Abstract
A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a part of any network at any time that’s why it is susceptible to different types of attacks. Wormhole attack is most threatening security attack in ad hoc network where an attacker node receives packet at one location and replay them at other location which is remotely located far. In this paper, we study and compare the performance of AODV, DSR and ZRP under the impact of multiple wormhole attacker nodes. Diverse scenarios are characterized as like average of 50 runs and mobility. By statistical placement of multiple wormhole nodes across the network, we evaluate the performance in terms of throughput, packet delivery ratio, packet loss, average end to end delay and jitter. Finally based on the simulation we investigated the most affected routing protocol in terms of network metrics.
Similar content being viewed by others
References
Ho, Yao H., Ho, Ai H., & Hua, Kien A. (2008). Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. Computer Communications, 31(12), 2767–2780.
Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. IEEE Communications Magazine, 40(5), 20–22.
Bansal, M., Rajput, R., & Gupta, G. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society.
Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55.
Giordano, S. (2002). Mobile ad hoc networks, In Handbook of wireless networks and mobile computing (pp. 325–346).
Nguyen, Hoang Lan, & Nguyen, Uyen Trang. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.
Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.
Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.
Sesay, S., Yang, Z., & He, J. (2004). A survey on mobile ad hoc wireless network. Information Technology Journal, 3(2), 168–175.
Das, Samir R., Castañeda, Robert, & Yan, Jiangtao. (2000). Simulation-based performance evaluation of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 5(3), 179–189.
Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. Communications Surveys & Tutorials, IEEE, 10(4), 78–93.
Mahajan, V., Natu, M., & Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANET. In MILCOM 2008-2008 IEEE Military Communications Conference. IEEE.
Awerbuch B., et al. (2004) Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, p. 16.
Arora, M., Challa, R. K., & Bansal, D. (2010). Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In Second International Conference on Computer and Network Technology (pp. 102–104). IEEE.
Garg, G., Kaushal, S., & Sharma, A. (2014, July). Reactive protocols analysis with wormhole attack in ad-hoc networks. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1–7). IEEE.
Sanaei, M. G., Isnin, I. F., & Bakhtiari, M. (2013). Performance evaluation of routing protocol on AODV and DSR under wormhole attack. International Journal of Computer Networks and Communications Security, 1.
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of impact of wormhole attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
Dong, D., Li, M., Liu, Y., Li, X. Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking (TON), 19(6), 1787–1796.
Hu, Y-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies (Vol. 3). IEEE.
Poovendran, Radha, & Lazos, Loukas. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.
Chiu, H. S., & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International Symposium on Wireless Pervasive Computing (pp. 6-pp). IEEE.
Xu, Y., et al. (2007) Detecting wormhole attacks in wireless sensor networks. In International Conference on Critical Infrastructure Protection. Springer US.
Mbarushimana, C., & Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In AINAW’07 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, (Vol. 2). IEEE.
Saeed, N. H., Abbod, M. F., & Al-Raweshidy, H. S. (2012). MANET routing protocols taxonomy. In 2012 International Conference on Future Communication Networks (ICFCN), (pp. 123–128). IEEE.
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561).
Chaurasia, U. K., & Singh, V. (2013). MAODV: Modified wormhole detection AODV protocol. In 2013 Sixth International Conference on Contemporary Computing (IC3), (pp. 239–243). IEEE.
Kim, Seongkwan, et al. (2011). Comparative analysis of link quality metrics and routing protocols for optimal route construction in wireless mesh networks. Ad Hoc Networks, 9(7), 1343–1358.
Johnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks. Draft-ietf-manet-dsr-09. Txt.
Chen, L., Yang R., & Huang, M. (2016). Ad hoc high-dynamic routing protocol simulation and research. In Wireless Communications, Networking and Applications (pp. 399–408). Springer India.
Boukerche, Azzedine. (2004). Performance evaluation of routing protocols for ad hoc wireless networks. Mobile Networks and Applications, 9(4), 333–342.
Haas, Z. J., & Pearlman, M. R. (1997). The zone routing Protocol (ZRP) for ad hoc networks, IETF Internet Draft http://www.ietf.org/internetdrafts/ draft-ietf-manetzone-zrp- 00.txt.
Beijar, N. (2002). Zone routing protocol (ZRP) (pp. 1–12). Espoo: Networking Laboratory, Helsinki University of Technology.
Sharma, D., Kumar, V., & Kumar, R. (2016). Prevention of wormhole attack using identity based signature scheme in MANET, In Computational Intelligence in Data Mining—Volume 2 (pp. 475–485), Springer India.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370–380.
Maulik, R., & Chaki, N. (2010). A comprehensive review on wormhole attacks in MANET. In International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE.
Kaur, G., Jain, V. K., & Chaba, Y. (2011). Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Ad hoc networks. In World Congress on Information and Communication Technologies.
Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M. K., Li, X., & Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PloS one, 10(1), e0115324.
Mohapatra, S., & Kanungo, P. (2012). Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 simulator. Procedia Engineering, 30, 69–76.
Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in Manet: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.
Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2. Berlin: Springer.
Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2002). Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, ACM.
Kumar, J., Singh, A., Panda, M. K., & Bhadauria, H. S. (2016). Study and performance analysis of routing protocol based on CBR. Procedia Computer Science, 85, 23–30.
Acknowledgements
The authors are thankful to the Department of RIC, I.K.G. Punjab Technical University, Kapurthala, Punjab, India and providing me opportunity to carry out my research work.
Conflict of Interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kaur, P., Kaur, D. & Mahajan, R. Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet. Wireless Pers Commun 96, 47–63 (2017). https://doi.org/10.1007/s11277-017-4150-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4150-2