Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

Similar documents
COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

A Review on Black Hole Attack in MANET

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Simulation Study to Observe the Effects of Increasing Each of The Network Size and the Network Area Size on MANET s Routing Protocols

Performance Comparison of Routing Protocols for Remote Login in MANETs

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

OPNET based Investigation and Simulation Evaluation of WLAN Standard with Protocols using Different QoS

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Infra-Red WLAN Performance Evaluation in 1 Mbps and 2 Mbps Using OPNET for GRP

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

Comprehensive Study and Review Various Routing Protocols in MANET

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

Effects of Caching on the Performance of DSR Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Overview (Advantages and Routing Protocols) of MANET

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

Secure Routing with Detection Black Hole in MANET: A Study

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Novel approach to prevent collaborative attacks in MANETS using Cooperative Bait detection Scheme (CBDS)

Performance measurement of MANET routing protocols under Blackhole security attack

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Simulation and Performance Analysis of OLSR Routing Protocol Using OPNET

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

SUMMERY, CONCLUSIONS AND FUTURE WORK

Gurleen Kaur Walia 1, Charanjit Singh 2

Caching Strategies in MANET Routing Protocols

A Review Paper on Secure Routing Technique for MANETs

QoS Based Evaluation of Multipath Routing Protocols in Manets

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Estimate the Routing Protocols for Internet of Things

Performance Analysis of Various Application Protocols for MANET

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Evaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

A Survey - Energy Efficient Routing Protocols in MANET

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Performance Evaluation of Various Routing Protocols in MANET

Webpage: Volume 4, Issue VI, June 2016 ISSN

Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS

Performance Improvement of Wireless Network Using Modern Simulation Tools

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Effect of Group Mobility Models on Routing Protocols in MANET

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Security in DOA routing protocol for Mobile Adhoc Networks

Network traffic based assessment of reactive, proactive and hybrid MANET protocols

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A QoS-based Measurement of DSR and TORA Reactive Routing Protocols in MANET

Performance Analysis and Enhancement of Routing Protocol in Manet

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Performance Analysis of Aodv Protocol under Black Hole Attack

Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Performance Evaluation of MANET through NS2 Simulation

Routing Protocols in Mobile Ad-Hoc Network

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Figure 1: Ad-Hoc routing protocols.

Keywords: AODV, MANET, WRP

COMPARISON OF AODV, OLSR, AND TORA IN MANET UNDER JELLY FISH ATTACK

IEEE s ESS Mesh Networking

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Packet Estimation with CBDS Approach to secure MANET

Energy Efficient EE-DSR Protocol for MANET

CAODV Free Blackhole Attack in Ad Hoc Networks

Defending MANET against Blackhole Attackusing Modified AODV

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

IJMIE Volume 2, Issue 6 ISSN:

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Evaluation of Routing Protocols for Mobile Ad hoc Networks

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

Transcription:

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh, Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India, Affiliated to Punjab Technical University, Kapurthala Abstract: Mobile Ad-hoc network (MANET) is infrastructure less network used to exchange information by use of Wi-Fi technology without passing through an access point (AP). Every node in a MANET network may function as both host and a router. MANET allows its wireless nodes to form such a topology in which source node can communicate with other node that does not lie in its direct range. In this research paper, we have evaluated the performance of ad-hoc on-demand distance-vector (AODV), dynamic source routing (DSR) and temporally ordered routing algorithm (TORA) routing protocols by varying number of black hole nodes for videoconferencing application. The results have been compared of matrices such as throughput, delay, retransmission attempts, network load and data dropped using OPNET Modeler 14.5. Key words: MANETs, AODV, DSR, TORA, OPNET I. INTRODUCTION Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. Mobile ad-hoc network is an autonomous network. In which information can be exchange by a collection of wireless mobile nodes. An autonomous terminal of MANET network a node may function as both host and a router. The network is decentralized, where all network activities, including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. To send packets in the entire network multi-hop routing may require in which packets should be delivered via one or more nodes. Nodes make the use of same random access wireless channel, work together in the friendly environment to forward data packets [1]. MANET can widely use in many applications such as military or police exercises, disaster relief operations, virtual class rooms, business meetings and so on [2]. In mobile ad-hoc network, each node must be communicate or to forward data packets on the behalf of another node. Every mobile node can move during transmission. Due to these characteristics such as mobility, standalone operation of network etc. makes the MANET more vulnerable against attacks [3]. In recent years, many issues related to security have been emerged. So their analysis and studies are carried to solve these issues. The main security issues are snooping attacks, armhole attacks, black hole attacks, and so on. Black hole is more renowned among these threats because of misbehavior of node(s) [4]. Source node sends RREQ to its neighbor nodes in order to transmit data packets to destination node. Black hole node consumes the whole data packets and pretends to source node that it has a valid and shortest path to destination node. This is known as selective black hole attack. While in cooperative black hole attack the number of nodes group together to consume the data packets which is being send by source node to destination node [5]. Hence, the main objective of this research work is to analyze the performance of three different routing protocols under black hole attack for videoconferencing application. Section II presents the related work. Section III describes the simulation setup. Section IV presents the simulation results followed by the conclusion drawn in section V on the basis of our observations. II. RELATED WORK Khurana [6] has analysed the performance of two routing protocols (AODV and DSR) for 100, 125 and 150 nodes for two different applications (Videoconferencing and VoIP). All the experiments run for 300 sec with a seed value of 128. For videoconferencing application results show that while increasing in number of nodes the performance metrics such as delay, retransmission attempt and throughput of DSR protocol decreases. DSR performs better than AODV in case of delay and retransmission attempt but throughput of AODV protocol is better than DSR. Aujla [7] compares the performance of five mobile ad-hoc routing protocols (AODV, DSR, TORA, GRP, and OLSR) by varying the number of nodes for two different applications (Videoconferencing and E -mail). The performance compared on such matrices like delay, load, throughput and data dropped. Study concluded that AODV is best suited for lower number of nodes. Whereas OLSR for higher number of nodes for videoconferencing application. For E-mail application GRP performs better for lower number of nodes while increasing number of nodes OLSR improves its performance. Mohebi [5] has evaluated two MANET routing protocols (AODV and DSR) based on with/without black hole IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 18

