ijtc201512001-identifying and evaluating jelly fish attack using aodv protocol

7
INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015. 93 IDENTIFYING AND EVALUATING JELLY FISH ATTACK USING AODV PROTOCOL Kulbir Singh a , , Jyoti Arora b a M.Tech Student, CSE Department , DBU, Manigobindgarh b Assistant Professor, CSE, DBU, Manigobindgarh ABSTRACT Routing is a process of exchanging information from one station to other stations of the network. The characteristics of self-organization and wireless medium make Mobile Ad hoc Network (MANET) easy to set up and thus attractive to users. The open and dynamic operational environment of MANET makes it vulnerable to various network attacks. A common type of attacks targets at the underlying routing protocols. Jelly Fish Attack has opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. Keywords: AODV, Jelly Fish attack, Network Layer, MAC, Physical Layer. I. INTRODUCTION A Mobile Ad-hoc Network (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be mobile. They provide robust communication in a variety of hostile environment, such as communication for the military or in disaster recovery situation when all infrastructures are down. A very important and necessary issue for mobile ad hoc networks is to finding the root between source and destination that is a major technical challenge due to the dynamic topology of the network. Routing protocols for MANETs could be differ depending on the application and network architecture. The efficiency of the wireless link can be increase by Multicasting through sending single copy of messages to all group members. Multicast transmission is a more effective mechanism when compared to unicasting in supporting group communication applications. There are various routing protocols that have been proposed for MANETs. In this paper, we present AODV based routing protocols that works on unicast or multicast routing schema. IJTC.ORG

Upload: international-journal-of-technology-and-computing-ijtc

Post on 10-Jul-2016

7 views

Category:

Documents


0 download

DESCRIPTION

MANET is a self-organized and self-configurable network, where the mobile nodes move arbitrarily. The mobile nodes could receive and forward packets as a router or gateway. This paper is analysis the performance of the protocols like AODV, DSR and OLSR protocols. We compared three routing protocols i.e. AODV, DSR and OLSR. Our simulation tool will be OPNET modeler. The performance of these routing protocols is analyzed by three metrics: delay, network load and throughput. All the three routing protocols are explained in a deep way with metrics and OLSR protocol is among the best out of said protocols. The OLSR protocol is a variation version of the traditional link state protocol. An important aspect of OLSR is the introduction of multipoint relays (MPRs) to reduce the flooding of messages carrying the complete link-state information of the node and the size of link-state updates.

TRANSCRIPT

Page 1: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

93

IDENTIFYING AND EVALUATING JELLY FISH ATTACK

USING AODV PROTOCOL

Kulbir Singh a, ∗, Jyoti Arorab

aM.Tech Student, CSE Department , DBU, Manigobindgarh

bAssistant Professor, CSE, DBU, Manigobindgarh

ABSTRACT

Routing is a process of exchanging information from one station to other stations of the network. The

characteristics of self-organization and wireless medium make Mobile Ad hoc Network (MANET) easy to set

up and thus attractive to users. The open and dynamic operational environment of MANET makes it vulnerable

to various network attacks. A common type of attacks targets at the underlying routing protocols. Jelly Fish

Attack has opportunities to modify or discard routing information or advertise fake routes to attract user data to

go through themselves.

Keywords: AODV, Jelly Fish attack, Network Layer, MAC, Physical Layer.

I. INTRODUCTION

A Mobile Ad-hoc Network (MANET) is a self-configuring network composed of mobile

nodes without any fixed infrastructure. In a MANETs, there are no difference between a host

node and a router so that all nodes can be source as well as forwarders of traffic. Moreover,

all MANET components can be mobile. They provide robust communication in a variety of

hostile environment, such as communication for the military or in disaster recovery situation

when all infrastructures are down. A very important and necessary issue for mobile ad hoc

networks is to finding the root between source and destination that is a major technical

challenge due to the dynamic topology of the network. Routing protocols for MANETs could

be differ depending on the application and network architecture. The efficiency of the

wireless link can be increase by Multicasting through sending single copy of messages to all

group members. Multicast transmission is a more effective mechanism when compared to

unicasting in supporting group communication applications. There are various routing

protocols that have been proposed for MANETs. In this paper, we present AODV based

routing protocols that works on unicast or multicast routing schema.

