Simulation-Based Comparison of Vampire Attacks on Traditional Manet Routing Protocols

A mobile ad hoc network is wireless network without infrastructure and is self-configuring network of mobile nodes where nodes move to their places randomly, leave around or join the network. Over the many years, simulation work has been carried out to ac

  • PDF / 446,343 Bytes
  • 9 Pages / 439.37 x 666.142 pts Page_size
  • 65 Downloads / 160 Views

DOWNLOAD

REPORT


Abstract A mobile ad hoc network is wireless network without infrastructure and is self-configuring network of mobile nodes where nodes move to their places randomly, leave around or join the network. Over the many years, simulation work has been carried out to achieve a new reliable routing protocol. This paper seeks to rationalize Vampire attacks on the network layer that deals with route establishment. During route establishment and packet forwarding, Vampire attacks perpetually weaken the network by draining nodes’ energy. The Vampire attacks degrade the performance of routing protocol. All the basic traditional routing protocols those are examined here are open to Vampire attacks, which are damaging, and is time-consuming to troubleshoot. Simulation results show DSDV performs better than its counter parts. Keyword AODV



DSR



DSDV



Vampire

1 Introduction Mobile ad hoc networks (MANET) is defined as network without any permanent infrastructure. It consists of nodes distributed randomly and communicates with each other in radio environment. MANETs even though mainly designed for military applications can also be deployed in commercial sector. In recent times, there is a rapid growth in personal area networking. Routing plays an important role so that packets are delivered successfully to the destination. In general, every protocol consists of static nodes. The main objective of a good protocol is to identify the path to destination and send the encrypted data from J.R. Pullagura (✉) Vignan University Guntur, Guntur, Andhra Pradesh, India e-mail: [email protected] D. Venkata Rao Narasaraopet Institute of Technology, Narasaraopet, Guntur, Andhra Pradesh, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 D.K. Mishra et al. (eds.), Information and Communication Technology for Sustainable Development, Lecture Notes in Networks and Systems 9, https://doi.org/10.1007/978-981-10-3932-4_52

501

502

J.R. Pullagura and D. Venkata Rao

source to destination. Since the network has no fixed infrastructure, each node should genuinely participate in packet forwarding process. This can be concluded through simulation, which can be modeled hypothetically for further investigation. Here, simulation is carried out using NS2 simulator, NS2 plays a role of both emulator and simulator [1]. NS2 provides default implementations for creation of network nodes and creating links between nodes and dealing with routing algorithms. It is also used for the implementation of transport layer protocols such as UDP and TCP and some of traffic generators [2]. The motivational work carried out here is to compare the traditional routing protocols with Vampire attacks with the help of a simulator. AODV and DSR are categorized as on-demand protocols. DSR protocol [3] allows the nodes to establish the route and they react when there is need, whereas DSDV [4] falls under proactive category where table updation provides better route. The performance comparison of AODV, DSR and DSDV routing protocols with Vampire attac