Documente Academic
Documente Profesional
Documente Cultură
By
Sheraz Salim
Student ID 20388626
Presented to Faculty of
In Partial Fulfilment
Of the Requirements
Finally, I would like to dedicate this thesis to my parents, brother and sister. Without
their support it wasn’t possible to complete this project.
List of Figures
Figure 9.10 showing the values set for mobility of nodes in network……………….63
Introduction
Mobile Ad hoc network is the new advancement in field of telecommunication
technology which changes the entire concept of communication. This technology is
Wireless network are of two kinds, Infrastructure and infrastructure less. MANET is
infrastructure less; where as infrastructure need to connect with wired network in
order to provide transmission as MANET infrastructure less doesn’t need any wired
network. MANET node act as router and host at the same time to forward the packet
for other nodes.
Since last few years, MANET gain popularity from all sectors, military, education,
industry, and research etc. As many number of paradigm like Wireless Mesh Network
and wireless sensor network are tested and implement successfully around the world.
There is no doubt; the MANET has a bright future prospective. As an example in real
life VANET which based on Mobile Ad hoc Network are commonly used in motor
vehicle to prevent road accident, perhaps this technology revolve around us and make
us excited to get deeper look at in.
CHAPTER 1
Introduction
The advent of wireless technology is one of the biggest breakthroughs of modern
technology. This technology enables the users to utilize the freedom of movement and
the use of the equipment while on the move. Initially the use of wireless technology
was restricted for the military purposes to provide cutting edge to the defence forces.
Background
Wireless network provide connectivity between end nodes like PDA, Notebooks,
Mobile phones etc, without the use of wires. The transmission occurs on
electromagnetic waves, know as radio waves. Wireless network can be combination
of switches, routers and hosts without any wired connected to each other, they must
functional wirelessly. A router is responsible for packet forwarding in the network and
host are source or destination of the data flow. Wireless network giving edge compare
to traditional networks as there is no physical cable required for data transfer.
Wireless communication gives a freedom for routers and host to move freely in
wireless communication zone network. To accompany this freedom wireless
communication relay on channel know as radio frequency RF, however the detail of
wireless communication is not a scope of this project go to [T.S. Rappaport, 1996]
Wireless networks are attached with a centralized fixed network such as Access Point
(AP). The Access Point (AP) acts as a middle man between the wireless user and the
fixed network, as wireless users are on the move from one place to another AP keeps
While Mobile Ad hoc network have many advantages over the traditional wired
network, but when it come to security it pose a immense set of disputes. Firstly
Mobile Ad hoc network face the dispute of secure communication in wireless
medium. [Imrich et al. 2003] focused the MANET communication threats that pose
the radio wireless medium of Mobile Ad hoc network are;
Secondly, nodes having no security on the network may face threats from active
attack as impersonation to passive attacks as eavesdropping which lead network to
deceased and degrade the performance and resources. Vulnerable malicious node
attempts to intercept the radio wireless transmission and modify the packets without
the knowledge of authorized nodes. Likewise, various attacks Denial of Service could
be launch easily to start sending packets through vulnerable nodes which give false
update information to disturbed and poison the routing information in the network. As
result the network is destroyed and the motive of attack will be successful.
Aim of thesis
It is try to provide as much as information in regards of malicious node, the
techniques, methodology and tools which are assume as attacker approach to harm or
hijack the network resources in light of few attacks that are analysis on OPNET
MODELER 15, We believe implementing few number of attacks on MANET with
having enough knowledge of the attack as prospective of attacker thinking, can help
to investigate future more and bring them into the light of the weakness of the
network and having better understanding to secure the network. This thesis briefly
provides the detail information regards into MANET attacks.