attack showing AODV performed better than under black hole attack. The research approach adopted in this paper includes effect of black hole attack in MANET, analysis of three different routing protocols (AODV, DSR and TORA) for videoconferencing application. III.SIMULATION SETUP Optimized Network Engineering Tools (OPNET) version 14.5 [8] is use to analyze the performance of three routing protocols in three different scenarios by varying the number of black hole nodes for videoconferencing application. The three different scenarios are as follow: first, in which 50 nodes are black hole nodes, in second scenario 100 nodes are black hole nodes and third scenario has 150 black hole nodes. The protocols used for research are AODV, DSR and TORA for all scenarios. The simulation has run for 60 sec with a seed value 128. When the number of black hole nodes is increased, the performance of protocols was reduced [5]. The following performance metrics have considered in this research work: Throughput represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN nodes of the network. Delay represents end to end delay of all the packets received by the wireless LAN MACs of all WLAN nodes in the network and forwarded to the higher layer. Network load represents the total end-to-end delay received by the higher layer of all WLAN nodes affects the overall load of the network depending on routing protocols used in MANETs. Retransmission attempts represents total number of retransmission attempts by all WLAN MACs in the network until either packet is successfully transmitted or it is discarded as a result of reaching short or long retry limit. Data dropped represents the traffic (bits/sec) received by high er layer of all WLAN nodes in the network dropped as a result of consistently failing retransmissions. TABLE I. summarizes the simulation parameters that have been used in our research work. Fig. 1 shows the snapshot of our research work. TABLE I. Simulation Parameters Total number of nodes 200 Number of Black hole nodes Simulation time Simulation area Routing protocols Mobility model Data rate Transmit Power Application name SIMULATION PARAMETERS Values 50, 100, 150 60 sec 1000m x 1000 m AODV, DSR, TORA Random waypoint 18 mbps 0.005 W Videoconferencing IV. Fig. 1 Snapshot of research scenario. RESULTS AND DISCUSSIONS The main objective of this research is to evaluate the performance of each routing protocol by varying the number of black hole nodes for videoconferencing application. The results are based on performance parameters such as throughput, delay, network load, retransmission attempts and data dropped. A. Throughput Fig. 2 shows the throughput for videoconferencing application. In Fig. 2(a-c) AODV protocol shows the maximum throughput as compared to DSR and TORA. The TORA routing protocol shows less throughput than both. In second scenario in which 100 Black hole nodes considered in the network, AODV protocol has achieved maximum throughput as compared to first and third scenario in which 50 and 150 black hole nodes considered respectively. The simulation results show that throughput of AODV routing protocol is highest as compared to DSR and TORA. IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 19

and 1.8 (sec) in first, second and third scenario respectively. The average delay of TORA protocol is 4.5, 1.7 and 0.2 (sec) in first, second and third scenario respectively. The simulation results show that TORA routing protocol has less average delay (0.2 sec) for simulation time of 60 sec for maximum number of black hole nodes (200) as compared to DSR and AODV. Fig. 2 Throughput for 50, 100 and 150 black hole nodes. B. Delay Fig. 3 shows the average delay videoconferencing application. Fig. 3(a-c) shows that while increasing in the number of black hole nodes in the network, there is delay drop in each routing protocol. This is due to, increasing black hole nodes, the active nodes are less in the network which transmit and receive data. The average delay of AODV protocol is 7.5, 5.3 and 1.9 (sec) in first, second and third scenario respectively. The average delay of DSR protocol is 6.5, 4.9 Fig. 3 Delay for 50, 100 and 150 black hole nodes. IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 20