IJTC.O

RG

Page 2: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

94

Fig. 1: Infrastructure Ad Hoc Networks

II. CLASSIFICATION OF ATTACKS

Mobile Ad Hoc Networks form a network cloud of clients and routers. The routers can be

either fixed in their location providing high speed routing functionality to clients and

connecting them to internet via gateway routers (Fixed Infrastructure or centralized topology)

or behave as both client and router (Dynamic Network topology). The network can be

attacked in any of the layers by jamming the signals in physical layer, misusing the protocol

in MAC layer, misrouting the packets in network layer or physically tampering the devices.

Various attacks are being shown in the Table 1.1 below:

Table 1.1: Attack Classifications

Layer Attacks

Routing Layer Jelly Fish Attack, Black Hole, Grey

Hole Attack, Sybil Attack

MAC Layer Selfish , MAC Misbehavior

Physical Layer Jamming ,Scrambling

III. RELATED WORK

Aad, Hubaux and Knightly et.al.[1] in 2008 discovered that mobile ad hoc network

suffered from number of security issues i.e. an attack that degrades the performance of

mobile ad hoc network. There are number of attacks discovered and they are categorized as

IJTC.O

RG

Page 3: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

95

active as well as passive attacks, and also categorized as layered attacks. One of them was

jelly fish attack. There is a jelly fish attacker node which first needs to intrude into multicast

forwarding group. It then delays data packets unnecessarily for some amount of time before

forwarding them. This results in significantly high end-to-end delay and thus degrades the

performance of real time applications. It affects the packet end-to-end delay and the delay

jitter, but not the packet delivery ratio or the throughput.

M.Ramakrishan and S.Shanmugavel et.al.[27] in 2008, aimed on the study of various

routing techniques for MANET nodes to obtain the routing through which data is to be

transferred to the destination with maximum throughput. The first technique, to study and

implement the changeover routing protocols from DSR to AODV using Glomosim

simulator. In the second routing technique, the self-healing routing methodology for ad hoc

on demand routing protocol with shortest path using Glomosim.

V. Singla, R. Singla and A. Kumar et.al.[31] in 2009, comparison the routing protocols i.e.

AODV, TORA, OLSR and DSR by using metrics such as network load, throughput and

delay. TORA shows good performance in terms of transmission of packets. AODV show

better performance for throughput and DSR shows an average level of performance. Highest

amount of traffic is sent by OLSR.

I.Raza and S.A Hussain et.al.[29] in 2010, how to counter misinterpretation packet

reordering with packet loss when retransmissions are due to persistent packet reordering by

malicious nodes rather than packet loss due to traditional reasons. They concluded that the

performance of TCP variants differs in AODV and DSR network under packet reordering

attack (persistent packet).

G.S Bindra, A. Kapoor and A. Aggarwal et.al.[7]in 2012, present a technique to identify

multiple black holes cooperating with each other and a solution to discover a safe route

avoiding cooperative black hole attack. The proposed solution can be applied to identify

multiple black hole nodes and to discover secure path from source to destination.

IV. EXPERIMENTAL SCENARIO

The scenario shown in figure 2 contains 60 wireless mobile nodes of mobile ad-hoc network

built in the OPNET 14.0 Modeler. It contains jellyfish attacker nodes which disrupts the

performance of mobile ad-hoc networks. Here, 25 to 59 are the attacker nodes. So all these

components contribute to form mobile ad-hoc network, and all the components are present in

the object palette (library) of OPNET 14.0 Modeler.

Simulation is to start the network for its working and then we check the performance by

collecting the results. The forwarding rate is taken as 5000 packets per second in Jelly fish

flow and in the normal flow the value for forwarding rate is 500000 packets per second.

IJTC.O

RG

Page 4: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

96

Fig. 2: Experimental Setup

V. ANALYZING RESULTS

I. AODV Protocol (with Normal Flow)

In this scenario, 60 mobile nodes are simulated. The AODV Protocols gives results for four

parameters (Delay, Data dropped, Network load and Throughput) for 60 mobile nodes with

Normal Flow.

Fig. 3: Data dropped in AODV protocol with 60 Nodes

IJTC.O

RG

Page 5: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

97

The first graph gives Data Dropped (Buffer Overflow) which is initially equals to 0.0sec.

After some time data drop rate gradually increased with the elapse of time. Second graph

shows delay/sec. third graph shows the load in bits/sec initially load is 0 (zero) at the end of

simulation the peak value of load is more than 10,00,000 bits/sec. fourth graph shows the

throughput. It increases with the as simulation reaches to its end. Peak value of throughput is

more than 10,000,000 bits/sec.