Related Work
A lot of research has already been published regarding Mobile Ad hoc Network
security. This section presents some of the research literature related of MANET
security. [Yannick et al. 2008] have proposed security trust monitoring layer which let
other MANET domain or individual node to cooperate and substitute security
information, in response to prevent from the misbehaving nodes. [Mike and Breno,
2009] claim’s the algorithms SRP and Ariadne are insecure and subject to hidden
channel attack. Nevertheless, they come with a new approach and form a novel route
discovery algorithm and named “enairA”. [Junfang et al. 2006] define a threshold
cryptography which consists of three requirements of ring signature, correctness,
Research Object
During the research vulnerabilities and security issues are focus which posed a great
thread to MANET security. Giving a brief account of security issues which will be
analyzed individual OSI layer reference model for MANET to elaborate it, namely as
application layer, transport layer, network layer, data link layer and physical layer. It
is hope the study of this project gives a good understanding of security challenges and
solution in MANET.
What are the potential severe threats in MANET security? Which threats are
dangerous in term of network resources attacks?
What are the precaution and how to protect security to make it secure as using
state of the art security mechanism?
How simulation attacks are realistic and their impact on practical network?
What are the future directions which take the MANET security to compromise
with malicious and vulnerabilities?
Work Plan
OSI (Open System Interconnect) divide networking concept as a guide line to
understand the function of each single layer. Each single layer provides detail
information of the attacker prospective that can be launch attack on network. It is
believe that taking this approach will identify with the concept and methodology of
attacks on OSI layer as a reference model.
Scope
It is tried to define the security measurement precisely which could reflect MANET
attacks. As a matter of fact, a security defence lines always must be taken at early
Layer Attacks
As many attacks are executed and widely discussed in literature on wireless network,
thus physical layer is one of important layers of OSI reference model to secure in
order to protect the radio signal from many malicious attacks that can launch attack on
this layer. Launching attacks on physical layers are Jamming transmission,
interference, eavesdropping etc., is mostly applied and in common practice on this
layer. Attacker goal is to weak the strength of radio signal but also jamming the
transmission to bring the network resources down.
Jammer Attack
Jammer attack is commonly used to wipe out the transmission on the target wireless
networks. Jammer attack responsibility is to prevent nodes from sending and
receiving packets on network. Jammer function on physical layer to generate the
packet at a high constant rate on wireless medium to keep the medium busy,
consequently node on network can’t access the wireless medium due to the noise
jammer created in wireless medium. In this attack, the malicious node hire a device
called Jammer which is later used to observing the wireless radio frequency, until
Interference Problem
In wireless network interference has seen commonly, it occurs when set of nodes
clash with other devices which are using the same Radio Frequency (RF). Each
MANET node station use 802.11 network card to transmits packet in the network
when no other node transmitting the packets. If any other node happens to sending
packet, other node will have to wait to get the wireless medium free. Radio Frequency
(RF) occupies the unwanted interference Radio Frequency signals that interrupt the
normal operations as 802.11 protocol defined by IEEE get interfering Radio
Frequency single of sufficient amplitude and frequency which can appear as bogus
802.11 nodes transmitting a packet. This cause genuine 802.11 station to wait for
indefinite periods of time until interfering signal goes away. The sources of Radio
Frequency Interface which may cause the problem are 2.4GHZ this could be any
interference single including microwaves, wireless phones, and Bluetooth devices. [L.
Gavrilovsak and R. Prasad. 2006] discuses the wireless devices interference
coexistence with different technologies using the same frequency band and the
sharing the spectrum are problem for researcher, he emphasis the technologies Wi-Fi,
MANET which share the spectrum and frequency are already facing the problem of
crowded bandwidth boldering for spectrum etc, radio interface design, dynamic
frequency and network topologies selection.
De-Packaging Attack
Attack on MANET node can take place by de-packaging [Amitabh, 2008] De-
packaging is the process of removal of chip which is mostly attached in nodes for
transmitting signal. By dissolving the chip in resin silicon fuming acid which is the
first step towards decode the chip, by using micro probing or electro-beam
microscopy to read the ALU in processor, ROM cell etc can obtain easily. Physical
attack on chip is relatively hard cause of the expensive infrastructure requirements.
Eavesdropping Attack
Eavesdropping attack is the process of gathering information by snooping on
transmitted data on legitimate network. Eavesdrop secretly overhear the transmission,
however, the information remain intact but privacy is compromised. This attack is
much easier for malicious node to carry on as evaluate to wired network.
