routing protocols, also these don t consider the packet size and the antenna range of the nodes as a I. INTRODUCTION

Similar documents
Improving Quality of Services of Ad Hoc Network by Working over Link Budgeting and Delay Elimination

AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

II. ROUTING CATEGORIES

Energy Efficient EE-DSR Protocol for MANET

QUALITY OF SERVICE PROVISIONING IN MANET USING A CROSS-LAYER APPROACH FOR ROUTING

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Comparison of Routing Protocols for Remote Login in MANETs

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Figure 1. Clustering in MANET.

Performance Analysis of Aodv Protocol under Black Hole Attack

Mitigating Superfluous Flooding of Control Packets MANET

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance Analysis and Enhancement of Routing Protocol in Manet

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

A Survey - Energy Efficient Routing Protocols in MANET

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Comprehensive Study and Review Various Routing Protocols in MANET

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

A Review on Black Hole Attack in MANET

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

SUMMERY, CONCLUSIONS AND FUTURE WORK

Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Evaluation of Various Routing Protocols in MANET

Power aware Multi-path Routing Protocol for MANETS

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Routing Protocols in MANETs

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Routing Protocols in MANET: Comparative Study

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

Performance Evaluation of MANET through NS2 Simulation

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

An Approach to Enhance Energy Efficient Position Based DSR Routing Protocol

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Defending MANET against Blackhole Attackusing Modified AODV

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Chapter 7 CONCLUSION

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Effects of Caching on the Performance of DSR Protocol

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Keywords: AODV, MANET, WRP

Subject: Adhoc Networks

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Introduction to Mobile Ad hoc Networks (MANETs)

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Ad Hoc Networks: Issues and Routing

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Overview (Advantages and Routing Protocols) of MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

Ad Hoc Networks: Introduction

2013, IJARCSSE All Rights Reserved Page 85

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Survey on Path Weight Based routing Over Wireless Mesh Networks

Survey of Reactive Routing Protocols for MANET

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

To Detect and Isolate the Selective Packet Drop Attack in MANET

Performance Improvement of Wireless Network Using Modern Simulation Tools

Review on an Underwater Acoustic Networks

Transcription:

Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Secure Routing by Elimination of Black Holes in Ad Hoc Networks Vishal Sharma,Takshi Gupta Student,B.Tech. Department of Computer Science & Engineering, Amritsar College of Engineering & Technology, Punjab Technical University, Jalandhar, India Abstract-- Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Ad Hoc Networks have the attributes such as wireless connection, continuously changing topology, distributed operation and easy of deployment. Each node operates not only as an end system, but also as a router to forward packets. Routing in Ad Hoc Networks has been a challenging task ever since the wireless networks came into existence. The major reason for this is continue changes in network topology because of high degree of node mobility. A number of protocols have been developed to accomplish this task. Ad hoc networks are extensively used in military and civilian applications. In the paper, we address the problem of multiple black holes that may arise in the network structure, and further we propose the technique to remove the problem of multiple black holes with efficient routing for Ad Hoc Networks. Keywords-- Ad hoc networks, AODV, black hole, SBHERP, packet loss, and packet received. routing protocols, also these don t consider the packet size and the antenna range of the nodes as a I. INTRODUCTION A wireless ad hoc network is based on the nodes that are mobile and have capabilities of communicating each other with packet radios over a shared wireless medium. The limited radio propagation causes the route to be multi hop [1] [2] [7] [8]. The applications of such networks can be search and rescue, automated battlefields, disaster recovery, crowd control and sensor networks. The routing protocol must have the ability to manage the frequent topology changes caused by the mobility of nodes and these need to be efficient as compared on basis of efficiency in terms of bandwidth and power as well as on basis of load transmission [11]. With the advent of On-demand routing, the tables are not maintained and the topological views are also rescued and the routing totally becomes dynamic [11]. Existing on demand routing protocols such as DSR (Dynamic Source Routing), AODV (Ad-hoc on demand distance vector routing) are the shortest path based performance metric due to which there is a problem of long delays and congestions in the routing path and the whole set up of the nodal structure enters in to the dead state [10]. Also, on demand protocols that use the shortest paths as performance metric suffer from performance degradation as the network traffic increases [10]. In the paper [6], the energy of the nodes is the major area of concerned for the research to be carried on in this field. The one of the method suggested was CPACL protocol. It stands for cost based power aware routing protocol. In this paper the energy factor of the nodes is taken to be major concern. In this paper, a routing algorithm has been suggested that selects the path form the source to the destination on basis of the path that consumes the least energy [10]. The path selected for this transmission is the best selected path for the particular types of nodes. This means that if a path is

