Analysis of AODV and OLSR Routing Protocols under Wormhole Attack

Main Article Content

Neeraj Sharma

Abstract

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network Mobile Ad hoc Networks (MANETs) work without any fixed infrastructure and each node in the network behaves as a router in order to transmit data towards the destination. The characteristics of MANET are both challenges and opportunities in achieving security models, such as confidentiality, integrity, authentication, availability, non-repudiation and access control. Wormhole attack is one of the most severe routing attacks, which is easy to implement but hard to detect.In this. The paper we study the effects of Wormhole attack on MANET using both OLSR and AODV. The Mobility Models used are Random Waypoint mobility model and Gauss-Markov Mobility Model. The purpose of this study is to find which protocol is more vulnerable to the wormhole attack. The NS2 simulation results show the throughput, packet delivery ratio, AVG. End to End Delay, Packet Loss received with and without Wormhole Attack.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

M. Enshaei and Z. B. Hanapi, “A review on wormhole attacks in Manet,†J. Theor. Appl. Inf. Technol., vol. 79, no. 1, pp. 7–21, 2015.

P. North, M. Arena, and P. Area, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET,†2016, pp. 1–6.

G. Garg, S. Kaushal, and A. Sharma, “Reactive protocols analysis with wormhole attack in ad-hoc networks,†in 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014, 2014, pp. 7–13.

P. Nagrath and B. Gupta, “Wormhole attacks in wireless Adhoc networks and their counter measurements: A survey,†ICECT 2011 - 2011 3rd Int. Conf. Electron. Comput. Technol., vol. 6, pp. 245–250, 2011.

Z. Tun and A. H. Maw, “Wormhole Attack Detection in Wireless Sensor Networks,†2008, pp. 545–550.

M. Su, “WARP : A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,†Comput. Secur., vol. 29, no. 2, pp. 208–224, 2010.

C. Gupta and P. Pathak, “Movement based or neighbor based tehnique for preventing wormhole attack in MANET,†2016 Symp. Colossal Data Anal. Networking, CDAN 2016, pp. 1–5, 2016.

M. Salehi, A. Boukerche, and A. Darehshoorzadeh, “Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks,†Ad Hoc Networks, vol. 50, pp. 88–101, 2016.

H. Moudni, M. Er-Rouidi, H. Mouncif, and B. El Hadadi, “Performance analysis of AODV routing protocol in MANET under the influence of routing attacks,†in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016, pp. 536–542.

M. Sharma, A. Jain, and S. Shah, “Wormhole attack in mobile ad-hoc networks,†2016 Symp. Colossal Data Anal. Networking, CDAN 2016, pp. 1–4, 2016.

M. Sadeghi and S. Yahya, “Analysis of Wormhole attack on MANETs using different MANET routing protocols,†ICUFN 2012 - 4th Int. Conf. Ubiquitous Futur. Networks, Final Progr., pp. 301–305, 2012.

G. Kaur and A. Kaur, “Performance Analysis of AODV for Wormhole Attack Using Different Mobility Models,†2014, pp. 69–72.