Eavesdropping attack in MANET shared the wireless medium, as wireless medium
make it more vulnerable for MANET malicious nodes can intercept the shared
wireless medium by using promiscuous mode which allow a network device to
intercept and read each network packet that arrives. The attacker node intercepts the
transmission as every MANET node is equipped with transceiver in range of the
communication which can be decode by means of malicious node to target the
authorized node on the network, malicious node can obtain the sensitive information
etc, modify the routing route or poison the routing table. This can seriously harm the
network resource and degrade the network performance. There are number of
hardware tools that allow promiscuous mode, such as Prisme2 network card with
using eavesdropping and high power antenna to intercepting wireless traffic as shown
in figure 2.1
Summary
MANET nodes are easy to deploy due to its design as all the transmission is based on radio
frequency on wireless medium. Links are discovered and break often, radio frequency is
much easier to interference with other device on the network. These entire drawbacks give the
advantage to malicious attacker opportunity to attack on legitimate networks. Physical layer
play a vital role to transmit data on entire network if physical layer is attack all the
communication paralyse, The security of physical layer on MANET is an issue for providing
the secure communication as well interference of other device using the same frequency on
the network can exploit the communication to place on.
RTS
CTS
G BUSY BUSY
BUSY BUSY
H
When IEEE 802.11 releases the WEP standard; it didn’t define key
management lacking interoperable key management of poor quality and key
tend to be long lived. Therefore wireless network which come with WEP
security key have to share key between each single node on network. It was a
big problem as it has to be programmed with the same key on other nodes in
network. If synchronize the key it is difficult to change all over the network
have to compromised. 802.11 do not specify WEP key size other than 40 bits.
Summary
Data link layers provide MANET connectivity from one hop communication between
direct neighbours through media access control (MAC) protocols. As MAC has its
own mechanism to transfer data on network, therefore vulnerable activities could
happen on this layer by violating the NAV field of RTS/CTS frames. Many security
mechanisms are proposed to prevent attacks on MANET like AES/CCMP and RSN.
• Addressing
• Encapsulation
• Routing
• De-capsulation
The main network layer process in MANET is ad hoc routing and packet forwarding.
In MANET the nodes act as host and router. Therefore router discovery and router
maintains in the MANET is effectively concern. Thus attacking on MANET routing
protocol not only disrupt the communication on the network even worst it paralyzed
the whole communication all over the network. Therefore, a security in network layer
plays a vital role to ensure the secure data communication in the network. To evaluate
the security threats in network layers, threats in network layer are classified as:
• Routing protocols
• Attacks on network layer.
Routing Protocol
Routing is process of moving packets from source network to a destination
network in internetworking devices. Routing protocols use a routing algorithm
which is a mathematical formula to forward the packet to its destination. The
routing algorithm varies from one routing algorithm to another etc OSPF, BGP.
In wireless network two types of communication paradigm exists, which use
different routing algorithm due to the nature of it use, infrastructure uses the
traditional wired routing and in Mobile Ad hoc wireless network nodes are
connected by wireless link through physical layer and data link layer, thus the
network topology may keep changing randomly due to the movement of nodes.
Routing protocols that are used in traditional wired network finding a path to
Many routing protocols have been proposed in MANET. The aims of these
routing protocols are to provide a reliable and secure communication and remove
fault in existing protocols.
S X M D
Yang proposed that two kind of attack fall in network layer, routing attacks and
packet forwarding attacks. [H. Yang et al. 2004b]
Routing attacks
There are different numbers of attacks in MANET routing that can be launch
against the legitimate network by employing malicious nodes. The purpose of
these attacks is to spoil the current routing tables that has been built up by
intermediate nodes and which are handling smoothly around the network
topologies. Following are the few of them which are commonly launched to
trigger the routing protocols.
Wormhole Attack
Wormhole attack is similar to black hole attack both attack share the similar
phenomena, only the difference in wormhole work with a collision with other
nodes. The goal of wormhole attack is to affect the MANET routing protocols
etc AODV and DSR route discovery. First attack record the packet at one
location and tunnels it to another location by employing the techniques using
wired network or using an off link wireless channel at different radio frequency.
The tunnel between these two colluding is called wormhole.
