Secure Routing Protocols Affections On M PDF
Secure Routing Protocols Affections On M PDF
MANETs Performance
Shervin Ehrampoosh and Ali Khayatzadeh Mahani
Abstract— In mobile ad hoc networks, the absence of legitimate users and malicious nodes so various forms of
infrastructure and the consequent absence of authorization attacks such as passive eavesdropping, active signal
facilities impede the usual practice of establishing a practical interference, and jamming could be hampered the network.
criterion to distinguishing nodes as trusted and distrusted. The cooperative nature of Ad Hoc routing protocols makes it
Since all nodes in the MANETs would be used as router during
more vulnerable to data tampering, impersonation, and denial
working period, secure routing protocols have vital rule in the
security of the network. So evaluating the performance metrics
of services (DoS). MANETs architecture causes the
of secure routing protocols and calculating the overhead of inefficiency of some conventional security solutions, such as
security design is very important in network engineering. In a public key infrastructure (PKI), and the intrusion detection
this paper the effects of Black hole attack on two different types system [3]-[4].
of routing, OLSR as proactive routing protocol and AODV as Some of the standard terms about security concepts of
reactive routing protocol are considered. In addition, the networks are message non-repudiation, Isolation and Trust.
performance metrics of ordinary routing protocols (AODV and message non-repudiation means that the sender cannot deny
OLSR) are compared with a new secure routing protocol transmitting a packet. Isolation requires that protocol be able
MAODV, in which neighbors of node help him to distinguish a to identify misbehaving nodes and render them unable to
trusted node. Finally, the simulation results show that the end-
interfere with routing. Alternatively, the routing protocol
to-end delay of a network under black hole attack with
different type of routing protocols, AODV, OLSR and should be designed to be immune to malicious nodes.
MAODV. The simulation results illustrate good comparison of One aspect of mobile ad hoc networks that complicates the
network performance parameters for different conditions such design of a secure routing protocol is in-network aggregation.
as node mobility and number of nodes. In networks that are more conventional a secure routing
protocol is typically only required to guarantee message
availability. Message integrity and confidentiality are handled
Index Terms— Mobile Ad Hoc network (MANET), at a higher layer by an end-to-end security mechanism such as
wireless network, security, OLSR, AODV. SSH or SSL. In an ideal world, we would like to guarantee
the confidentiality, integrity, authenticity and availability of
all messages in the presence of resourceful adversaries. Since
I. INTRODUCTION MANET does not have a centralized piece of machinery such
as a name server, which could lead to a single point of failure
M OBILE Ad Hoc networks (MANET) are self
configuring networks in which mobile devices
connected by wireless links. These networks classify into
and thus make the network that much more vulnerable.
In such an environment, there is no guarantee that a path
infrastructure less networks, where the network between two nodes would be free of malicious nodes that
communication is established without any fixed would not comply with the employed protocol and would
infrastructure, such as battlefields, military applications and attempt to harm the network operation. The mechanisms
other emergency disaster situations. Obviously, security is a currently incorporated in routing protocols cannot cope with
critical issue in such areas [1]-[2]. Network architecture, disruptions due to malicious behavior. For example, any node
shared wireless medium, resource constraints, and highly could claim that it is one hop away from the sought
dynamic topology, lead to various challenges of the security destination, causing all routes to the destination to pass
design. Since the wireless channel is accessible to both through itself. Constructing security for the first time may not
be so difficult, maintaining trust and handling dynamic
changes seem to need more effort. So many routing protocols
in mobile ad hoc network to guarantee the security of network
increase the control packets [12]-[23]. Hence, the overhead of
Shervin Ehrampoosh is an M.Sc. student at Faculty of Electrical and
Computer Engineering, Kerman Graduate University of Technology packet transmission, and the end-to-end delay would be
(KGUT), Kerman, Iran (e-mail: [email protected]). increased.
Ali Khayatzadeh Mahani is with the Department of Electrical In this paper the performance metrics of routing protocols
Engineering, Shahid Bahonar University of Kerman, Kerman, Iran. are simulated. The results are depicted for different protocols
(e-mail: [email protected])
77
and finally a secure protocol is compared with AODV and
OLSR. The rest of the paper is organized as follows. In
Section II, routing protocols are reviewed. The effects of
black hole attack in AODV, OLSR, and new approach called
MAODV are discussed in section III. Simulation results of
performance metrics are described in section IV and the
paper is concluded in section V.
