Performance Evaluation of AODV under Blackhole Attack

Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.

[1]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[2]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[3]  Mohammed Bouhorma,et al.  Performance comparison of ad-hoc routing protocols AODV and DSR , 2009, 2009 International Conference on Multimedia Computing and Systems.

[4]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[5]  Nesar Ahmad,et al.  Performance Evaluation of TCP Reno and Vegas over different routing protocols for MANETs , 2010, 2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems.

[6]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[7]  N.M. Din,et al.  Trace Analyzer for NS-2 , 2006, 2006 4th Student Conference on Research and Development.

[8]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  Elizabeth M. Belding-Royer,et al.  AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[12]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[13]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[14]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[15]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[16]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[17]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[18]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[19]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[20]  Bello Lawal,et al.  Performance Evaluation of CBR and TCP Traffic Models on MANET Using DSR Routing Protocol , 2010, 2010 International Conference on Communications and Mobile Computing.

[21]  Mona Ghassemian,et al.  Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[22]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[23]  Tracy Camp,et al.  Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.

[24]  Paz Morillo,et al.  Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.