M
A
E
D
RREQ A, B, C, D, E Node
Data
Attacker1 Attacker 2
S D
Target
B C E F G
RREQ
RREP
Wireless link
Wormhole link
Jellyfish attack
Jellyfish attack is much similar to black hole attack, Jellyfish attack employing
the same techniques as black hole does. Jellyfish first invade on the forwarding
packet once it get hold of the packet it start delaying the data packet for a certain
amount of time before forwarding them. By doing this network performance
significantly end to end delay and delay jitter occurred. In jellyfish attack
malicious node send/receive route request and route reply normally. The main
mechanism of jellyfish is to delay packet without any reason. [A. Rajaram and
Palaniswami. 2010]
Byzantine attack
These are vulnerable Byzantine attacks as set of few or numerous node work as
cooperation to launched the attack against the target network. The compromised
intermediate nodes or set of nodes worked as collusion to form an attack. The
compromised nodes create routing loops and may drop packets. Byzantine
attacks are hard to detect.
Packet Replication
In this attack malicious node generate the replicates stale packets and start
sending it to a trigger network, in result the nodes on the network get overload of
these packets and it will consume the bandwidth of the network and start
consuming the battery of the nodes as well.
Rushing attack
The authorized node in on-demand routing protocol require a RREQ packet in
attempt to find a path to destination. When a malicious node receives a RREQ
packet from a source node it rapidly broadcast it throughout the network
topology before the other nodes on the network topology receives RREQ
packets. When nodes on the network received the original packet they assume
those packet are duplicate as they already received the packet form the malicious
node and discard the original packet.
SUMMARY
As Network layer encapsulate the IP address and send it to lower layers to transmit
the data therefore there a number of attack which launch on this layers. As network
layer perform the function of routing protocols. More sophisticated attacks are
implemented and being studied in order to prevent and to maintain the security level
in network layer. In this thesis we try to focus and bring up all the network layer
attack as possible.
Chapter No.5
Replaying acknowledgement
Replaying attacks are more vulnerable than any other attack on transport layer. The
MANET transport layer protocols TCP- Reno are vulnerable on this layer; as the
function of this protocol is to acknowledgement of the same segment multiple times
signify negative acknowledgment. Malicious nodes take the advantage and start
replying acknowledgment multiple times to make the source node consider that
packets are not transmitting successfully.
Session hijacking
In session hijacking the malicious node spoofs the IP address of the victim and
concludes the right sequence number and implements a DoS attack. Session hijacking
giving a opportunity to a malicious node to act as a authorized node. Once the DoS
attack is performed the target nodes become occupied for time being. The malicious
node masquerades as one of end nodes of the session and hijack the session.
Malicious attack
In this attack a malicious node attack on the operation system (OS) of the other host
node on the network. Malicious node sent a Malware or Trojan virus in to a victim
node. These attacks are severe and cause victim node to stop using the network
resources. Malicious code attacks are a vulnerable programme that attack on host
nodes. Trojan virus infects the operation system however Malware code copy itself on
Repudiation attack
Transport layer and network layer security is not enough to prevent the attacker to
attack on the nodes in network. Repudiation is the attack which is by passed by a
attacker from transport and network layer. Repudiation attacks refer as denial of
participation in the communication. Repudiation attack can be seen as Malware where
as an attacker node keep accessing the system as a selfish node and deny any
conducting operation which is coming from system in order to communication on the
network.
Summary
In this chapter we analyse the application layer attack on MANET. Application layer
not only provide end to end connectively but also filter the network packets. Number
of attack can be launched on application layer which are execute on OS on nodes
without any prior notice.
In active attack the packet transmitted over the wireless radio frequency could be
modified or corrupt during the data exchanged among network nodes from
intercepting of malicious node to trigger network. A malicious node can modify the
packet by setting up false information into packet header, as result routing events
puzzled and degrades the network performance, Active attacks can be classified in
two categories internal attack and external attack
Internal attack
Internal attack are took place inside the network, selfish nodes misbehave against
the network accordance to be faithful to network; the purpose of selfish node is to
save the battery life or its own purpose and not forwarding packet to other nodes.
