Improved Energy Efficient Secure Multipath AODV Routing Protocol For MANET
Improved Energy Efficient Secure Multipath AODV Routing Protocol For MANET
August 01-02, 2014, Dr. Virendra Swarup Group of Institutions, Unnao, India
forwarding but it has many disadvantages. Even though section 5 and result analysis in Section 6.and last Section 7
additional network resources may be available, using a single concludes the paper.
path, it is difficult to respond to a large burst in traffic. If the
path fails a new route discovery must be initiated resulting in II. ENERGY AWARE ROUTING IN MOBILE ADHOC
NETWORK
significant delay and packet loss. Multi path protocols learn
routes and select more than one path to reach the destination. Wireless mobile devices are useful if they can be used
They are better for load balancing. Multipath routing improves anywhere. But we have limited battery power of using it,
communication efficiency and promotes Quality of Service by Therefore, in wireless communication; one of the most
utilizing different paths simultaneously [5] . Also they are more challenging problems is power management. Several energy
reliable, robust and consequently reduces control overhead, aware routing protocols have been developed. Most of these
enhances data transmission rate, the network bandwidth is routing protocols aim to minimize the energy consumed per
increased and the energy is saved [6]. Contributions in our packet needed to deliver this packet to its destination. Some of
solution are as follows. the more sophisticated routing algorithms associate a cost with
routing through a node with low power reserve. Other routing
1. A multipath proactive source routing protocol is used as protocols aim to maximize the network lifetime. All previous
each node has complete knowledge of how to route data to protocols are using single path to distribute data traffic through
all nodes in the network at any time. Based on the number the network. The routing protocols, described previously are
of paths available to reach destination, the packets can be
based on the single path routing between a source and a
divided and sent simultaneously to destination.
destination. However, in a reasonably well-connected network,
2. When the data packets are forwarded towards destination
the intermediate nodes can adjust the route information there may exist several paths between a source-destination pair.
carried by them. Furthermore, as these packets are The concept of multipath routing is to give the source node a
forwarded along the new route, such updated information choice at any given time of multiple paths to a particular
is propagated upstream quickly without any additional destination by taking advantage of the connectivity redundancy
overhead. As a result, all upstream nodes learn about the of the underlying network. The multiple paths may be used
new route at a rate much faster than via periodic route
alternately, namely, traffic taking one path at a time, or they
exchanges. Opportunistic data forwarding is taken to
another level by allowing nodes that are not listed as may be used multiple paths simultaneously .Multi-path routing
intermediate forwarders to retransmit data if they believe consists of three components: route discovery, route
certain packets are missing. maintenance, and traffic distribution among multiple paths.
Malicious nodes may become part of actively used routes and
disrupt network operation. In such an environment, malicious A. Route Discovery: It finds multiple routes between a source
intermediate nodes can be a threat to the security of and destination nodes. Multipath routing protocols may be
node disjoint (no common nodes), link disjoint (no common
conversation between mobile nodes. In this paper, we focus on
links), or non-disjoint routes. Non-disjoint routes may have
a special type of denial of service attack due to RREQ flooding lower aggregate resources than disjoint routes for the reason
attack. In this type of attack, those malicious nodes behave like that non-disjoint routes share links and nodes. Disjoint
the normal nodes in all aspects except that they initiate routes provide higher fault-tolerance.
frequent RREQ control packet floods. This type of attack is B. Route Maintenance: It finds and repairs the broken paths.
hard to detect since any normal node with frequently broken C. Traffic Allocation: The traffic allocation strategy is used to
routes could legitimately initiate frequent route discoveries. deal with how the data is distributed amongst the paths.