II. AODV Protocol (with Jelly Fish Flow)

The above figure 4 shows performance of AODV protocol after Jelly Fish attacker nodes are

inserted in the Network. First graph shows data dropped (buffer overflow), initially we

observed no data drop, after few minutes it gradually increased up to 400000 bits\sec. Second

graph shows delay, Maximum value of delay is 40 sec at the end of simulation. Third graph

shows the Load, at 0 sec load was 0 bits/sec. After few minutes of simulation it gradually

increased up to peak value of more than 1,000,000bits/sec. Fourth line graph displays

Throughput of network, initially throughput was 0 bits/sec but after some time its value

become more than 10,000,000bits/sec.

Fig. 4: Data dropped in AODV protocol with 60 Nodes for Jelly Fish Flow

IV. CONCLUSION AND FUTURE WORK

In this thesis, we have implemented Jelly Fish Attack and have also simulated the network

attack models that exploit the weakness of the existing network. The attack models are used

to make jelly fish attacker wireless nodes and create various malicious environments, in

which the performance of network is evaluated. Through the collected evaluation metrics

from the existing and attacking scenarios, the impacts of attack upon the existing network are

IJTC.O

RG

Page 6: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

98

then studied. The mobility model of the malicious nodes affects the number of data packets

to the destinations.

REFERENCES

[1] Aad, I. Hubaux, J.P. and Knightly, E.W. (2008), “Impact of Denial of Service Attacks on Ad Hoc

Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4.

[2]Ahmed, M. Mo’men, A. and Haitham, S.H. (2010), “A Survey on Security Enhanced Multicast Routing

Protocols in Mobile Ad Hoc Networks”, IEEE.

[3] Ali, S. Omari, K.A. and Sumari, P. (2010), “An overview of mobile ad-hoc networks for the existing

protocols and applications”, Journal on Applications of Graph Theory in Wireless Ad-hoc networks and Sensor

Networks”, Vol.2, No.1.

[4] Amandeep kaur and Deepinder Singh Wadhwa, “ Effects of Jelly Fish attack on Mobile Adhoc

Network’s Routing Protocol”, International journal of Engineering Research and Application, vol 3, Issue 5

Sep-Oct2013.

[5] Ashok Desai, “Review Paper on deection and prevention techniques of gray hole attack in MANET”,

IJCSMC, Vol 2 May 2013.

[6] Bilandi, N. and Verma,H.K., “ Comparative analysis of reactive, proactive and Hybrid routing protocols in

MANET” , IJECSE.

[7] Bindra, G.S. Kapoor, A. Narang, A. and Aggarwal, A. (2012), “Detection and Removal of Co-operative

Black hole and Gray hole Attacks in MANETs”, International Conference on System Engineering and

Technology, Bandung, Indonesia.

[8] Diya Naresh Vadhwani, Deepak kulhare, Megha Singh, “Behaviour Analysis of DSR MANET Protocol with

HTTP Traffic Using OPNET” , International Journal of innovative Research in Computer and Communication

Engineering.

[9] Ekta Barkhodia; Parulpreet Singh; Gurleen Kaur Walia, “Performance analysis of AODV Using HTTP

traffic under Black Hole attack in MANET”. CSEIJ,Vol 2 june 2012.

[10] Ekta Nehra, Er. Jasvir singh, “Performance Comparison of AODV, TODV, OLSR, ABR Using OPNET”,

International Journal of Advanced Research in Computer Science and Software engineering, Vol 3, Issue 5,

May 2013.

[11] Gowda, S.R. and Hiremath, P.S. (2013), “Review of Security Approaches in Routing Protocol in Mobile

Ad-hoc Network”, International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2.

[12] Harmanpreet kaur, Er. Jaswinder Singh, “Performance comparison of OLSR, GRP, and TORA Using

OPNET”, International Journal of Advanced Research in Computer Science and Software engineering, Vol 2,

Issue 10, Oct-2012.

[13] Hoebeke, J. Moerman, I. Dhoedt, B. and Demeester, P., “An overview of Mobile Ad-hoc Network:

Applications and Challenges”, Department of Information Technology, Ghent University- IMEC V2W, Sint

Pietersnienw straat 41, B-9000 Ghent Belgium.