defined from node 1 to node 2 by CPACL algorithm, it is the best suited path in all conditions [7] [10]. This protocol is the reactive routing protocol. It maintains the established routes as long as they are needed by the sources. AODV- CPACL uses sequence numbers to ensure the freshness of routes. The route discovery process is initiated whenever; a traffic source needs a route to a destination. Route discovery typically involves a network wide flood of route request packets targeting the destination and waiting for a route reply. It has also been shown that the per node throughput capacity of ad hoc networks with nodes n decreases with n as Θ (1/n log n) 1/2 [3]. The issue regarding this has been shown as the general capacity cost function of channel capacity for arbitrary input alphabets was studied on single link [4]. In the related work the bits per joule capacity of the network is assumed [3]. The tradeoff between energy and the bandwidth has been analyzed under various assumptions on the channel condition and the interference under a linear equidistant relaying network model without considering the energy consumption at the receiver end [5][6][7]. Also the receiver consumption can be improved by using the cross layer design including the effects of the power amplifier used at the transmitter end [8]. The transport efficiency of an ad hoc network was defined considering the transmitter energy and the receiver s processing energy [9] [10]. Thus the energy consumption for the packet transmission and the large number of hops is considered [6]. For the networks that have energy as their limiting resource, the network lifetime related to the energy is one of the significant performance metrics [6]. To solve the dead state problem, we have earlier got our paper published that resolved this issue of nodes getting into the dead state. This protocol was termed as DSPO. Further, the problem regarding security issues that may arise in the process of routing is that of black hole. This problem has been discussed and the solution to optimize the problem has been proposed in the paper. Also, the technique is applicable to multiple black hole containing network structure. II. SYSTEM MODEL The network model we considered comprises of k number of hops, hops here are the nodes, and the nodes here considered are to be single channel node. This means for k number of nodes there is k number of channels. Thus, if two nodes are communicating at a time, then we have k-1 number of relaying nodes in the network model. The distance between the source and the destination is denoted by d. the distance between the relaying nodes can be decided on basis of the dynamic routing considered or it can be given on mathematical computations, this means that the distance between the relaying nodes will be less than the actual distance between the source and destination. Thus, if we consider a constant, let this constant be α then, from the theoretical analysis [6], we obtain that this value is multiplied with the total distance to obtain the actual distance between the relaying nodes then this value should be positive and less than one. Thus, the distance between the relaying nodes will be: The mobility introduces another simple concept. If the mobility of the structure nodes is more, the attenuation has greater effect but if the nodes are considered to be at rest then, the attenuation comes out to be so small that it can be neglected. Also the simplifier power amplifier is considered with the following expressions: f o (P in ) = ρ P in, 0 < P in < P 1 P SAT, P 1 < P in P max f c (P in ) = f o (P in ) + P h..[6] Where ρ and P h are constants. Also it is considered that P max = P 1. The values for the constant are ρ=50(17) db, P 1 =1.5 mw, P SAT =75 mw, and P h =35 mw. Thus, the modified formula for the attenuation loss in a network model will be: P r = β P out / d η, where d > 0. Here, is the attenuation loss in the AD HOC NETWORKSs, β is the antenna constant, d is the end to end distance between source and destination, ε is the path loss constant such that 2 < ε < 4 and δ is the mobility factor. The mobility can be computed by analyzing the movement in terms of number of bits transferred per second per meter of the network model. Here, Pout = fo (Pin), which is based on the working power amplifier present in each of the node. III. SECURE BLACK HOLE ELIMINATION ROUTING PROTOCOL ( SBHERP) A black hole has two properties. First, the node exploits the ad hoc routing protocol, such as AODV,

