Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment

Full Text (PDF, 808KB), PP.47-58

Views: 0 Downloads: 0


E.Suresh Babu 1,* C. Nagaraju 2 MHM Krishna Prasad 3

1. JNTUK, Kakinada, KLEF University, AP, India

2. YV University, Kadapa, AP, India

3. UEC, JNTUK, Kakinada, AP, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.08.06

Received: 12 Nov. 2015 / Revised: 16 Feb. 2016 / Accepted: 16 Apr. 2016 / Published: 8 Aug. 2016

Index Terms

AODV, DSR, Heterogeneous Attack, Ad hoc Networks


Researchers have already shown the way, how to improve and compare the existing MANET routing protocols that help us to understand the basic feature and functionality of the various routing protocols. However, while these routing protocols have been proposed from different research groups in the literature, which shows the existing routing protocols, are not consistent to common framework to evaluate its performance. Moreover, these protocols are vulnerable to many collaborative attacks, due to its cooperative nature of routing algorithms. Hence, it is difficult for one to choose a proper routing protocol for a given application; therefore, we initially study and review to compare the different existing routing protocols in adversarial environment with varying traffic and mobility simulation scenarios. This paper addresses the comparison of various reactive routing protocols in adversarial environment. To achieve this, we had investigated with widely used NS-2 simulators for fair comparisons of different routing protocols. Furthermore, we also develop a collaborative adversary model for these existing routing protocols that can interfere with communications to subvert the normal operation of the network. Specifically, Our extensive simulation results shows the relative quantitative analysis for comparing the performance of reactive routing protocols such as AODV, DSR under adversarial environments with varying traffic and mobility simulation scenarios. Moreover, the performance of these protocols is measured with the various metrics such as throughput, end-to-end delay, packet delivery ratio, and routing overhead.

Cite This Paper

E.Suresh Babu, C. Nagaraju, MHM Krishna Prasad, "Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.8, pp.47-58, 2016. DOI:10.5815/ijcnis.2016.08.06


