Affiliation:
1. Department of Electronics and Telecommunication, Faculty of Engineering, VIIT Research Centre, Savitribai Phule Pune University, Pune, India
2. Department of Electronics and Telecommunication, Faculty of Engineering, MIT College of Engineering, World Peace University, Pune, India
Abstract
Background and Objective:
Random Black Hole (BH) attack significantly degrades MANET’s
performance. For strategic applications, the performance parameters like Packet Delivery Ratio,
Routing Overheads, etc. are important. The objectives are: (a) To model random BH attack, (b)
To propose a routing strategy for the protocol to mitigate random BH attack, (c) To evaluate and
compare the network performance of modified protocol with the standard protocol.
Methods:
The random BH attack is modelled probabilistically. The analysis is carried out by varying
Black Hole Attack (BHA) time as Early, Median, Late occurrences and mix of these three categories.
The blocking performance is also analysed by varying the percentages of malicious presence in the
network. Normal Optimized Link State Routing (OLSR) protocol is used to simulate the MANET
performance using a typical medium size network. The protocol has then been modified using Trust-
Confidence aware routing strategy, named as TCAOLSR, with a view to combat the degradations
due to the random BH attack.
Results:
The random behavior of Black Hole attack is analyzed with all the possible random parameters,
like deployment of mobile nodes, number of malicious nodes and timing instances at which these
nodes change their state. From the results of individual type- Early, Median and Late, it is observed
that the TCAOLSR protocol gives stable performance for Packet Delivery Ratio (PDR) and
Routing Overheads (RO), whereas for OLSR protocol PDR gradually reduces and RO increases. For
individual and mix type, Average Energy Consumption (AEC) per node increases marginally for
TCAOLSR protocol. For the mix type, PDR for TCAOLSR is 40-60% better whereas RO for
TCAOLSR is very less compared to OLSR protocol. The efficacy of the TCAOLSR protocol remains
stable for different categories of BH attack with various percentages of malicious nodes compared
to OLSR with the same environment.
Conclusion:
Simulations reveal that the modified protocol TCAOLSR, effectively mitigates the network
degradation for Packet Delivery Ratio and Routing Overheads considerably, at the cost of a slight increase
in Average Energy Consumption per node of the network. Efficacy of the OLSR and TCAOLSR
protocols has also been defined and compared to prove robustness of the TCAOLSR protocol.
Publisher
Bentham Science Publishers Ltd.
Subject
Electrical and Electronic Engineering,Control and Optimization,Computer Networks and Communications,Computer Science Applications
Reference27 articles.
1. Clausen,T.; Jacquet,P. Trust model based on bayesian statistical method for aomdv in manet. BMC Med Inform Decis Mak. 2003; 69(1): 172-81
2. Rajaram,A.; Palaniswami,S. Malicious node detection system for mobile ad hoc networks; (IJCSIT) . BMC Med Inform Decis Mak. 2010; 1(2): 77-85
3. Tseng,FH.; Chou,LD.; Chao,HC. A survey of black hole attacks in wireless mobile ad hoc networks. Hum Cent Comput Info. 2011; 1(4): 1-16
4. Aarohi S. Strategic modelling of malicious behavior due to detour attack in olsr protocol in manet. Recent Res Elect Eng. 2014; 2014: 276-83
5. Khaled AAO. the impact of node misbehavior on the performance of routing protocols in manet. Int J Mach Learn Comput (IJCNC). 2016; 8(2): 103-12. http://dx.doi.org/10.5121/ijcnc.2016.8209
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献