to advertise itself as having a valid route to a destination node, even though the route is spurious, with the intention of intercepting packets [10]. Second, the node consumes the intercepted packets. The black hole in general is the node that causes security problems by accepting the data which is not actually meant for it. This problem can be shown from the following snap shots of the simulator. for routing, so it is confirmed to be the black node that is accepting the data without any confirmation. Thus, in general the algorithm (SBHERP) for finding the black hole can be defined as follows: Set centralized_node== node (0) While ( Search_routing_table(n) ==True) { Set node_location=table_reading Generate Postion_Signal If (Node_location==unauthorized) { Black_hole Detected Change Transmission Mode } Else { Continue_transmission } Fig. 1 Normal Transmission The above figure shows the normal state transmission in Ad Hoc Networks. The figure shows the correct transmission between the Node 1 and Node 0. The black hole is that if any of the other nodes procures for data without any confirmation of without actual selection between path of transmission between source and destination. The detection of the black hole is detected from the table maintained after the start of transmission that contains the metric number and sequence number for the node. Thus, the detection can be easily carried out by matching the sequence number obtained from acknowledgement from the node receiving the data with the sequence numbers contained in the routing table. If the sequenced number is not matched with any of the data, then the node is not authenticated. The black hole can be shown as follows: IV. BLACK HOLE CORRECTION The detection of the black hole is followed by the correction of this defect. The correction includes prevention of the data which is being transmitted on the path between the black hole node and the source of transmission. The packets transmitted this way are made to drop so as no unauthorized access is available to transmitted data. The dropping of the packets can be seen from following packets: Fig. 3 packet drops from wrong path Fig.2 Black Hole The figure 3 shows the dropping of the packet when transmitted along the wrong path. Thus in the way, it is easy to correct the black hole by actual dropping of packets. The figure shows that node 3 is receiving data but its information is not included in the table maintained

Fig. 4 node penalized The figure 4 shows that node causing threat is been eliminated form path of transmission. Thus the black hole can be corrected and the correct transmission can be further carried on as shown below in the figure 5. Packet Lost: The packet lost and received ratio is checked in the process of black hole detection and correction. This includes actual number of packet reaching the destination node. Energy Efficiency: Energy efficiency is the efficiency computed over the total energy consumption of the network including the useful energy and the wasted in form of losses during the transmission process. This is calculated as the modified energy for the network structure. Bandwidth efficiency: Bandwidth efficiency is the effective rate of transmission that can be considered at the common rate as well as at the common power. The effective rate i.e. the bandwidth is computed over the minimum achievable rate and the number of channel used for the purpose of transmission between the source and the destination. The value considered for minimum achievable rate over which bandwidth efficiency is calculated is 0.25. Throughput: throughput is the number of bits transferred during the transmission process. It is calculated I bits transferred per unit time. For our analysis the time considered is the simulation time. Mobility: Mobility is the new parameter that is highlighted in this paper. The readings have been taken by considering the scenario to be mobile and animations has also been recorded for the mobile nodes. B. Equation for performance calculation during Black Hole Eradication Fig. 5 Correct Transmission after Black hole solution A. Performance Metrics We simulated the typical Ad Hoc Networks for hop and calculated the results for bandwidth, energy, throughput of the network structure taking mobility and the antenna range as the basis of the technique. We have taken values as constant to compute our results. The simulation has been performed for the area ranging over 1000x1000. Also, the values for the noise power spectral density are 0.00384, heat loss from power amplifier to be 35 mw, packet size to be 512 bytes, transmitter energy is taken to be 0.38 µj and that of receiver processing energy is 0.25 µj. We concentrated on the following performance metrics: Black Hole: Any unwanted transmission in the network structure that lead to eroded transmission from source to destination by handling of bytes by unauthorized node. (E tot, bit ) CR = Efficiency at transmitter + Efficiency at the receiver = ʍR -1 min [E tx i=1 Σ k (d i / d max ) η + k (E p + P h Ts ) ] = R -1 eff [B k, CR. E tx / k + E p + P h Ts] B k, CR = i=1σ k (d i / d max ) η (E tot, bit ) CR d e -η / N o = ʍ R -1 eff [B k, CR. γ/ k + γ c ] γ = E tx d e -η / N o γ c = (E p + P h Ts) d e -η / N o E eff = R eff / b_fac (B k, CR. γ/ k + γ c ) Where Eeff is the modified energy efficiency defined in terms of bits transferred per joule, γ is the signal to noise ratio, N o is the noise power spectral density, γ c is the energy constant, Ph is the heat loss from power amplifier, d is the end to end distance, ʍ is the mobility, b_fac is the black hole factor that depends k