C. Network load Fig. 4 shows the network load for videoconferencing application. DSR routing protocol shows highest network load. This is due to reason that depending on DSR routing protocol the higher layer of all nodes in the network received highest end-to-end delay that affects the overall load of the network. Fig. 4(a-c) shows that both AODV and DSR routing protocols have same network load while increasing black hole nodes in the network. TORA routing protocol shows less network load than AODV and DSR. Fig. 4 Network load for 50, 100 and 150 black hole nodes. D. Retransmission Attempts Fig. 5 shows the retransmission attempts for videoconferencing application. In the beginning retransmission attempts of TORA fluctuate high but with passage of time it is less as compare to DSR and AODV. DSR shows high retransmission attempts. Fig. 5 (a-c) shows that while increasing in number of black hole nodes in the network the retransmission attempts of each routing protocol becomes less. For 50 black hole nodes in the network TORA shows less retransmission attempts (1.8 packets) than DSR and AODV. While increasing black hole nodes in the network the performance of TORA protocol increases i.e. (1.5 and 0.9 packets, retransmission attempts decreases) for simulation time of 60 sec in second and third scenario respectively. The simulation results show that TORA routing protocol has less retransmission attempts as compared to both DSR and AODV. IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 21

Fig. 5 Retransmission attempts for 50, 100 and 150 black hole nodes. E. Data Dropped Fig. 6 shows the data dropped for videoconferencing application. For AODV routing protocol, at the end of simulation time maximum traffic (bits/sec) received by higher layer of all WLAN nodes in the network dropped. A Fig. 6 (ac) show that for each scenario DSR protocol has high data dropped at 60 sec. Data dropped of all the routing protocol decreases while increasing in number of black hole nodes in the network. This is due to reason that maximum number of black hole nodes (150) does not transmit and receive the data, these black hole nodes are considered as inactive nodes in the network and only few active nodes work properly in the network. Due to few active nodes the retransmission attempts also decreases this respond less data dropped in the network. The simulation results show that TORA has least data dropped as compared to DSR and AODV routing protocols. Fig. 6 Data Dropped for 50, 100 and 150 black hole nodes. V. CONCLUSION In this research paper we have evaluate the performance of two on-demand reactive routing protocols (AODV and DSR) and one hybrid routing protocol (TORA) by varying the number of black hole nodes for videoconferencing application. This research paper conclude that TORA protocol has less average delay, minimum retransmission attempts, least IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 22

network load and less data dropped as compare to DSR and AODV. The results also show that AODV protocol has maximum average throughput as compare to DSR and TORA routing protocols. REFERENCES [1] Guo, Y. Peng, X. Wang, D. Jiang, and Y. Yu, Performance evaluation for on-demand routing protocols based on opnet modules in wireless mesh networks, Computers & Electrical Engineering, vol. 37, no. 1, pp. 106 114, 2011. [2] Ramaswamy, Sanjay and Fu, Huirong and Sreekantaradhya, Manohar and Dixon, John and Nygard, Kendall E, Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks, International Conference on Wireless Networks, 2003. [3] Gupta, Sorabh and Gill, Sumeet and Joshi, Anil, Analysis of Black Hole Attack on AODV and OLSR Routing Protocols in MANET, IJCA, vol.1, pp.11-19, october 2011. [4] Tseng, Fan-Hsun and Chou, Li-Der and Chao, Han-Chieh, A survey of black hole attacks in wireless mobile ad hoc networks, Human-centric Computing and Information Sciences, vol. 1, pp. 1-16, 2011. [5] A. Mohebi, E. Kamal, and S. Scott, Simulation and analysis of aodv and dsr routing protocol under black hole attack. International Journal of Modern Education & Computer Science, vol. 5, no. 10, p. 1, 2013. [6] S. Khurana and A. Grover, Simulation and analysis the effect of varying no. of nodes on aodv and dsr for different applications. International Journal of Computer Applications, vol. 77, p. 1, 2013. [7] G. S. Aujla and S. S. Kang, Comprehensive evaluation of aodv, dsr, grp, olsr and tora routing protocols with varying number of nodes and traffic applications over manets, Department of CSE, Chandigarh Engineering College, India.(April 2013), vol. 1, p. 1, 2013. [8] OPNET, Modelling Concepts Reference Manual, Modeler/Release 14.5. IJIRT 100036 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 23