Wireless Ad Hoc Network Routing Protocols Performance Evaluation Under Security Attack
Wireless Ad Hoc Network Routing Protocols Performance Evaluation Under Security Attack
Wireless Ad Hoc Network Routing Protocols Performance Evaluation Under Security Attack
https://doi.org/10.22214/ijraset.2023.48677
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Abstract: A mobile ad hoc network is made up of portable wireless nodes (MANET). The communication between these mobile
nodes is not managed centralized. A self-organizing, self-configuring network known as MANET allows mobile nodes to roam
around at whim. The mobile nodes can act as a router by receiving and sending packets. Due to the significance of routing in
MANET, this thesis also evaluates several routing systems' efficacy. We compared the three routing protocols AODV, DSR,
OLSR, and DSDV. Throughput, network load, and latency are the three metrics used to gauge how well-performing different
routing systems are. The three routing techniques are well described using metrics. Information is transmitted end-to-end and
hop-by-hop over the connections to the destination nodes using the proactive and reactive protocols of MANET. In multi-hop
mobile ad hoc networks, energy consumption at the mobile nodes' end and its effective use are crucial factors. Nodes and other
routing resources in MANETs cannot afford to run out of battery power while carrying out mission-critical operations like
military or rescue missions. The effectiveness of MANET protocols such AODV, DSDV, OLSR, and DSR is studied in this study.
Throughput, packet delivery ratio, and energy use are included while computing the Mobile Ad-hoc Networks' performance
parameters. The circumstances that were simulated using various simulators are included in the research. The related research
compared the performance of several protocols in MANETs with varying node mobility, stop length, and node density while
examining the NS-2 scenario. The optimum routing system for mobile ad hoc networks will be identified after a comparison and
analysis of these protocols.
I. INTRODUCTION
In daily communication, wireless networks have remained a key component. It is frequently employed in industrial applications,
personal area networks, and even military applications. Due to its many beneficial characteristics, including as ease of installation,
dependability, cost, bandwidth, total necessary power, security, and network performance, it has become quite popular in a variety
of applications. However, it also utilizes fixed infrastructures, much like wired networks [7], such as cordless phones, cellular
networks, Wi-Fi, microwave communication, Wi-MAX, satellite communication, RADAR, etc.
Due to the large population of independent mobile users, the demand for effective and dynamic communication in
emergency/rescue operations, disaster relief efforts, and military networks, as well as for many applications, next-generation
wireless ad-hoc networks are now widely employed [3], [2]. The network has a wide geographic coverage but has an unstable
topology that can change abruptly..Because they are decentralized, these networks have more network scalability than
infrastructure-based wireless networks. Ad-hoc networks perform better in crucial situations like natural catastrophes and military
conflicts because they require little configuration and operate quickly [8], [4]. Depending on their intended use, ad hoc networks can
be divided into three groups: wireless mesh networks (WMNs), wireless sensor networks, and mobile ad hoc networks (MANETs)
(WSN). A MANET is a mobile node network that operates independently [4].
The typical effects of radio communication channels, many users' interference, multiple paths fading, shadowing, etc. are difficult
for these nodes to handle.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 751
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
It is quite difficult to create the best routing protocol for MANET. In these dynamic situations, it is crucial to develop an effective
algorithm that will aid in determining the connectedness of network organizations, link scheduling, and routing [5]. The accuracy
and success of the route computation determine how effective a routing algorithm is. In static networks, the shortest path algorithm
is often an efficient method for determining the best route, however in a MANET environment, this straightforward notion is not
necessarily true [21]..To choose a new route, several aspects must be taken into account, including extended power [3], wireless link
quality, path losses, fading, interference, and topological changes [21]. To optimize any of these effects, networks should adjust
their routing pathways adaptively based on circumstances at any time [18]. Any of these standards not being met may result in
decreased network reliability and performance in MANETs. To maintain the standard of routing protocols, the Internet Engineering
Task Force (IETF) - MANET working group is regularly developing new protocols. The functions of IP routing protocols that are
appropriate for wireless routing applications in both static and dynamic topologies were specified by the working group [10].
To keep the routes current, these routing pathways are frequently announced inside the network. Destination Sequenced Distance
Vector (DSDV) and Optimized Link State Routing Protocol are protocols that fall within the aforementioned category (OLSR).
Reactive routing protocols set up source-to-destination routing pathways as needed. These routing techniques include Dynamic
Source Routing (DSR) and Ad Hoc On-Demand Distance Vector (AODV).