upon the probability of occurrence of black hole and the ʍ (mobility) during transmission. V. SIMULATION RESULTS AND ANALYSIS The simulations of the above technique are carried out using NS-2 simulation and the graphical result of the analysis is shown below: Fig. 8 Throughput The above graph shows the comparison of throughput of AODV before black hole determination and the AODV with black hole determination technique. Fig. 6 Packet Received Vs Packet Lost The above graph shows the relation between the numbers of packet lost and received along with the number of nodes taken for different scenario of transmission. Fig. 9 Bandwidth Comparison The above graph shows the comparison of bandwidth Efficiency of AODV before black hole determination and the AODV with black hole determination technique. VI. CONCLUSION Fig. 7 Network Efficiency The above graph shows the comparison of network efficiency of AODV before black hole determination and the AODV with black hole determination technique. In the paper, we proposed the secure black hole elimination routing protocol (SBHERP) for Ad Hoc Networks. The system developed by us is able to detect multiple black holes at the single instance of time and also has the capacity to correct the network structure by eradicating all the harmful and threat causing nodes. In future, work can be carried out to optimize the delays that may arise due to halt in transmission process on occurrence of black hole. REFERNCES [1]Dr. R.K. Singh, Tanu Preet Singh, Vishal Sharma: Dead State Recovery Based Power Optimization Routing Protocol for Ad Hoc

Networks, HPAGC-2011, CCIS 169, pp.424-429,2011. Springer-Verlag Berlin Heidelberg-2011. [2]Sunil Taneja and Ashwani Kush: A Survey of Routing Protocols in Mobile Ad Hoc abstract. International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010. [3]M.Saravana karthikeyan, M.Murali, Dr.S.Sujatha: Identifying performance metrics to maximize Manet s throughput ; 2010 International Conference on Advances in Computer Engineering. [4]Manika Vinay Rali, Min Song, Sachin Shetty: Virtual wired transmission scheme using directional antennas to improve energy efficiency in Wireless Mobile Ad Hoc Network ; 978-1-4244-2677-5, IEEE 2008. [5] http://www. csi.uoregon.edu. [6]Sehoon Kim, Jinkyu Lee and Ikjun Yeom, Modeling and Performance Analysis of Address Allocation Schemes for Wireless sensor networks, IEEE transactions on vehicular technology, vol. 57, NO. 1, JANUARY 2008. [7] Rekha Patil, Dr. A. Damodaram: cost basedd power aware cross layer routing protocol for Manet ; 2008 IJCSNS. [8]Changchun Bae and Wayne E. Stark: A Tradeoff between Energy and Bandwidth Efficiency in Wireless Networks ; 2007 IEEE. [9]V. Rodoplu and T. H. Meng: Bits-per-Joule capacity of energy-limited wireless networks, IEEE Transaction Wireless Communications, vol.6(3), pp.857-865, March 2007. [10]B. Rankov and A. Wittneben: Spectral efficient protocols for half-duplex fading relay channels, IEEE Journal on Selected Areas in Communications, vol. 25, pp.379-389: Feb. 2007. [11] Network simulator-2 www.isi.edu/nanam/ns/.