The routing protocols of ad hoc networks are classified Fig.2 Route Error Message in AODV
into two main categories, proactive and reactive. In a
proactive (sometimes-referred to as table-driven) routing B. OLSR protocol
protocol, nodes periodically exchange routing information OSLR protocol is a proactive protocol used in mobile ad-
with other nodes to update their routing information. The hoc networks. It is often called table-driven protocol as it
Optimized Link State Routing (OLSR) [8] protocol is a well- maintains and updates its routing table frequently. OLSR has
known proactive routing protocol. In a reactive (sometimes- also three types of control messages that are describe bellow.
referred to as source-initiated) protocol, a route from source
to destination would be established only when the source 1) Hello
node has a packet to send to the destination [5]. Dynamic 2) Topology Control (TC)
Source Routing (DSR) [6] and Ad Hoc On-Demand 3) Multiple Interface Declaration (MID)
Distance Vector (AODV) [7] are two important examples of
reactive routing protocols. Nevertheless, unfortunately there Hello message is transmitted for sensing the neighbor and
is no common standard routing protocol in MANETs. multi-point distribution relays (MPR) calculation. Topology
control is link state signaling that is performed by OLSR.
A. AODV Protocol MPRs are used to optimize theses messaging. MID messages
contains the list of all IP addresses used by any node in the
When a node “A” as a source node try to initiates a network. All the nodes running OLSR transmit these
connection to destination node “D”, it will generate a route messages on more than one interface.
request message (RREQ). This message is transmitted OLSR exchanges the topology information always with
through a limited flooding to their neighbors. In the second other nodes. Few nodes are selected as MPRs (Multi point
hop the message is forwarded to the neighbors of neighbors relays). MPRs are responsible for transmission of broadcast
and would be continued till to finding destination node or messages during flooding and generating link state
finding a node that has a fresh route to the destination. Then information. MPRs technique used in OLSR protocol will
a new control message, route reply message (RREP), is reduce the message overhead and even minimize the number
replied to the source node. When RREP reaches the source of control messages flooded in the network (Fig 3).
node, a route is established between the source node “A” and Nodes maintain the information of neighbors and MPR's,
destination node “D”. Once the route is established between by sending and receiving HELLO messages from its
“A” and “D”, the communication would be started. Fig. 1 neighbors. This will help in determining the link formation
depicts the exchange of control messages between source illustrated in Fig 4.
node and destination node.
1) Node X transmits the HELLO message to node Z and then the
message received by node Z from node X that can be called
asymmetric link.
2) Even if The node Z transmits the HELLO message to node X
then the resulting link retransmits this HELLO message called
asymmetric link.
3) Finally, the resulted bidirectional link is known as a symmetric
link.
4) Symmetric link formation will help the nodes to choose MPRs.
5) MPRs will send the topology control (TC) messages
containing the information about link status and MRP node
information [9].
Fig. 1 AODV Route Discovery
If the route between source and destination is broke, the
RERR message is sent to the source and destination nodes
separately. The scheme of sending RERR message in a
network s shown in the Fig. 2.
78
Fig.3 Flooding Packets Using MPR Fig.5 Security Threats
In Fig 6, source node S wants to send data packets to a
destination node D in the network. Node M is a malicious
node that acts as a black hole. The attacker replies with false
reply RREP having higher modified sequence number. So
data communication initiates from S towards M instead of D.
In OLSR black hole attack, a malicious node forcefully
selects itself as MPR. Malicious node keep its willingness
field to Will always constantly in its HELLO message.
Therefore, in this case, neighbors of malicious node will
Fig.4 OLSR Symmetric link formation (Hello Message Exchange)
always select it as MPR. Hence, the malicious node earns a
privileged position in the network that it exploits to carry out
III. SECURE ROUTING PROTOCOLS
the denial of service attack. The effect of this attack is much
harmful when more than one malicious node is present near
As mentioned above MANETs often suffer from security
the sender and destination nodes.
attacks because of their specification such as open medium,
dynamic topology, lack of central monitoring and
management, cooperative algorithms and no clear defense
mechanism. These factors have changed the battlefield
situation for the MANET against the security threats [10].
The attacks could be classified based on:
80
Figure 9(a) and 9(b) depict that as the traffic load is
increased, the PDR (Packet Delivery Ratio) of MAODV
increases by approximately 40% than AODV under attack.
TABLE III
SIMULATION PARAMETERS
Parameter Value
Simulator OPNET 14.5
Routing Protocol AODV, OLSR and MAODV
Simulation Time (sec) 1000
Number of Nodes 20-80
Simulation Area (m × m) 1000 × 1000
Packet Size (bit) Exponential(1024)
Minimum Mobility (m/s) 10
Maximum Mobility (m/s) 60
Transmission Range (m) 250
Traffic Model TCP
MAC Protocol IEEE 802.11
Packet Size (bit) 1024
Mobility Model Random Way Point (RWP)
Pause Time in RWP (sec) 50
Message TTL (sec) 100
Data Rate (Mbs) 11
Transmit Power (mW) 5 Fig.9 Influence of Traffic Load on the performance
No. of Malicious Node 5
No. of Source Node 1-6 V. CONCLUSION
In this paper the effects of Black hole attack in MANET
using both Proactive routing protocol Reactive routing
protocol such as OLSR and AODV are considered. The
impact of Black Hole attack on the performance of MANET
is illustrated finding out which protocol is more resilience
against packet delivery ration, mobility and end-to-end delay.