These attacks on network are hard to detect compare of external attacks as attacker
is inside of the network and damage the resource of network by not cooperation.
External attack
These attacks are take place from outside the network from those node that do not
are part of the legitimate network. To prevent these attacks as a caution to use an
encryption technique mechanism and using firewall to block that access of
unauthorised node from network resources.
Passive attack
The function of the passive attack is to listening the radio frequency channel and get
as much as information on the network traffic before launch any attack whist the
passive attacks are launched to steal the important information regarding to target
Modification attack
In this attack the malicious node gather the requirement information on which
routing protocol network is running this can be accomplish by using
eavesdropping to hear the raw packet transmission. Once the required information
is gather malicious node create changes in the routing table of the target network
and broadcasting it. Due to the nature of the MANET they are mobile nodes new
path are discover and break frequently. Malicious nodes take the advantage of this
phenomenon and participate in packet forwarding process and launched the
message modification attack. [S.A. Razak et al. 2003] Further explain the
Modification attacks which can be classified as packet misrouting attacks and
impersonation attacks
In this attack the malicious node successfully divert the legitimate network
traffic into a false path from their original path route. Attack gets control on
the transmission staying in the network longer than its lifetimes by advertising
false routes. On the other side the source node retransmits the lost packets in
order to keep the transmission maintain. However in response to this it
consume lot of bandwidth and increase overhead in the network.
b) Impersonation attack
In this attack the attack steal the identity of another node in the network
known as spoofing. Attacker start receiving the routing information packets
and forwarding them fake routes, impersonation attack are easy to implement
on ad hoc network environment because of the current routing protocols do
not authenticate the routing packets. Therefore it’s easy to loophole to
masquerade on the network for malicious nodes.
Man-in-middle attack
This attack is also known as Tunnel attack, the attacker take control of the
transmission between the source and destination by intercepting them. The
Fabrication attack
Fabrication attack is also called as tampering attack, in this attack malicious node
do not interrupting or modifying any routing table thus the attacker fabricate its
own packets and transmit it on the network to create a chaos to bring down the
network. Fabrication attacks can also be launched from the internal misbehaving
nodes like route salvaging attacks.
The aim of this attack is to drain off limited resources in MANET nodes etc,
energy power, by keep sending the route request to the trigger nodes. Hence
routing protocol, sleep deprivation attack can be launched by flooding the
unnecessary routing packets in order to make the node unable to participate in
the network and unreachable by other nodes on the network.
Location Disclosure
A location disclosure attack can expose information about the network topology
and the location of nodes and structure which are set place. The information of
location disclosure may be very helpful in regards to adjacent to the target or
physical location. Routing hop limit is used to measure the distance and sending
ICMP error is recorded. Using these techniques attack can find out the target
nodes.
Summary
The security of MANET depends on the secure communication using the secure
routing protocols, MANET deal with a lot of security threats, and each attack has its
own specification that damage or destroyed the MANET node infrastructure. Secure
communication involves the secure transmission on the wireless medium and the
communication mechanisms among nodes.
Authentication
Authentication is the mechanism that node use to validate the data when transmission
is taking place by authorized nodes, this process of communication is authentic.
Without authentication malicious nodes get access on the network and data can be
modify without any prior notice to authorized nodes. Authentication stop the access of
other malicious node to function or to duplicating data to assure the recipient that
message is from that source node sent to other node in network.
Confidentiality
Confidentiality purpose is to ensure the access to legitimate nodes on data, as
confidentiality could be compromised by other means through malicious nodes.
MANET data that send to other nodes have to be comprehensible to receiving node
only, there is a probability that message can be intercepted by intruder node. In
mobile ad hoc network confidentiality is vital part for securing the transmission on
wireless radio as sensitive of data. As an example the transmitted messages send on
mobile ad hoc network can be caught by adversary appearing as authenticated mobile
node by using a spoofing attack, as result this vulnerable activity s/he may get access
to that data. To avoid this problem is used a technique called data encryption.
