61 research outputs found

    Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency

    Get PDF
    The Ad hoc on-demand multipath distance vector (AOMDV) routing protocol is one type of reactive routing protocol used in MANET. It is designed on top of the AODV routing protocol, so it utilizes the features of the AODV protocol. The MANET is a wireless ad hoc network without any physical infrastructure; all nodes can be moved across the network, and connections are made between them as needed simply with the help of RREQ, RREP, and RERR packets. Because the network is dynamic, nodes can quickly join and depart anytime. So far, no security threats have been caused by this feature. The blackhole attack is one type of active and dangerous attack in MANET. In this attack, the attackers use the AOMDV flaw to demonstrate their bad intent, causing data loss and decreasing network performance. Many studies have been done on various detection and prevention methods to prevent blackhole attacks. But it still goes on. To improve network performance against black hole attacks, this study offers a dynamic threshold value with multiple paths technique approach on AOMDV; it will be demonstrated in Network Simulator 2

    Performance Evaluation of Routing Protocols for Vehicle Re-Routing in ITS-based Vehicular Networks

    Get PDF
    This study aims to assess the performance of routing protocols in Intelligent Transportation System (ITS)-based vehicular networks, specifically in accident and highway scenarios. The effective management of traffic flow in these situations is crucial for ensuring the safety and smooth operation of vehicular networks. Therefore, it is imperative to evaluate routing protocols to identify the most suitable one for these scenarios. The evaluation considers various commonly used routing protocols in vehicular networks, including Ad hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), and Destination-Sequenced Distance Vector (DSDV). The evaluation is based on several performance metrics, such as packet delivery ratio, end-to-end delay, network throughput, normalized routing load, and routing overhead. These metrics provide insights into the effectiveness and efficiency of the routing protocols in handling re-routing in accident and highway scenarios. The research is divided into two modules, Module I and Module II, to evaluate the effectiveness of routing protocols in these distinct scenarios using the NS2 simulation tool. The simulation results are analyzed and compared to determine the performance of the routing protocols in each module. The findings indicate that AODV consistently achieves the highest throughput, packet delivery ratio, and lowest end-to-end delay, routing overhead, and normalized routing load, followed by AOMDV and then DSDV. The findings of this study contribute to the understanding of the strengths and weaknesses of different routing protocols in accident and highway scenarios. This knowledge can assist in the development of more efficient and reliable routing protocols for vehicular networks

    The Modified Secure AODV Routing Protocol for Black Hole Attack in Manet

    Get PDF
    Mobile Adhoc Network is gathering of portable nodes which are actively structuring a momentary network without utilizing any pre accessible network infrastructure or central management. Each node in MANET not only provides as a specific terminal but also performs as a router to form a route. While a source node plans to send data to an intended node, packets are moved from the middle nodes. An Adhoc routing protocol is a classical method that supervises how nodes opt any route and in which manner they have to route packets among computing devices in a MANET. Because of different factors with lack of infrastructure, deficiency of already established trust relationship among the various nodes and dynamic topology, the MANET routing protocols are weak to different routing attacks. In contrast to conventional wired networks, such type attacks are executed simply in MANET because of the unsupervised entrance to the wireless medium. The malicious exploitation of various routing information results in the diffusion of wrong routing information which could eventually guide to network failure. One of these attacks in the existing wireless routing protocol like Ad-hoc on demand Distance Vector (AODV) Routing protocol is the Black Hole Attack against network truthfulness. In this attack, the data packets doesn’t arrive at the destination node, thus data loss happens. There is number of detection and protection methods to reduce the intruder that achieve the black hole attack. Therefore, this paper proposes Modified Secure AODV routing protocols (MSAODV) found on threshold evaluation and cryptographic verification. In this paper, the black hole attack and the proposed MSAODV protocols are simulated in the Network Simulator NS-2 under different MANET circumstances and their performances are evaluated on various parameters like Packet drop ratio, routing overload, throughput etc. Keywords: AODV, Black hole, gray hole, worm hole attack, MANET, AOMD

    Securing routing protocols in mobile ad hoc networks

    Get PDF
    A Mobile Ad Hoc Network (MANET) is more prone to security threats than other wired and wireless networks because of the distributed nature of the network. Conventional MANET routing protocols assume that all nodes cooperate without maliciously disrupting the operation of the protocol and do not provide defence against attackers. Blackhole and flooding attacks have a dramatic negative impact while grayhole and selfish attacks have a little negative impact on the performance of MANET routing protocols. Malicious nodes or misbehaviour actions detection in the network is an important task to maintain the proper routing protocol operation. Current solutions cannot guarantee the true classification of nodes because the cooperative nature of the MANETs which leads to false exclusions of innocent nodes and/or good classification of malicious nodes. The thesis introduces a new concept of Self- Protocol Trustiness (SPT) to discover malicious nodes with a very high trustiness ratio of a node classification. Designing and implementing new mechanisms that can resist flooding and blackhole attacks which have high negative impacts on the performance of these reactive protocols is the main objective of the thesis. The design of these mechanisms is based on SPT concept to ensure the high trustiness ratio of node classification. In addition, they neither incorporate the use of cryptographic algorithms nor depend on routing packet formats which make these solutions robust and reliable, and simplify their implementations in different MANET reactive protocols. Anti-Flooding (AF) mechanism is designed to resist flooding attacks which relies on locally applied timers and thresholds to classify nodes as malicious. Although AF mechanism succeeded in discovering malicious nodes within a small time, it has a number of thresholds that enable attacker to subvert the algorithm and cannot guarantee that the excluded nodes are genuine malicious nodes which was the motivation to develop this algorithm. On the other hand, Flooding Attack Resisting Mechanism (FARM) is designed to close the security gaps and overcome the drawbacks of AF mechanism. It succeeded in detecting and excluding more than 80% of flooding nodes within the simulation time with a very high trustiness ratio. Anti-Blackhole (AB) mechanism is designed to resist blackhole attacks and relies on a single threshold. The algorithm guarantees 100% exclusion of blackhole nodes and does not exclude any innocent node that may forward a reply packet. Although AB mechanism succeeded in discovering malicious nodes within a small time, the only suggested threshold enables an attacker to subvert the algorithm which was the motivation to develop it. On the other hand, Blackhole Resisting Mechanism (BRM) has the main advantages of AB mechanism while it is designed to close the security gaps and overcome the drawbacks of AB mechanism. It succeeded in detecting and excluding the vast majority of blackhole nodes within the simulation time