According to OLSR [3], each node has a routing table that details the routes to every other node in the network. Nodes publish their
routing details, such as address, sequence number, and number of hops, in DSDV [4].
When data transmission is necessary in AODV [5] (RFC: 3561), the source node broadcasts a route request (RREQ) packet to its
neighbors. Unicast Route reply (RREP) is provided to the source if the destination is located. A route error (RERR) packet is
transmitted in the event of a failure to the source node. The reactive subset of routing protocols includes DSR [6]. While DSR
employs a source routing technique where transmitted packets contain the whole path to the destination, it uses an AODV-like route
discovery process. Each node in DSR stores a fresh route it discovers. Route caching speeds up the route search process, however
the performance is also impacted by stale caches.Due to their dynamic topologies, constrained wireless connections, interference
issues, lack of centralized management, and established infrastructure, MANETs are inherently unsafe.
Furthermore, security is frequently not given the proper care while designing MANETs routing protocols. This work offers a
thorough analysis of the performance effects of security attacks on the four well-known MANET routing protocols (OLSR, DSDV,
AODV, and DSR).
II. OBJECTIVES
The objective of this thesis work is:
1) To study proactive and reactive protocols
2) To analyse and compare the performance of both proactive and reactive protocols with and without black hole and grey hole
attack.
3) To implement the scenarios using NS2 simulator.
4) To evaluate the performance in terms of Packet delivery ratio, End to end delay, normalised routing load and normalised
throughput.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 752
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
While TORA utilises a link reversal algorithm and AODV uses a sequence number for each destination, DSR uses the source route
to eliminate loops..The two elements that directly affect the routing efficiency are the routing loop and the preservation of full
reachability [7]. With regard to packet delivery ratio and end-to-end latency in the Random Waypoint mobility model, AODV
protocol outperforms DSDV and TORA. AODV also exhibits higher throughput than DSDV, TORA, and DSR protocols in high
mobile node situations [4]. The performance of the routing protocols OLSR, AODV, DSR, and TORA is examined using OPNET
modeller 14.5 for varied network sizes, node mobility, and traffic loads [5], [11].
IV. METHODOLOGY
A. Routing protocols
For wireless ad hoc networks, there are several varieties of routing protocols. Reactive or proactive routing protocols are the two
categories under which these protocols fall [8]. The ad hoc routing techniques known as hybrid routing protocols provide both
proactive and reactive benefits. Reactive or on-demand routing protocol is the name of the first type of protocol. Routing protocols
that are proactive or table-driven fall under this category. Reactive MANET Protocol is the name of the first type of protocol
(RMP). Only when the source node wants to communicate with the other node can communication take place in these protocols.
Nodes with high levels of mobility or nodes that only sometimes send data are best suited for reactive MANET protocols. We'll take
a look at a few reactive routing techniques.
Proactive MANET Protocol is the name of the sec kind of protocol (PMP). Active network layout detection is done via proactive
routing protocols. Every node can retain a routing table, which can be used to identify a route more quickly. The proactive routing
protocols offer minimal latency for route decision-making and strong dependability on the present network topology [14].
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 753
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Figure 3-4 displays the four nodes A, B, C, and D. Destination node D receives a message from node A. While receiving the ACK
message up to node B, the transmission continues up to node C. If node C sends an RREQ message to node D but does not get an
ACK message back from node D. The node C is aware that the transmission is having an issue. So, the source node A receives an
RRER message from node C. It then looks for a different path to the final target node D. Figure 3-4: MANET's route maintenance
process utilizing DSR
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 754
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Routing Protocols that Are Active Proactive protocols construct and maintain the routing information for each node. Whether or not
the route is required has no impact on the proactive routing protocols [20]. Control messages are sent out at regular intervals. Even
in the absence of data flow, control messages are still sent. Proactive routing methods are ineffective at using bandwidth because of
these control messages. The use of proactive routing techniques has both benefits and drawbacks. One of its benefits is that it makes
it simple for nodes to initiate a session and obtain routing information. The drawbacks include excessive data retention by nodes for
route management and a sluggish recovery time after a particular connection breakdown.