Additionally, a secure routing protocol, which is proposed in
81
[17], is considered and the impacts of security design on the [14] M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole
network performance metrics are simulated. As we expect Attack in Mobile Ad-Hoc Networks.”, ACM Southeast
the Simulation results show that the secure protocol has Regional Conf. 2004.
more end-to-end delay comparing with the AODV and [15] G. A. Pegueno and J. R. Rivera, “Extension to MAC
802.11 for performance Improvement in MANET.”,
OLSR, but it provides better performance in terms of packet Master Thesis at Karlstads University, Sweden, December
delivery ratio than the conventional routing protocols in 2006.
presence of Black holes attack. In the Future works we will [16] S. Kurosawa et al., “Detecting Black hole Attack on
concentrate on the secure routing design with better resilience AODV-Based Mobile Ad-Hoc Networks by Dynamic”,
against mobility. IEEE Military Communications Conference, Vol. 2,
page(s):1054-1059, Oct 2003.
[17] Mehdi Medadian, M.H. Yektaie, A.M Rahmani, “Combat
REFERENCES with Black hole attack in AODV routing protocol in
[1] Todd R. Andel, Alec Yasinsac, “Surveying Security MANET ”, First Asian Himalayas International
Analysis Techniques in MANET Routing Protocols”, Conference on Internet, page(s) 1-5, 3-5 Nov. 2009 .
IEEE Communications Surveys, 4th Quarter, No.4, 2007. [18] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks”,
[2] N.H Saeed, M.F Abbod, H.S Al-Raweshidy, “Modeling IEEE Network Journal, No. 6, page(s):24–30, 1999.
MANET Utilizing Artificial intelligence”, Second [19] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens,
UKSIM European Symposium on Computer Modeling “An On-demand Secure Routing Protocol Resilient to
and Simulation, EMS '08, Page(s):117–122, 8–10 Sept. Byzantine Failures”, Proceedings of the ACM Workshop
2008. on Wireless Security, page(s):21–30, 2002.
[3] Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A [20] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: a secure on-
Defense Against Wormhole Attacks in Wireless Ad Hoc demand routing protocol for ad hoc networks”, Proc. of 8th
Networks”, Proc. of IEEE INFOCOM, 2002. ACM Mobile Computing and Networking (MobiCom’02),
[4] A. Menezes, P. Oorschot, and S. Vanstone, “Handbook of page(s):12–23, 2002.
Applied Cryptography”, CRC Press, 1996. [21] Z. Haas and M. Pearlman, “The Performance of Query
[5] A. Kush, C.J Hwang, “Proposed Protocol for Secured Control Scheme for The Zone Routing Protocol”,
Routing in Ad Hoc Networks”, International Association ACM/IEEE Transactions on Networking, pages:427–438,
of Computer Science and Information Technology Spring August 2001.
Conference, IACSITSC '09, Page(s):76–81, April 2009. [22] Yang Xiao, Xuemin Shen and Ding-Zhu Du, “Wireless
[6] M. Bouhorma, H. Bentaouit, A. Boudhir, “Performance Network Security.”, Springer, 2007.
comparison of ad-hoc routing protocols AODV and [23] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M.
DSR.”, International Conference on Multimedia Belding Royer, “Secure routing protocol for Ad Hoc
Computing and Systems, 2009. ICMCS '09, Page(s):511– networks”,10th IEEE International Conference on
514, April 2009. Network Protocols, Dept. of Computer Sciences,
[7] Y. Hu, A. Perrig, and D. Johnson, Ariadne, “A Secure On- California University, Santa Barbara, CA, USA.
Demand Routing for Ad Hoc Networks.”, Proc. of Page(s):78-87, 2002.
MobiCom 2002, Atlanta, 2002.
[8] Zhan Huawei, Zhou Yun, “Comparison and Analysis
AODV and OLSR Routing Protocols in Ad Hoc
Network”, 4th International Conference on Wireless
Communications, Networking and Mobile computing
2008, WiCOM '08, Page(s):1 – 4, 12-14 Oct. 2008.
[9] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, L. Viennot, “ Optimized Link State Routing
Protocol”, IEEE INMIC Pakistan 2001.
[10] Irshad Ullah, Shoaib Ur, “Analysis of Black Hole Attack
on MANETs Using Different MANET Routing
Protocols.”, Master Thesis at School of Computing,
Blekinge Institute of Technology, 2009.
[11] Dokurer, Semih. “Simulation of Black hole Attack in
Wireless Ad-hoc Networks.”, Master's thesis, Atılım
University, September 2006.
[12] H. Deng, W. Li, D.P. Agrawal, “Routing security in
wireless Ad-Hoc networks” Cincinnati University, Ohio,
USA, IEEE Communications Magazine, Vol.40,
page(s):70-75, Oct. 2002.
[13] S. Lu, L. Li, K.Y. Lam, L. Jia, “SAODV: A MANET
Routing Protocol that can Withstand Black Hole Attack",
International Conference on Computational Intelligence
and Security, 2009.
82