One or more malicious nodes flooding the MANET with
III. DENIAL OF SERVICE ATTACK DUE TO ROUTE REQUEST
RREQ control packets related to bogus route discoveries can
(RREQ) FLOODING
cause a sharp drop in network throughout. The rest of the paper
The Route Request (RREQ) Flooding Attack is a kind of
is organized as follows. In section 2, we describe Energy
denial-of-service attack, which aims to flood the network with
Aware Routing In Mobile Ad Hoc Networks. In section 3 we
a large number of RREQs to the destinations in the network. In
describe the Denial of services attack caused by RREQ
this attack, the malicious node will generate a huge number of
flooding. In section 4 we describe some related work. An
RREQs, may be hundreds or thousands of RREQs, into the
energy efficient secure filtering mechanism is proposed in
network until the network is saturated with RREQs and unable
to transmit data packets. Many different reactive (on-demand)
dynamic routing protocols proposed for MANETs can suffer network will be improved by suitably reducing the requirement
from this type of attack. On-demand routing protocol, uses a of power for connections. This protocol is the enhanced
route discovery process to obtain a route when a node want to protocol of Ad-hoc On Demand Multipath Distance Vector
send a data packet to a destination for which it does not protocol (AOMDV). This routing protocol is used to avoid the
information about the route. The route discovery works by loop formation in network so that it reduces congestion in the
broadcasting the network with route request (RREQ) control channel.
packets. A node that receives a RREQ rebroadcasts it, unless it
has information about another neighbor, intermediate node or it In [13] , Meng Li proposed a cross-layer optimized energy
has a route information to the destination indicated in the aware multipath routing protocol (EMRP) for mobile ad hoc
RREQ. If the received RREQ is a duplicate or it has a same networks (MANET). By sharing the information among the
sequence number, it will be dropped. If a node has the route physical layer, the MAC sub-layer and the network layer,
information because it is the destination then it replies to the EMRP efficiently utilizes the network resources such as the
RREQ with a route reply (RREP) packet that is routed back to node energy and the link bandwidth. In this paper, an energy
the original sender of the RREQ. In an ad hoc wireless network aware multipath routing protocol for mobile ad hoc networks is
energy and traffic load are the two major elements for research, proposed. As a cross-layer design, EMRP utilizes the
the RREQ packets used for route discoveries may consume information from the physical and the MAC layers to select
more bandwidth than the data packets. Malicious nodes could better routes.
exploit this weakness of routing protocols. Attackers can
In [14], M. BHEEMALINGAIAH proposed a routing for
initiate much more REEQ control packets than the normal
MANET. In this paper the author said the Mobile Ad Hoc
nodes to consume network resource. Since control packets are
Networks are essentially suitable when infrastructure is not
given higher priority over data packets in transmitting, In this
present or difficult or costly to setup or when network setup is
situation, valid communication cannot be kept and normal
to be done quickly within a short period.
network nodes cannot be served, then it leads to a type of
denial-of-service attack. In some on-demand protocols, for In [15], S. Harouset.el. proposed a the performance analysis
example AODV, a malicious node can override the restriction of an Energy Aware Multi-path Dynamic Source Routing
put by RREQ_RATELIMIT (limit of initiating / forwarding protocol (EA-MPDSR). This protocol is based on the existing
RREQs) by increasing it or disabling it. A node can do so on-demand Dynamic Source Routing protocol (DSR). It is
because of its self-control over its parameters. The default energy aware and uses a multi -path technique. EA-MPDSR
value for the RREQ_RATELIMIT is 10 as proposed by RFC reduces the energy consumed per received data bytes as well as
3561. A compromised node may choose to set the value of prolongs the network lifetime which leads to improvement in
parameter RREQ_RATELIMIT to a very high number. This the performance of the network.
allows it to flood the network with fake RREQs and leads to a
type of Denial of service attack. In this type of Denial of In [16] , Hesham A. Ali proposed an approach of load
service attack a non-malicious node cannot fairly serve other balancing and multipath for MANET. In this paper they
nodes due to the network load imposed by the fake RREQs. employed a simple test scenario to be sure of proposed model
This will not only lead to the exhaustion of the network efficiency and to validate the proposed Load Balancing Parallel
resources like memory (routing table entries), but also lead to Routing Protocol. Load Balancing Parallel Routing Protocol
the wastage of bandwidth and the wastage of nodes' processing get load balancing, decreasing the end-to-end delay and
time. increasing the packet delivery ratio and throughput of the
network, therefore the performance of multi-path routing
IV. RELATED WORK protocols can be improved consequently.
Many research has been conducted on the energy efficiency
and multipath routing in MANET but still current result are not V. PROPOSED WORK
appropriated for MANET. AODV protocol is modified and converted to work on multiple
paths to send data .First we modified route discovery process
In [12] , S. Santhiet. al. proposed a power aware multipath of AODV when a destination receives a RREQ packed it
routing protocol. In this author told that Energy consumption in replies for all the RREQ packets received even for same
heterogeneous network is a major problem. The lifetime of
sequence number using back path. At the sender end sender ongmator during a preset time period. Whenever a RREQ
takes all the paths and short them on the bases of hope count, at packet is received, a check is performed. If the rate of this
the time of data forwarding sender uses best three paths among RREQ originator is below the RATE_LIMIT, the RREQ
all paths . packet is processed as normal.
This process also eliminates problem of route brakeage in The BLACKLIST_LIMIT parameter is used to specify a
AODV .When one route breaks source can send the data using value that aids in determining whether a node is acting
different path available. malicious or not. If the number of RREQs originated by a node
per unit time exceeds the value of BLACKLIST_LIMIT, one
can safely assume that the corresponding node is trying to
flood the network with possibly fakeRREQs. On identifying a
0 0 0 0 0 0 0 0
0 0 sender node as malicious, it will be blacklisted. This will
0 0 0 prevent further flooding of the fake RREQs in the network.
The blacklisted node is ignored for a period of time given by
S BLACKLIST TIMEOUT after which it is unblocked. The
0 0
0
proposed scheme has the ability to block a node till
0 0 0
BLACKLIST_TIMEOUT period on an incremental basis. By
(a) Under light data traffic load (b)Under heavy data traffic load
blacklisting a malicious node, all neighbors of the malicious
Fig.1 AODV routing under (a) Light data traffic load (b) Heavy data traffic node restrict the RREQ flooding. Also the malicious node is
load isolated due to this distributed defense and so cannot hog its
neighbor' s resources. The filter process is shown in figure 3.
genuine nodes are saved from experiencing the Denial of If table contain more than three entries than retrieve
services attack. If the rate of RREQs originated by a node is fIrst three otherwise take all .
between the RATE_LIMIT and the BLACKLIST_LIMIT, the
Step 5: (At the time of sending data)
RREQ packet is added to a "delay queue" waiting to be
processed. Every time a DELAY_TIMEOUT expires, if there if data available to send is big than divide it in parts
is anything in the delay queue (RREQ packet waiting to be and send through available paths
processed), then the fIrst packet is removed to be processed. To
else send data using fIrst path(shortest) in table .
do so, malicious node that has a high attack rate will thus be
severely delayed. Meanwhile, the proposed rate control Step 6: If a path breaks send the data using other available
mechanism will have no impact on other nodes and also have paths .
minimal impact on the normal nodes that send abnormally high
RREQs. VI. SIMULATION AND EVALUATION
The fIltering forwarding scheme slows down the spread of According to Shannon, simulation is the process of creating a
excessive RREQs originated by a node per unit time and model of a real system and conducting experiments with this
successfully prevents DoS attacks. The proposed scheme system model for the purpose of learning the behavior of the
incurs no extra overhead, as it makes minimum modifIcations system or evaluating various strategies for the operation of the
to the existing data structures and functions related to system. With the vibrant nature of computer networks, we thus
actually deal with a energetic model of a real dynamic system.
blacklisting a node in the existing version of pure AODV. Also
the proposed scheme is more efficient in terms of resource
A. Simulation tool
reservations and its computational complexity. In addition to
limiting the clogging up of resources in the network, the NS-2 is an open-source event-driven simulator designed
proposed scheme also isolates the malicious node. especially for research in computer communication networks.
Since its inception in 1989, NS-2 has always gained
Algoritbm: tremendous interest from industry, Academia and various
government and private organization. Having been
DSN - Destination Sequence Number, NID - Node ID,
investigation and enhancement for years, To investigate
Hop_count. network model performance, researchers can simply use an
easy-to-use scripting language to confIgure a network, and
Step 1: (Initialization Process)
observe results generated by NS-2 Undoubtedly NS-2 has
Retrieve the current time become the most widely used open source network simulator.
Here we have selected NS-2.35 for our simulation.
Add the current time with waiting time
Step2: ModifIed route discovery process of AODV In order to evaluate the performance of our proposed Scheme
and compare with Ad hoc On-Demand Distance Vector
when a destination receives a RREQ packed it replies for all
(AODV) Routing [2] and AODV under attack .we simulate the
the RREQ packets received even for same sequence number proposed mechanisms using NS-2.35 Simulator. The
simulation environment, performance metrics and results are
using back path.
discussed in the subsequent sections.
Step 3: (Storing Process)
In our simulations bandwidth set to 1 Mbps and the
Store all the Route Replies Destination Sequence
transmission range is set to 250 m. The evaluations are
Number and Node ID in Route Routing Table conducted with a total of 20 nodes that are randomly
distributed in an area of 1100m x 1100m. We use Random
Do again the above process until the time exceeds
Waypoint to model node mobility. The size of each Constant
Step 4: (Identify top 1 to 3 shortest path on the bases of hop Bit Rate (CBR) packet is 1024 bytes and packets are generated
at the fIxed interval rate of 5 packets per second.
count) .
Short the table on the bases of Hop_count.
Channel type Wireless channel This result shows the working of AODV under attacked
condition, here show three results. Graph 6.1 A shows the
Radio propagation model Propagation Two ray packet delivery ratio. Graph 6.1B is showing throughput of
ground network and graph 6.1C showing energy graph of node present
in my simulation environment. Here it is clearly shown that
Network interface type Phy/wirelessphy performance is degraded in under attack condition.
on
6.1A
Time of simulation 75.0sec.
xg.-aph 1£1
I Close II HdcpyllAbmtl X Graph
Number_oCPackets x 103
Table 1: simulation Parameters
o
30000 ..·--...... ·.. ·.. · /'. . ./"'�
C. Performance Metrics 2.8000_
2.6000-·.. ...... .. ,V
. .. .. ,/rl �II'�I\ �/+v.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. , .. .. .. .. .. .. .. .. .. ..\.. .."".. .. .. .. .. .. ,.. .. .. .. .. .. .... .... .... .. .. .. .. .. .. .. ..
. .. .. .. .. ..
.. ..
2) Total Throughout: The total number of application layer 06 1H .... .. .. .... .. .. .... .. .. .... .. .. .... .. .. .... .. .. .. .... .. .. .. .... .. .. . .... + ................. ...... .... ...... .... .......... + ........ ............................................................., .. .... .. .. .... .. .. .... .. .. ...... .. .. .... .. .. .... .. .. .... .. .. .... .. .. .. ..
. 000 -·
O.4ooo -l · H .... ........ ........ ........ ....... ....... ....... ..... .. ..... .. + ......................................... + ........................................................................ + ........................................................
data bits successfully transmitted in the network per second. 0.2000· -] 1 + ..··....···....··· ....··· ....···....···.. + ..... ................................ .................... + ............................................... !.................................................................
.. ..
0.0000 I� �
Time in Seconds
3)Energy levels : This shows energy at the time of simulation 0.000 0 20.0000 40.000 0 60.0000
starting and ending of simulation .
6.1B
In the previous chapters we have seen packet delivery ration packet delivery ratio. Graph 6.2B is showing throughput of
and throughput of AODV in under attack condition. In this network and graph 6.2 C showing energy graph of node present
section we are presenting the energy consumption by both in my simulation environment. It is visible that our proposed
condition in under attack condition and after applied algorithm
algorithm has better performance then AODV under attack.
condition and comparing energy consumption.
Energy utilization after applied Algorithm
Energy Consumption of nodes in AODV When attacking
condition AODV is run the energy consumption is more in
After practical this algorithm in AODV we minimize our
attacking condition case. There is no method for detection of
Energy consumption of each node. The energy of each node
unknown node. And the number of RREQ Packets send is
after this algorithm is given below with the help of energy
more so the energy consumption is more in attacking condition
graph.
of AODV .We plot a energy graph for attacking condition
AODV after simulation. Each node have 100 joules of initial
Energy of Node 10 56.125695 Joule. =
given below:
Energy of Node 16 51.593463 Joule. =
No. of Nodes
Energy graph is shown below
Average Energy Consumption =
54.793256+68.086466+52.839517+63.868596+64.603259
ENERGY GRAPH AFTER APPLIED ALGORITHM
Average Energy of Nodes 60.8382188 Joules. =
xgraph
ENRGY GRAPH
xgraph
95.0000--...
00.0000
00.0000
65.0000 __,'.N.
60.0000- ---- .-
O.CKXlO 10.0000 2O.QCKX) 3O.(XX)Q 40.0000 50.0000 60.0000 70.0000
6.2C
��� X Graph
xgraph Packet_Deliverv _Ratio
pdrgraph
00.01000 r······································ ,....................................... t······································· , ..............................................
65.0000'"
60.0000 ..· ..· II ....·..···· , ........................; ........... ; ......................., ........... t··....·....·..···..··..; ·....·..··· ; .......................
55.0000·····
TlmeJn_Second�
0.0000 60.0000 70.0000
0.0000 20.0000 40.0000 60.0000
6.3A
6.2A
-. xgraph
�t3 ���
I,
�
IClosellHdcpyllAbolll
Number_of_Packets x nil
xgraph
X Graph
Number_of]ackehx 103
Throughput comparision
attackedth
recDveredth
II 4.0000·····
4.0000-- ;tw ��
3.5000"'"
3.5000-·- I V \ � 3.0000"'"
2.5000---
5
2.0000 · -liV··········· , ......................, ............ t·······················; ·················
2.0000-
1.5000···..
1.5000-
1.0000···..
,
1.0000j
05000- il
0.0000
0.0000 ;,= = 1= �
Time-in-Seconds
0.0000 20.0000 40.0000 60.0000
6.3B
6.2B
more stable. This multipath technique can also we use to [ 17] Sheela Rani Arasu, Immanuel JohnrajaJebadurai " Multipath Routing
for Opportunistic Data Transfer in Mobile Adhoc Network" IJERA Vol.
enhance DSR, DSDV, and other routing protocols .We can say 3, Issue 2, March -April 2013, pp.1567-1573.
that the use of this technique can also make DSR and other
protocols like this more energy efficient and achieve better
PDR and throughput.
REFERENCES
[ 1] Rajaraman, R. -Topology Control and Routing in Ad hoc Networks:A
Survey,1I SIGA News, vol. 33, pp. 60-73, June 2002.
[2] Sheela Rani Arasu, and Immanuel JohnrajaJebadurai, -Analysis of
Different Routing Techniques for Opportunistic Data Transfer,
International Journal of Computer Applications (0975 - 8887), volume
62 - No.5, January 2013.
[3] Ash Mohammad Abbas, and BijendraNath Jain, -Path diminution in
node - disjoint multipath routing for mobile ad hoc networks is
unavoidable with single route discoveryll ,International Journal Ad Hoc
and Ubiquitous Computing.