Network nodes communicate with one another by sending HELLO messages. In OLSR, these signals are transmitted at regular
intervals to ascertain the connection status. Figure 3-6 helps us to comprehend this. If nodes A and B are neighbors, node A notifies
node B with a HELLO message. We can infer that the connection is asymmetrical if B node gets this message. If B node now
transmits the identical HELLO message to A node. This is the first example, sometimes known as an asymmetric relationship. Now,
if two-way communication is available, we may refer to it as a symmetric link, as seen in Figure 3-6 below. All of the neighbor
information is contained in the HELLO messages.As a result, the mobile node can have a database with data on all of its multiple
hop neighbors. When symmetric connections are created, a node selects the smallest possible number of MPR nodes. At specified
TC intervals, it transmitted topology control (TC) messages including connection status information [20]. The routing tables are
likewise calculated using TC messages. Information about MPR nodes is also provided in TC messages.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 755
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
V. EXPERIMENTAL ANALYSIS
Simply said, Network Simulator (Version 2), sometimes referred to as NS2, is an event-driven simulation tool that has been
successful in helping researchers better understand the dynamic nature of communication networks. Using NS2, it is possible to
simulate both wired and wireless network operations and protocols (such as routing algorithms, TCP, and UDP). Generally
speaking, NS2 gives users a mechanism to define these network protocols and simulate the related behaviour.
Object-oriented Tool Command Language and C++ are the two main languages used in NS2 (OTcl). While the fundamental
workings (i.e., a backend) of the simulation objects are defined by the C++, the simulation is built up by the OTcl by putting the
objects together, configuring them, and scheduling discrete events (i.e., a frontend). TclCL is used to link the OTcl and C++
together. Variables in the OTcl domains are frequently referred to as handles when mapped to a C++ object. [17]
Figure 8 NS Architecture
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 756
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
After simulation, NS2 delivers simulation results as either text or animation. NAM (Network Animator) and XGraph are two
examples of tools that are used to understand these results graphically and interactively. Users can extract a pertinent portion of text-
based data and modify it into a more plausible presentation to investigate a certain network activity. Additionally, the simulator
already includes a variety of scheduling tools, management rules queues, and transmission systems (layer 1 of the TCP/IP
architecture) for studies on congestion control. The categories for the key components that are currently offered in NS
Performance Assessment It has been done to analyze the performance of the routing protocols in the MANET for different node
pause times and data rates. Additionally, we evaluated and contrasted the performance of these well-known MANET routing
algorithms in three different situations: (a) without assault (when the network is not under security attack); (b) under gray-hole
attack; and (c) under black-hole attack.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 757
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Our findings demonstrate that OLSR outperforms other routing protocols in terms of PDR when under attack because OLSR uses an
election-based routing structure that reduces the likelihood of hostile nodes being included in the active route. In terms of PDR,
AODV and OLSR perform better than every other procedure. DSR functions admirably for low data rates, but PDR declines as data
rates rise. Under high data rates, DSR experiences stale route cache entries at each node, which fills up data queues and leads to
packet drops. Although DSDV is not greatly impacted by data rate, it has a lower PDR than other routing methods.
Figures 5, 2(a), and 5.2(b) demonstrate that OLSR outperforms all other routing protocols under assault in terms of PDR.
Additionally, Fig. 5 2(b) demonstrates how PDR for all taken-in routing protocols dramatically declines under the black-hole
assault. The causes of these actions are the same as those that have already been examined in relation to Figures 9 (a) and 9 (b).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 758
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Figure 11(a) Average end-to-end delay vs. pause time under gray-hole attack
Figure 11(b) Average end to end delay vs. pause time under black-hole attack
Figure 12 (a) Average end-to-end delay vs. data rate under gray-hole attack
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 759
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
Figure 12 (b) Average end-to end delay vs. data rate under black-hole attack
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 760
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
D. Throughput
is defined as the total number of packets delivered over the total simulation time. statistical computation shows that we do not reject
the null hypothesis. That is, there is no significant difference for the different methods in terms of throughput performance (P −
value > 0.05). This means that the results variations between the different algorithms are quite close. We stipulate that the small
variations between the results are due to the network topology and traffic. The data sending rate of all the algorithms is set to a
constant value for all the simulations. If most of the data traffic is between two nearby nodes (one-hop), the three algorithms would
not differ significantly in terms of throughput.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 761
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
In this case, Fcrit = 3.0911 at α = 0.05. Since F = 0.9127 < 3.0911, the result are significant at the 5% significance level. So we will
accept the null hypothesis, and conclusion can be drawn that there is strong evidence that the expected values in the three groups
does not differ. The variation is quite small and can be eliminated at this significance level. The P −value for this test is 0.4048.
