Packet dropping detection in single-source environment in the presence of Attacks in Wireless Ad-Hoc Network Ms.Madhura Mokashi Mrs. Sangeetha Rajagopal Department of EXTC Engineering Pillai HOC College of Engineering and Technology Rasayani, Raigad, India [email protected] Department of EXTC Engineering Pillai HOC College of Engineering and Technology Rasayani, Raigad, India [email protected] Abstract— Wireless networks consist of Mobile Ad hoc Network (MANET) and Vehicular Ad hoc Network (VANET). Both these networks drop packets in the presence of collisions, channel errors, buffer overflow and malicious activity. The first three types are system dependent while the last one is people dependent. Existing detection algorithms have addressed the issue of packet loss of the first three types by using user-defined threshold value. However, no mechanism is proposed for the loss due to malicious attacks. This thesis presents a mechanism to detect malicious packet dropping. In order to combat this problem the first step is to detect the nodes that drop packets. Nodes that are affected by security attacks, such as blackhole, grayhole and wormhole are instrumental in dropping packets. So to overcome malicious packet dropping a mechanism called “loss monitor” is implemented and validated in order to avoid further loss of packets in the network because of malicious intent. table driven routing protocols consistent and up-to-date routing information to all nodes is maintained at each node whereas in on-demand routing the routes are created only when desired by the source host. Next two sections discuss current table-driven protocols as well as on-demand protocols. II. SCOPE OF THE PAPER In, this we are considering the behavior of malicious node in the network as it can do two things, one is to forward the packet and another is to alter or drop the packet. Altering can be done by corrupting the packet, changing the data, changing the source or destination of packet on MAC level. III. RELATED WORK Keywords—delay, throughput, attacks. A. Methodology I. INTRODUCTION Wireless networks are an emerging new technology that will allow users to access information and services electronically, regardless of their geographic position. Wireless networks can be classified in two types, infrastructure network and infrastructure less (ad hoc) networks. Infrastructure network consists of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network (called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it. This is called hand-off. In this approach the base stations are fixed. In contrast to infrastructure based networks, in ad hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. Ad hoc networks are very useful in emergency search-and-rescue operations, meetings or conventions in which persons wish to quickly share information, and data acquisition operations in inhospitable terrain. This article discusses proposed routing protocols for these ad hoc networks. These routing protocols can be divided into two categories: table-driven and on-demand routing based on when and how the routes are discovered. In Table driven In Table-driven routing protocols each node maintains one or more tables containing routing information to every other node in the network. All nodes update these tables so as to maintain a consistent and up-to-date view of the network. When the network topology changes the nodes propagate update messages throughout the network in order to maintain consistent and up-to-date routing information about the whole network. These routing protocols differ in the method by which the topology change information is distributed across the network and the number of necessary routing-related tables. The following sections discuss some of the existing table-driven ad hoc routing protocols. On-demand These protocols take a lazy approach to routing. In contrast to table-driven routing protocols all up-to-date routes are not maintained at every node, instead the routes are created as and when required. When a source wants to send to a destination, it invokes the route discovery mechanisms to find the path to the destination. The route remains valid till the destination is reachable or until the route is no longer needed. This section discusses a few on-demand routing protocols. Hybrid This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. B. Protocol Detail Ad hoc On-demand Distance Vector Routing Ad hoc On-demand Distance Vector Routing (AODV) is an improvement on the DSDV algorithm. AODV minimizes the number of broadcasts by creating routes on-demand as opposed to DSDV that maintains the list of all the routes. To find a path to the destination, the source broadcasts a route request packet. The neighbors in turn broadcast the packet to their neighbors till it reaches an intermediate node that has recent route information about the destination or till it reaches the destination. A node discards a route request packet that it has already seen. The route request packet uses sequence numbers to ensure that the routes are loop free and to make sure that if the intermediate nodes reply to route requests, they reply with the latest information only. When a node forwards a route request packet to its neighbors, it also records in its tables the node from which the first copy of the request came. This information is used to construct the reverse path for the route reply packet. AODV uses only