[1]Frodigh, P. Johansson, and P. Larsson, “Wireless ad hoc networking — The art of networking without a network,” vol. 4, no. 4, pp. 248–263, 2000
[2]Park and S. Corson. “A performance comparison of TORA and ideal link state routing”, In Proceedings of IEEE Symposium of Computers and Communication, June 1998.
[3]Broch, D. a. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” Proc. 4th Annu. ACM/IEEE Int. Conf. Mob. Comput. Netw. - MobiCom ’98, pp. 85–97, 1998.
[4]Charles E. Perkins, Elizabeth M. Royer and Samir R. Das and Mahesh K. Marina " Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks" published in IEEE Personal Communications-February, pp. 16–28, 2001.
[5]Kullberg, “Performance of the Ad-hoc On-Demand Distance Vector Routing Protocol”. 2004.
[6]Zhou, “A Survey on Routing Protocols in MANETs“, 1-22,Vol no.1, 2003.
[7]Misra and C. R. Mandal, “Performance comparison of AODV/DSR on-demand routing protocols for ad hoc networks in constrained situation”, IEEE Int. Conf. Pers. Wirel. Commun. 2005. ICPWC, pp 86-89, 2005.
[8]R.Draves, J. Padhye, and B. Zill “Comparison of routing metrics for static multi-hop wireless networks”, Conf. Appl. Technol. Archit. Protoc. Comput. Commun. – SIGCOMM, pp 133, 2004.
[9]Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks,” vol. 2, pp. 1–22, 2004.
[10]Kumar.et.al “Performance Comparison Of AODV and DSR Routing Protocols In MANET”,2006.
[11]Ramanathan and M. Steenstrup, “A survey of routing techniques for mobile communications networks”, Mob. Networks Appl, pp 89-104, vol. 1, no. 2, 1996.
[12]Zou, B. Ramamurthy, S. Magliveras, and B. Raton Routing Techniques in Wireless Ad Hoc Networks — Classification and Comparison.
[13]Hallani and S. Shahrestani, “Improving the Performance of Wireless Ad-hoc Networks: Accounting for the Behavior of Selfish Nodes”, Commun. IBIMA, pp 1-11, 2011.
[14]Saraeian, F. Adibniya, M. Ghasemzadeh, and S. Abtahi, “Performance Evaluation of AODV Protocol under DDoS Attacks in MANET”, pp 484–486, 2008.
[15]Charles E. Perkins, Elizabeth M. Royer and Samir R. Das and Mahesh K. Marina "Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks" published in IEEE Personal Communications-February, pp. 16–28, 2001.
[16]Boukerche.A “Performance comparison and analysis of ad hoc routing algorithms”, IEEE International Conference on Performance, Computing and Communications , pp. 171-178., April,2001.
[17]Baadache, and A. Belmehdi “Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks,” Intl. Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
[18]Jain, M. Jain, H. Kandwal "Advanced Algorithm for Detection and Prevention of Cooperative Black and Grayhole Attacks in Mobile Ad Hoc Networks", Intl. Journal of Computer Applications , Published by Foundation of Computer Science, 2010.
[19]Weerasinghe, H. Fu, “Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation”, Proc. of Intl. Conference on Future Generation Communication and Networking (FGCN’07) , pp 362-367, 2007.
[20]Cheung S, Lindqvist U, Fong M “ Modeling multistep cyber attacks for scenario recognition.”, In DARPA Information Survivability Conference and Exposition, pp 284–292, Vol. 1, 2003.
[21]Yang J, Ning P, Wang XS, et al, “CARDS: A distributed system for detecting coordinated attacks”, Proc. of IFIP TC11 16th Annual Working Conference on Information Security, 2000.
[22]Hu, A. Perrig, and D. B. Johnson, “ Rushing attacks and defense in wireless ad hoc network routing protocols”, ACM Work, pp 30, 2003.
[23]Chen, S. Guo, K. Zheng, and Y. Yang, “ Modeling of man-in-the-middle attack in the wireless networks”, Int. Conf. Wirel. Commun. Netw. Mob. Comput. WiCOM pp 2255–2258, 2007.
[24]Davies “Evaluating Mobility Models Within An Ad Hoc Network”, 2004.
[25]Kumar, S.A., Babu, E.S., Nagaraju, C. and Gopi, A.P., 2015. An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET. International Journal of Electrical and Computer Engineering, 5(5).
[26]P-C Tsou, C. J-M Chang, Y-H Lin, H-C Chao, J-L Chen, “Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”, Feb. 13~16, Phoenix Park, Korea, 2011.
[27]B. Johnson, D. A. Maltz, and J. Broch, “DSR: The dynamic source routing protocol for multihop wireless ad hoc networks,” in Ad Hoc Networking, C. E. Perkins, Ed. Reading, MA: Addison-Wesley, 2001, ch. 5, pp. 139–172.
[28][Online]. Available: http://www.isi.edu/nsnam/ns/
[29]S. Babu, “An Implementation and Performance Evaluation Study of AODV, MAODV, RAODV in Mobile Ad hoc Networks,” vol. 4, no. 9, pp. 691–695, 2013.
[30]S. Babu, C. Nagaraju, and M. H. M. K. Prasad, “An Implementation and Performance Evaluation of Passive DoS Attack on AODV Routing Protocol in Mobile Ad hoc Networks PROTOCOL OF,” vol. 2, no. 4, 2013.
[31]S. Babu and M. H. M. K. Prasad, “An Implementation Analysis and Evaluation Study of DSR with Inactive DoS Attack in Mobile Ad hoc Networks,” vol. 2, no. 6, pp. 501–507, 2013.
[32]Gopi, A.P., Babu, E.S., Raju, C.N. and Kumar, S.A., 2015. Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study. International Journal of Electrical and Computer Engineering, 5(5).
[33]Babu, E.S., Rao, P.S., Rao, M.S. and Nagaraju, C., Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks.