs. Three jammers were strategically placed to selectively jam no overlapping areas of the network. Three types of jamming strategies were considered: 1) a continuous jammer. 2) a random jammer blocking only a fraction p of the transmitted packets. 3) a selective jammer targeting route-request (RREQ) packets. II. GENERATION OF TCL AND NAM FILES 2.1 TCL Script (run.tcl) TCL Script (run.tcl) which we are using defines all nodes and all required parameters. Set nn # number of mobile nodes set ns [new simulator] #simulator object creation set f [open Trace.tr w] #trace file to record all the events set namtrace[opennam. nam w] #NAM window creation set topo[new Topology] #topology creation set god_[create-god $ nn] #node creation proc weight {} #set color,create des x y file proc source {} #---source--- proc destination {} #---destination--- proc finish{} #finish procedure to exec NAM window 2.2 NAM File Network Animator File (Nam.nam) When a simulation is finished, NS produces one or more text-based output files that contain detailed simulation data, i.e Nam.nam if specified to do so in the input Tcl (or more specifically, Otcl) script. The data can be used for simulation analysis (two simulation result analysis examples are presented in later sections) or as an input to a graphical simulation display tool called Network Animator (NAM). NAM has a nice graphical user interface similar to that of a CD player (play, fast forward, rewind, pause and so on), and also has a display speed controller. Furthermore, it can graphically present information such as throughput and number of packet drops at each link, although the graphical information cannot be used for accurate simulation analysis. III. RESULT We use the NS-2 simulator for examining our desired results we get following output. Step 1. After run the TCL script (run.tcl) in terminal by command we get fig 1. Step 2.- Secondly execute Nam.nam NAM file NAM file (Network Animator File) we get fig 2. Step 3. Finally after completion the Simulation with desired time the file is generated and result shown below 100 P a g e

In fig.3. Fig 1. Step 1 Result Fig 2. Step 2 Result 101 P a g e

Fig 3. Step 2 Result Fig 4. Step 2 Result 102 P a g e

Fig 5. Step 3 Result Fig 6. Step 3 Result 103 P a g e

IV. CONCLUSION After simulating the source and destination formation file on Network Simulator (version 2.32) widely known as NS2, a scalable discrete-event driven simulation tool. Building high performance WSN network systems requires an understanding of the behavior of sensor network and what makes them fast or slow. In addition to the performance analysis, we have also evaluated the proposed technique in measuring, evaluating, and understanding system performance. The final but most important step in our experiment is to analyze the output from the simulation. After the simulation we obtain animation which shows the movement of nodes along with the snake type dynamic movement and various node points. With the help of that we will identify the location of all nodes finally the location details file generated which contains the Source, Destination, SX-Pos, SY-Pos, Distance(d). Thus we conclude that the different methods of selective jamming attacks at source and destination nodes were studied and verified the desired output. REFERENCES [1] Alejandro Proan o and Loukas Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks Ieee Transactions On Dependable And Secure Computing, Vol. 9, No. 1, January/February 2012. [2] R.C. Merkle, Secure Communications over Insecure Channels, Comm. ACM, vol. 21, no. 4, pp. 294-299, 1978. [3] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper, Intelligent B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, On thesensing and Classification in Ad Hoc Networks: A Case Study, IEEE Aerospace andelectronic Systems Magazine, vol. 24, no. 8, pp. 23-30, Aug. 2009. [4] Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming, Proc. ACM Conf. Wireless Network Security (WiSec), 2011. [5] K. Gaj and P. Chodowiec, FPGA and ASIC Implementations of AES, Cryptographic Engineering, pp. 235-294, Springer, 2009. [6] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, Reactive Jamming in Wireless Networks: How Realistic Is the Threat, Proc. ACM Conf. Wireless Network Security (WiSec), 2011. [7] W. Xu, W. Trappe, Y. Zhang, and T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Net- works, Proc. ACM Int l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46-57, 2005. 104 P a g e