    Simulation based comparison of routing protocols in wireless multihop adhoc networks

    Get PDF
    Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyzed in the presence of varying the number of mobile nodes, pause time, and traffic connection numbers. Moreover, Routing and QoS performance metrics such as normalized routing load, routing packet, packet delivery ratio, packet drop, end-to-end delay, and throughput are measured to conduct a performance comparison between three routing protocols. Simulation results indicate that AODV outperforms the DSDV and AOMDV protocols in most of the metrics. AOMDV is better than DSDV in terms of end-to-end delay. DSDV provides lower throughput performance results. Network topology parameters have a slight impact on AODV Performance

    A Survey of Security Challenges and Issues in Manet

    Get PDF
    Nodes intriguing element in Mobile Ad-hoc Networks (MANET) are predictable to hold to the rules stated by the routing protocol utilized in the network. Safe routing protocols endeavor to decrease the ill-effect of nodes under the control of malicious entities who intentionally violate the protocol.. There are so many generic tools which are universal for individual as well as organizations for customers to offer protection which comprises Antivirus, Ant spam, etc., and network securities have turn into important issue in MANET. Security is one of the major issues in the MANET particularly w.r.t. complexity and size of the network. The main focus of this survey is to discuss & represent special characteristics of security in MANET and also apply several of the solutions security threats within MANET network similar to intruder activities, tapping and integrity, MANET link layer and network layer operations w.r.t. information security etc) w.r.t. MANET network. This Survey paper also discusses different number of security scenarios of MANET, Attacks in MANET and IDS in MANET. Keywords: AODV, MANET, Network Security, IDS, Attack

    Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol

    Get PDF
    Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drop received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multipath routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well-known Ad hoc On-demand multi-path routing protocol (AOMDV). We implement and simulate our proposed technique using the ns 2.35 simulator. We also compared on how the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV), and the proposed solution to counter the Blackhole attack (IDSAOMDV) performs. The results show the degradation on how AOMDV under attack performs, it also presents similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol

    Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET

    Get PDF
    In wireless transmission, a Mobile Ad-hoc Network (MANET) contains many mobile nodes that can communicate without needing base stations. Due to the highly dynamic nature of wireless, MANETs face several issues, like malicious nodes making packet loss, high energy consumption, and security. Key challenges include efficient clustering and routing with optimal energy efficiency for Quality of Service (QoS) performance. To combat these issues, this novel presents Cooperative Self-Scheduling Secure Routing Protocol (CoS3RP) for efficient scheduling for proficient packet transmission in MANET. Initially, we used Elite Sparrow Search Algorithm (ESSA) for identifies the Cluster Head (CH) and form clusters. The Multipath Optimal Distance Selection (MODS) technique is used to find the multiple routes for data transmission. Afterward, the proposed CoS3RP transmits the packets based on each node authentication. The proposed method for evaluating and selecting efficient routing and data transfer paths is implemented using the Network simulator (NS2) tool, and the results are compared with other methods. Furthermore, the proposed well performs in routing performance, security, latency and throughput

    Performance Analysis between OLSR and FSR Protocols under Black Hole Attack Using FPGA

    Get PDF
    Security is an important part of wireless ad hoc network or mobile ad hoc network. A mobile ad hoc network (MANET) is an infrastructure less category of wireless network. Routing protocols in Mobile ad hoc network is divided into three categories, Reactive (also known as on demand) routing protocol, Proactive (also known as table driven) routing protocol and Hybrid protocol. Security is an important part in MANET because when we send data source node to destination node in mobile ad hoc network, we want protection in path between source to destination and complete transfer data packet between source node to destination node. In this research paper we use two proactive routing protocol known as OLSR (Optimized Link state Routing) Protocol and FSR (Fisheye State Routing) Protocol. OLSR is a flat routing and Unipath protocol based on multipoint relay not multipath. FSR is a hierarchical routing and multipath protocol based on multiple paths. In this research work we check the performance of these two protocols under five different performance matrices known as Packet delivery ratio (PDR), Packet loss (PL), Average end to end delay (AEED), Normalized Routing load (NRL) and Throughput on black hole attack. Black hole attack is an active attack, in this attack attacker node absorbs the data packet and give the fake reply. In this research paper we analysis the performance two protocol one is unipath known as OLSR and second is Multipath known as FSR under Black hole Attack. The performance of FSR is better than OLSR, because OLSR is unipath and maximum data packet is absorbs in OLSR single path. FSR is better because FSR is Multipath and minimum data packet is absorbs in FSR multi path
    corecore