Mobility based Performance Analysis of AODV and DYMO under Varying Degree of Node Misbehavior

Node cooperation is the basic paradigm for efficient functioning of MANETs (Mobile Ad hoc Networks). A paradigm shift from this trait causes the nodes to misbehave thereby affecting the network performance. Selfishness to conserve own resources, Maliciousness to disrupt the network fabric or Malfunctioning may cause the nodes to misbehave. MANET characteristics like dynamism of topology, shared wireless channels and open infrastructureless architecture pose security threats to them. This paper examines and analyzes two currently IETF listed reactive routing protocols AODV and DYMO with varying speed of node mobility and varying degree of maliciousness. The performance metrics Packet delivery ratio, Average End-to-end delay & Jitter and Normalized routing overhead are compared when a varying percentage of nodes drop packets. General Terms MANET Security

[1]  Bruce Christianson,et al.  A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack , 2007, Third International Symposium on Information Assurance and Security.

[2]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[3]  Djamel Djenouri,et al.  Ad Hoc Networks Routing Protocols and Mobility , 2006, Int. Arab J. Inf. Technol..

[4]  Ozan K. Tonguz,et al.  Ad Hoc Wireless Networks , 2005 .

[5]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[6]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[7]  V. Rhymend Uthariaraj,et al.  Scenario based evaluation of the impact of misbehaving nodes in Mobile Ad hoc Networks , 2009, 2009 First International Conference on Advanced Computing.

[8]  A. Bouabdallah,et al.  A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[9]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[10]  Pietro Michiardi,et al.  Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .

[11]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[12]  C. V. Raman,et al.  Performance analysis of Dynamic MANET On- demand (DYMO) Routing protocol , 2010 .

[13]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.