symmetric links because the route reply packet follows the reverse path of route request packet. As the route reply packet traverses back to the source, the nodes along the path enter the forward route into their tables. If the source moves then it can re-initiate route discovery to the destination. If one of the intermediate nodes move then they moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source upon which the source can re-initiate route discovery if needed. IV. PARAMETERS TO BE CONSIDERED Collision In a network, when two or more stations attempt to transmit a packet across the network at the same time, a packet collision occurs. This is not uncommon in a shared medium such as an Ethernet that has many computers in the same network segment. When a packet collision occurs, the packets are either discarded or sent back to their originating stations and then retransmitted in a timed sequence to avoid further collision. Channel Error In digital transmission, the number of bit errors is the number of received bits of a data stream over communication channels that have been altered due to noise, interference, distortion or bit synchronization errors. The bit error rate or bit error ratio (BER) is the number of bit errors divided by the total number of transferred bits during a studied time interval. BER is a unit less performance measure, often expressed as a percentage. Malicious Packet Dropping In computer networking, a packet drop attack or grayhole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool. Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent. The malicious router can also accomplish this attack selectively, e.g. by dropping packets for a particular network destination, at a certain time of the day, a packet every n packets or every t seconds, or a randomly selected portion of the packets. This is rather called a grayhole attack. If the malicious router attempts to drop all packets that come in, the attack can actually be discovered fairly quickly through common networking tools such as trace route. Also, when other routers notice that the compromised router is dropping all traffic, they will generally begin to remove that router from their forwarding tables and eventually no traffic will flow to the attack. However, if the malicious router begins dropping packets on a specific time period or over every n packet, it is often harder to detect because some traffic still flows across the network. The packet drop attack can be frequently deployed to attack wireless ad-hoc network. Because wireless networks have a much different architecture than that of a typical wired network, a host can broadcast that it has the shortest path towards a destination. By doing this, all traffic will be directed to the host that has been compromised, and the host is able to drop packets at will. Also over a mobile ad-hoc network, hosts are specifically vulnerable to collaborative attacks where multiple hosts will become compromised and deceive the other hosts on the network. V. WAY OF IMPLEMENTATION WITH DESIRED PLAN Network Structure Creation This module will include creation and designing of the network structure to be used for transmission and various execution modules. This also involves implementing the node locations and behavioural features of the network. Packet Dropping Execution This module will enable transmission of data due to the presence of packet dropping nodes. In this execution, malicious receiving node may send an ACK message upon receiving a packet to be relayed and not forward the packet to the next hop. Packet Dropping Detection Execution This module will enable transmission of data due to the detection of packet dropping nodes within the network and successful transmission across the destination. The proposed algorithm used to detect if the neighbour node maliciously dropping packets. The neighbouring Node will count the RTS messages it sent to suspect node during some time window w and also the CTS messages received from suspect node during the same time. Transmission Analysis This involves facilitating the tracking of all transmission details and its utilization to generate analysis output. This module will therefore include analysing the performance of the network in terms of Transmission Delay generated and Packet Drops observed during the executions. VI. ARCHITECTURE communication channel. Examples of such channels are copper wires, optical fibres, wireless communication channels, and storage media. Packet Dropping: Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination. Packet loss is distinguished as one of the three main error types encountered in digital communications; the other two being bit error and spurious packets caused due to noise. Network Simulation: Key issues in simulation include acquisition of valid source information about the relevant selection of key characteristics and behaviours, the use of simplifying approximations and assumptions within the simulation, and fidelity and validity of the simulation outcomes. VII. FOCUSED PARAMETERS End to End Delay Delay is an important design and performance characteristic of a computer network or telecommunications network. The delay of a network specifies how long it takes for a bit of data to travel across the network from one node or endpoint to another. It is typically measured in multiples or fractions of seconds. Delay may differ slightly, depending on the location of the specific pair of communicating nodes. Although users only care about the total delay of a network, engineers need to perform precise measurements. Thus, engineers usually report both the maximum and average delay, and they divide the delay into several parts: Throughput Figure 1.1: Architecture of dropping scenario. Data Transmission: Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint In communication networks, such as ethernet or packet radio, throughput or network throughput is the average rate of successful message delivery over a communication channel. This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. The system throughput or aggregate throughput is the sum of the data rates that are delivered to all terminals in a network. Throughput is essentially synonymous to digital bandwidth consumption, it can be analysed mathematically by means of queuing theory, where the load in packets per time unit is denoted arrival rate λ, and the throughput in packets per time unit is denoted departure rate μ. VIII. PROTOCOL EVALUATION In this article, several existing routing protocols for ad hoc Wireless Networks were described. Three categories of routing protocols were discussed are Table-driven, on-demand routing and hybrid routing protocols. In table-driven protocols, each node maintain up-to-date routing information to all the nodes in the network where in on-demand protocols a node finds the route to a destination when it desires to send packets to the destination. Several table-driven protocols were discussed. DSDV and GSR are table-driven protocols that use destination sequence numbers to keep routes loop-free and upto-date. HSR and ZHLS are hierarchical routing. FSR reduces the size of tables to be exchanged by maintaining less accurate information about nodes farther away. CGSR is a clusterbased routing protocol where nodes are grouped into clusters. On-demand routing protocols were also discussed. In ondemand protocols, a route creation is initiated by the source when the source wants to communicate to the destination. CBRP is a cluster based routing algorithm like CGSR except that it is an on-demand routing mechanism as opposed to CGSR that is table-driven. DSRP is a source routing mechanism where the route is in each packet. ABR uses the degree of associativity to select routes. Similarly, SSR selects routes based on signal strength. In this paper, a performance comparison of DSR, AODV and ZRP routing protocols for mobile Ad-hoc networks is presented as a function of pause time. Performance of these routing protocols is evaluated with respect to four performance metrics such as average end to end delay, packet delivery ratio, throughput and average jitter. According to our simulation results, AODV shows best performance than DSR, FSR and ZRP in terms of packet delivery ratio and throughput as a function of pause time. In future, number of nodes, more sources, additional metrics such as average hop count, routing overhead may be used. IX. RESULTS Fig 1.3: Graph for end-to-end delay in single source undetected vs. detected malicious packet dropping Fig 1.4: Graph for throughput in single source undetected vs. detected malicious packet dropping X. CONCLUSION The existing techniques do not have detection mechanism for malicious activities such as grayhole and wormhole attacks. Hence, they fall prey to a lot of packet dropping and thereby, lose a lot of data in transit which results in a very poor performance of the network. So, in order to overcome malicious packet dropping behavior of the network, a new mechanism called “Loss Monitor” has been implemented. This has improved the performance of the network on a large scale as compared to the results without it. XI. FUTURE WORK Fig 1.2: Graph for end-to-end delay and throughput in Simple Network In future, the malicious packet dropping scenario would be tested using different protocols such as DSDV, DSR and ZRP. It can also be tested using greater number of nodes, sources and different types of attacks. Performance of these routing protocols can be evaluated with respect to other performance metrics such as hop count, packet delivery ratio and average jitter. REFERENCES Dina Simunic, Ashok Kanthe, Ramjee Prasad “A Mechanism for gray hole attack detection in mobile Ad-hoc networks” IEEE Transaction Paper, Vol.53, No-16, July 2014 Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure ondemand routing protocol for ad hoc networks,” Wirel. Netw., vol. 11, no. 1-2, pp.21–38, 2005. J. Kim, S. Kim, S. Choi, and D. Qiao, “Cara: Collision-aware rate adaptation for ieee 802.11 wlans,” INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1–11, April 2006. M. Just, E. Kranakis, and T. Wan, “Resisting malicious packet dropping in wireless ad hoc networks,” in In Proc. of ADHOCNOW03. Springer Verlag, 2003, pp. 151–163. J.-H. Yun and S.-W. Seo, “Novel collision detection scheme and its applications for ieee 802.11 wireless lans,” Computer Communications, vol. 30, no. 6, pp. 1350–1366, —2007—. F. Anjum and R. Talpade, “Lipad: lightweight packet drop detection for ad hoc networks,” Vehicular Technology Conference, 2004. VTC2004- Fall. 2004 IEEE 60th, vol. 2, pp. 1233–1237 Vol. 2, Sept. 2004. M. Carvalho and J. Garcia-Luna-Aceves, “Delay analysis of ieee 802.11 in single-hop networks,” Network Protocols, 2003. Proceedings. 11th IEEE International Conference on, pp. 146– 155, Nov. 2003.
© Copyright 2026 Paperzz