CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in

Similar documents
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Advanced Communication Lab OPNET Tutorial

Security Lab 1 Firewall Performance

Performance Analysis of Various Application Protocols for MANET

Advanced Communication Lab OPNET Tutorial

Lab 1: Improving performance by LAN Hardware Upgrade

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

Performance Analysis of Aodv Protocol under Black Hole Attack

Effects of Caching on the Performance of DSR Protocol

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Performance measurement of MANET routing protocols under Blackhole security attack

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

SIMULATION FRAMEWORK MODELING

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN

Evaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET

OPNET based Investigation and Simulation Evaluation of WLAN Standard with Protocols using Different QoS

Routing Protocols in MANETs

Security in Mobile Ad-hoc Networks. Wormhole Attacks

LAN Modeling. Overview

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Network Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Objective To examine the throughput of a TCP connection as the flow control window size is varied.

Keywords: AODV, MANET, WRP

Effect of Group Mobility Models on Routing Protocols in MANET

Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http Traffic

Caching Strategies in MANET Routing Protocols

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Performance Analysis of VoIP in WiFi Campus Network

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch.

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Wireless Local Area Network (WLAN) - QoS 1.Introduction 2.Network scenario 3.Objectives

Eng 3553 Lab #5 TCP Throughput

Wireless Local Area Network (WLAN) Ad Hoc 1.Introduction 2.Network scenario 3.Objectives 4.Getting Started 1. Basics of OPNET Basics of OPNET

Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks using AODV Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Performance Comparison of Routing Protocols for Remote Login in MANETs

Figure 1: Ad-Hoc routing protocols.

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

!"# $ I. Introduction

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Investigation on OLSR Routing Protocol Efficiency

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

Mobile Communications. Ad-hoc and Mesh Networks

TCP versus UDP Response Time

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [

Performance Analysis of FTP, HTTP and Database for IEEE802.11, IEEE802.11a, IEEE802.11b and IEEE802.11g using OPNET Simulator

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

SECURITY ISSUE ON AODV ROUTING PROTOCOL SUFFERING FROM BLACKHOLE ATTACK

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Switched LANs A Set of Local Area Networks Interconnected by Switches

ENSC 427- COMMUNICATION NETWORKS SPRING 2015 QUALITY OF SERVICE OF THE WIRELESS NETWORKING STANDARD OVER A MULTI USER ENVIRONMENT.

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Performance Analysis of AODV, DSR and OLSR in MANET

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

OPNET Editors and Features

Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Hypertext Transfer Protocol Traffic

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Chapter 16 Networking

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Performance Improvement of Wireless Network Using Modern Simulation Tools

CHAPTER 3 IMPROVED AODV BASED ON LINK QUALITY METRICS

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Routing Protocols in MANET: Comparative Study

Performance Evaluation of AODV and DSR routing protocols in MANET

Infra-Red WLAN Performance Evaluation in 1 Mbps and 2 Mbps Using OPNET for GRP

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation: Detection of Blackhole Mechanism on MANET

Frame Relay Network Performance

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Defending MANET against Blackhole Attackusing Modified AODV

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Transcription:

CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed in the previous chapters OPNET modeler is used as the simulation tool and three scenarios are created. First scenario has normal mobile ad hoc network with AODV as routing protocol and works under ideal working conditions. Second scenario has Balckhole attacks and the third scenario is used to analyze and improve the performance of AODV. The actual simulation setup used and the procedure followed to create the required scenarios is given in this chapter as below. 4.2 Mobile Ad hoc network setup for normal scenario As discussed Mobile ad hoc network is used for evaluating the performance of AODV routing protocol under black hole attacks and thus in this context a simple MANET is simulated using OPNET. Following steps are followed to create the basic MANET 46

A new project is chosen from the file menu and a blank scenario is used to create the first scenario Campus is chosen as the required network scale and the size is set to 1000X1000 meters and thus now the MANET operates within a campus MANET is chosen as the model family from the list of models available with OPNET modeler Now a blank workspace is created and the required objects can be used for the simulation from the object palette and a typical object palette provided with OPNET modeler is as given below 47

From the above screen it can be observed that there are number of objects for MANET simulation and few of them are used across this scenario and they are as listed below 48

Wireless LAN mobile workstations are used as the mobile clients and in this scenario a total of 26 mobile nodes are used[43]. They are dragged from the object palette towards the workspace Application configuration is used to set the applications used across the network and in this scenario FTP and Web applications are used. Profile configuration object is used to set the required profiles for the applications and detailed configuration details are discussed in the later sections Mobile configuration object is used to set the mobility profiles for all the mobile nodes and a detailed configuration is discussed in the later sections[2,12,44]. Above listed objects are used for the simulation of the MANET and the detailed configuration settings done are as explained below 4.2.1 Application Configuration definitions Application configuration object is used to define the required applications that generate the traffic over the network. Application configuration object has an option to create any number of applications and in this simulation two applications 49

are used like FTP (File Transfer Protocol) and Web. Required configurations are used to set the applications and the corresponding screenshot is as given below From the above graph it can be understood that there are two applications used like FTP where medium load is imposed over the network and for the Web application a simple HTTP is used with heavy browsing[45]. Once the required applications are create now the corresponding profiles should be created to support the application traffic and the corresponding procedure followed in this context is as given below 50

4.2.2 Profile configuration settings There are two applications across the network and to generate the required application traffic corresponding profiles need to be created. Profile configuration object is used to create the profile and as there are two application two profiles are created and the corresponding screenshot is as given below From the above screen it is clear that there are two profiles like FTP and Web and the corresponding settings are done. Start time offset for both the profiles is set to a 51

constant value of 100 seconds and duration is set to end of simulation. Once the profiles are created now all the mobile nodes and the wireless LAN server should support the corresponding application traffic and the configuration are explained in the later sections.[46] 4.2.3 Mobility configuration Mobility configuration is required to set the mobility patterns for all the 26 mobile nodes used across the simulation. There are number of mobility models available for simulation and in this scenario default random way point mobility is used and the corresponding screen is as given below 52