Average End
Throughput
Protocols
Delivery
Routing
Attack
to End
Packet
(kbps)
NRL
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 762
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
VII. CONCLUSION
The four well-known routing protocols (OLSR, DSDV, AODV, and DSR) have all had their performance thoroughly analysed in
this work.
Each of these well-known protocols has been shown to have merits and downsides while the network is operating normally
(without an attack), making it impossible to single out one protocol as the best. However, none of the routing protocols under
consideration were created with security in mind.
As a result, procedures that were most effective in no-attack settings do not perform as well while under attack.
This highlights the need of considering security issues while designing a routing protocol for MANETs.
In this work All of these protocols were analyzed and compared and the performance of both was examined over blackhole and
greyhole attacks
NS2 simulator was used for implementation
The performance parameters into consideration were packet delivery ratio, end to end delay, Normalized routing load and
normalized throughput.
It was observed that OLSR performs best in even being under attack.
Additionally, there is a need for a general security framework that existing protocols may utilize to isolate hostile nodes from the
routing path and reduce the effect of their actions.
A. Future Scope
Future work is about the development of modified version of the selected routing protocols, which should consider different aspects
of routing protocols such as rate of higher route establishment with less route breakage and the weakness of the protocols mentioned
should be improvised.
REFERENCES
[1] A.B. Malany, V.R.S. Dhulipala, RM. Chandrasekaran, “Throughput and Delay Comparison of MANET Routing Protocols” Intl. Journal Open Problems Comp.
Math., Vol. 2, No. 3, Sep 2009.
[2] D.O. Jörg, “Performance Comparison of MANET Routing Protocols In Different Network Sizes” Comp. Science Project, Institute of Comp. Science and
Networks and Distr ibuted Sys, University of Berne, Switzer land, 2003. [Online]. at:
[3] S. Ali, and A. Ali, “Performance Analysis of AODV, DSR and OLSR in MANET”, Masters Thesis, M.10:04, COM/School of Computing, BTH, 2010.
[Online]. Available at:
[4] M.K. J. Kumara and R.S. Rajesh, “Performance Analysis of MANET Routing Protocols in different Mobility Models” IJCSNS International Journal of
Computer Science and Network 22 Security, VOL.9 No.2, February2009.
[5] N Vetrivelan, and A.V. Reddy, “Performance Analysis of Three Routing Protocols for Varying MANET Size” Proceedings of International M. Conference of
Eng. & Computer Scientists, Hong Kong, Vol. II IMECS 2008.
[6] W. G. LOL, “An Investigation of the Impact of Routing Protocols on MANETs using Simulation Modeling” Master Thesis, School of Computing and
Mathematical Science, Auckland university of Technology, 2008. [Online]. Available at:
[7] A. K. Pandey, and H. Fujinoki, “Study of MANET routing protocols by GloMoSim simulator” Intl of network management NT, Wiley InterScience 15: 393–
410, Intl. Journal Network Management 2005.
[8] S. Mittal, and P. Kaur, “Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANET'S” Intl. Conf. on Adv. in Comp., Control, and
Telecom. Technologies, Trivandrum, Kerala, India, 28-29, December, 2009.
[9] X. Hong, K. Xu, M. Gerla, “Scalable Routing Protocols for Mobile Ad-Hoc Networks” IEEE Network Magazine, Vol.16, Issue-4, page(s) 11– 21. Online].
Available at:
[10] [Online]. Available at: http://www.ietf.org/html.charters/manet-charter.html. [Accessed]: Feb.20, 2010. 53
[11] A. Shrestha, and F. Tekiner, “Investigation of MANET routing protocols for mobility and scalability” Int. Conference on Parallel and Distributed Computing,
Applications and Technologies, Higashi Hiroshima, 2009.
[12] [Online]. Available at: http://tools.ietf.org/id/draft-ietf-manet-zone zrp-04.txt. [Accessed]: March 03, 2010.
[13] Z. J. Haas, and M.R. Pearlman “The performance of Query Control Schemes for the Zone Routing Protocol” IEEE/ACM transactions on networking, Vol. 9,
No. 4, August 2001.
[14] J. Schauman “Analysis of the Zone Routing Protocol” Technical report, December, 2002. [Online]. Available at:
[15] A. Buhan, and M. Othman, “Efficient Query Propagation by Adaptive Bordercast Operation in Dense Ad-Hoc Network”, IJCSNS International Journal of
Computer Science and Net. Security, VOL. 7, No. 8, Aug. 2007
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 763