[14] Jain, A.K. and Tokekar, V. (2010), “Classification of Denial of Service Attacks in Mobile Ad Hoc

Networks”, International Conference on Computational Intelligence and Communication Systems, IEEE.

[15] Jasjeet Singh, Er.Sukhjit Singh, “Performance Analysis of variable bit rate for MANET protocols with

Video and Audio codec”, IJAIR, ISSN 2278-7844.

IJTC.O

RG

Page 7: IJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocol

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 3, DECEMBER 2015.

99

[16] Johansson, P. Larsson, T. and Hedman, N. (1999), “Scenario based performance analysis of routing

protocols for Mobile a-hoc network”, Mobicom ‘99 Scattle Washington USA.

[17] Jawandhiya, P.M. Ghonge, M.M. Ali, M.S. and Deshpande, J.S. (2010), “A Survey of Mobile Ad Hoc

Network Attacks”, International Journal of Engineering Science and Technology, Vol. 2(9).

[18] Khirasariya, H.R.(2013), “ Simulation study of jellyfish attack in MANET using AODV routing protocol” ,

Journal of Information, Knowledge and Research in computer Engineering, Volume-02.

[19] Kuldeep Vats, Mandeep Dalal, Deepak Rohila, Vikas loura, “ OPNET Based Simulation and

Performance Analysis of GRP Routing Protocol” , IJARCSSE, Vol 2, Issue 3, Mar-2012.

[20] Kumar, G. Saha, R. and Rai, M.K., “DSAB- A hybrid approach for providing security in MANET”,

International Journal of Information and Security Science, Vol.1, No.3.

[21] Mr.Hepikumar R. Khirasariya, “Simulation Study of Jelly Fish attack in MANET using AODV Protocol”,

Journal of Information, Knowledge and Research in Computer Engineering.

[22] Mohammad Wajid, Vipin Kumar and R H Goudar , “Comparative Performance of analysis of Routing

protocols in Mobile Ad-hoc Networks under Jelly Fish Attack”, IEEE International Conference on Parallel,

Distributed and Grid Computing.

[23] Osamah Yaseen Fadhil, “Performance Evaluation of AODV and DSR routing protocols with PCM and

GSM Voice encoding Schemes”, IJCSMC, Vol 2, Issue 9, Sep. 2013.

[24] Papadimitratos, P. and Haas, Z.J. (2002), “Security routing for mobile ad-hoc networks”, proceedings of

CNDS 2002, San Antonio, TX.

[25] Park, V.D. Corson, M.S., “A highly Adaptive Distributed Routing Algorithm for Mobile Wireless

Networks” Sixteenth Annual Joint Conf. of the IEEE Comp. and Comm. Societies. Proc., vol.3 pages 1405–

1413, 1997.

[26] Patel, H.P. and Chaudhari, M.B. (2012), “ Impact Of Jellyfish On Wireless Ad-Hoc Network”, IJERT,

VOL.1.

[27] Ramakrishnan, M. and Shanmugavel, S. (2008), “New Approaches to Routing Techniques of MANET

Node for Optimal Network Performance”, IJCSNS, VOL.8 No.11.

[28] Ramanathan, R. and Redi, J. (2012), “A brief overview of Ad-hoc networks: Challenges and directions”,

IEEE Communications magazine, 50th anniversary.

[29] Raza, I. Hussain, S.A. Ali, A. and Raza, M.H. (2010), “Persistent packet reordering attack in TCP based

Ad hoc networks”, IEEE.

[30] Singh, A. and Shaiendra, M. (2010), “ Performance Analysis of Routing Protocol in Mobile Ad hoc

Networks”, IJCSNS VOL.10 No.8.

[31] Singla, V. Singla, R. and kumar, A. (2009), “Performance Evaluation and Simulation MANET routing

protocols”, IJEIT, Volume No. 1.

[32] Wazid, M. Katal, A. and Goudar, R.H. (2012), “Cluster and super cluster based intrusion detection and

prevention techniques for jelly fish reorder attack”, 2nd IEEE International conference on parallel, Distributed

and grid computing.

[33] Wazid, M. Kumar, V. and Goudar,R.H. (2012), “ Comparitive Performance Analysis of routing Protocols

In Mobile Ad Hoc Network under Jelly Fish Attack”, 2nd IEEE International conference on parallel, Distributed

and grid computing

IJTC.O

RG