From the above screen it is clear that default random way point is used as the required mobility model for the mobile nodes. Speed of the mobile nodes is set o a constant value of 50 seconds, pause time I set to 0 seconds, start time is set to a constant value of 15 seconds and the stop time is till end of the simulation. Once the mobility model is set for the mobile nodes across the network now the nodes should support the mobility and the corresponding procedure is as explained below 53

4.2.4 Mobile nodes and wireless LAN server configurations As discussed in the previous sections there are 26 mobile nodes and a single wireless LAN server and these mobile nodes acts as application clients and WLAN server acts as application server. For communication among these clients and server always a protocol is required and in this simulation AODV is used as the required routing protocol. The actual procedure followed in this context is given in the below screen[47]. From the above screen it is clear that AODV is used as the ad hoc routing protocol. All the mobile nodes and the wireless LAN server are selected and similar settings are done. Now all the nodes and server communicates using the AODV protocol and as the main aim of this simulation is to evaluate the performance of AODV under Balckhole attacks the corresponding AODV attributes are modified due to the attacks in the next scenario. In this scenario default AODV routing protocol 54

parameters are used. Once the AODV routing protocol is set for the simulation now the next process is to assign the application traffic to the mobile nodes and the procedure followed in this context is given below Deploy defined applications option is chosen from the protocols application menu All the mobile nodes are deployed towards the FTP and Web clients and the wireless LAN server is assigned to both the FTP and HTTP server and the corresponding screenshot is as given below[48]. 55

From the above screen it is clear that all the mobile nodes are assigned to source of both the FTP and Web profiles and the WLAN server is assigned to FTP and Web server. Now the mobile nodes act as the FTP and Web clients and the WLAN server acts as both the FTP and Web server. Now all the mobile nodes should support the mobility model created across the mobile configuration object and the corresponding procedure is shown in the below screenshot[49]. Set mobility profile is used to set the mobility defined across the mobile configuration and as the mobility used is default mobility all the mobile nodes now follow the corresponding mobility patterns. Once the basic network setup is ready the corresponding network is as shown below 56

4.2.5 Performance metrics As the main aim of this simulation is to evaluate the performance of AODV under Black hole attacks evaluation of performance is required. OPNET provides options to evaluate the performance across global level, node level and link level and in this simulation global level metrics are chosen and the corresponding screenshot is as given below 57

From the above screen it can be observed that four levels of performance metrics are chosen for this simulation like AODV, FTP, HTTP and wireless LAN and the actual values used in here are as given below[50]. Following are the performance metrics used for AODV routing protocol 58

Number of hopes per route Route discovery time Routing traffic received and sent in bits per sec and packets per sec Total acknowledgments and cache replies sent Total packets dropped Total replies sent from destination Total route errors sent Total route replies sent Total requests sent Following are the performance metrics used for FTP application Download response time Total traffic sent and received in bytes per sec and packets per sec Upload response time Following are the performance metrics used for HTTP application Object response time Page response time Traffic sent and received in bytes per sec and packets per sec Following are the performance metrics used for Wireless LAN server 59

Data dropped Delay Load Medium access delay Network load Retransmission attempts Throughput Once the required simulation metrics are chosen first scenario is ready to simulate and the procedure followed to create the second scenario is as given below 4.3 Blackhole attacks scenario First scenario is duplicated to create the second scenario and the main aim of this scenario is to impose Blackhole attacks across the network[51]. As it is not possible to impose physical attacks over the network required configuration changes are done for creating the simulated Blackhole attacks. In general when there are some Blackhole attacks over the network behavior of the AODV routing protocol is altered against the configuration details. Following are few changes made to the parameters of AODV routing protocol and the corresponding screenshot is as given below 60

From the above screen it is clear that route discovery parameters, active route timeout, hello interval loss, allowed hello loss and other parameters are altered when compared to first scenario. Few changes are also made to wireless LAN server parameters and they are as given below 61

With this configurations simulation of Blackhole attacks over the MANET is done and the third scenario is used to improve the performance of AODV and the configurations changes made are discussed in the next section 4.4 AODV performance scenario This scenario is used to improve the performance of AODV under Blackhole attacks and this scenario is created by duplicating the second scenario. 62

Configuration changes are made to AODV routing protocol parameters and Wireless LAN parameters and they are shown below Above are change changes made to AODV routing protocol parameters and with these configurations overall performance of MANET network and AODV is improved under Blackhole attacks as well. Following are the changes made to wireless LAN parameters and thus performance of application server is also improved and thus the overall performance of applications as well 63

Once all the three scenarios are created simulation is run for 1 hour and manage scenarios option is used. Similar performance metrics are used for all the three scenario and the manage scenario screen is as shown below 64

Once the simulation is done results are compared for performance evaluation and a detailed discussion is done in the next chapter[52,53]. 4.5 Running the simulation Main aim of this simulation is to evaluate and improve performance of AODV routing protocol under Blackhole attacks. Mobile ad hoc network (MANET) is simulated using OPNET modeler and three scenarios are created. First scenario has normal MANET working conditions with AODV routing protocol, second scenario has Blackhole attacks and third scenario has improved AODV working conditions. AODV routing protocol parameters and wireless LAN parameters are configured 65

to simulate the Blackhole attacks and same parameters are used to improve the AODV performance and overall network and application performance. Performance metrics are chosen at AODV, FTP, HTTP and Wireless LAN server level and the simulation is run for one hour to evaluate the results and they are discussed in the next chapter[54]. 66