Availability
Availability proceeds the survivability and functioning of network to provide
guaranteed services at all the times despite malicious or misbehaviour nodes on the
network. If a malicious node or denial-of-service (DoS) attacks launch against the
network, where DoS attack can be launched at any layer of OSI model on MANET. A
malicious node use jammer to obstruct the transmission on physical layer, or data link
layer to disable the back off mechanism or on network layer to halt routing by
disturbing route discovery process. Additionally, malicious node brings down network
resources. Therefore to combat these challenges key management is fundamental for
implementation of any security framework.
Non-Repudiation
Non repudiation ensures the process of sending information among nodes on wireless
medium by sending nodes and receiving nodes. The nodes does not deny of
information that be transmitted or received by using a special mechanism called
digital signature know as cryptography which functions unique identifiers for each
other. [C. Siva Ram Murthy, 2004]
Table 5.A Review of Security Parameters in Mobile Ad-hoc networks. [Ola Mohamad
et al. ca 2010 no date]
Summary
To secure the communication on MANET network security must be a solid to giving
all the secure measurement to provide the communication. These are the first stage of
any common security services that are describe above. However security design for
MANET challenging task as nodes is moveable therefore achieving a maximum
security mechanism is challenging in MANET.
Continuous simulation
Continuous simulation is the system performance which can be characterized
by different equations and the simulation consists in solving the equation. It is
a simulation of a system of liner or non-liner differential equations. This set of
equations could be represented in time domain or transform domain. [Ricardo
and Mario, 1990]
Simulation tool
To conduct a research on MANET security issues there are different variety simulator
available. There are many kind of simulation application present which are available
for doing these tasks. Such as NS-2, OPNET, Glomosim. QualNet, OMNet++ .Our
work is based on OPNET MODELER 15.0, the reason for using this software is
because of it highly rich features, it has a leading atmosphere for network design and
modelling simulation, it support all most all industry standards network protocols,
applications and devices. [Gunnar and Olav, 2008] claim the OPNET MODELER
generally produces accurate result compare to other discrete simulators. OPNET is
recognized largely from many IT organizations. In addition to that, it’s programming
library help researchers and professionals to modify the network component to
measure the performance in the OPNET simulation. The OPNET environment
includes the study of all phases etc, Model design, data collection, simulation and
analysis.
1). Specification
2). Data collection and simulation
3). Analysis
Analysis
The phases are accepted to execute in sequence path and form and simulation cycle.
Network Level
In Network level topologies are design or model using network level
elements like routers, hosts and links. It used to define the network
topology of communication network. Network level is created by using
project editor tool in OPNET MODELER.
Node level
It defines the internal structure of the network level in terms of
functional element in node and the data flow. The functional element
are called modules, Modules are responsible and have the ability to
generate sending and receiving packets from other modules to perform
the function between nodes.
• Transmitter/receiver
• Node mobility
• Radio Frequency propagation
• Modulation
• MANET/Routing
• MAC protocols
Research Methodology
In order to understand the work that is been carried out on OPNET
MODELER simulation it generalizes to help us to understand the security
issues in MANET environment, it represents steps and stages as whole work
that implemented for security issues for MANET simulation. [J. W. Creswell,
2002] Enlighten the research methods as Quantitative and Qualitative.
According to him, Quantitative research is a inquiry strategies by mean of
certain experiments and simulation work that carry out to produce a statistical
data for analysis purpose. On the other hand, Qualitative research is
knowledge of researcher through participatory perspectives.
Network Model
For experiment purpose a normal network is formed with a 50 MANET node on the
area of 80x80. The simulation run time is set as 600 seconds which is equal to 30
minutes. Seed value is set as 300. Simulation Kernel is set as optimization.
Application profile, Profile configuration, and Mobility are configured to work the
network according to our requirements. The network model is shown in figure 9.4.
The network model consists of three scenarios. Scenario one is Jammer attack with
routing implementation AODV. Scenario two is misbehaving attack with routing
implementation AODV, and the third scenario is a Byzantine attack about the routing
implementation on AODV.
MANET Node
To simulate the formed network, Mobile Ad Hoc nodes are deployed in the area.
MANET process model is used as default no changes are taken place. Each MANET
node has a receiver and a transmitter to communicate on the network with other
nodes. As it has shown in figure 9.5.
Traffic Model
Traffic model is used to generate traffic on the network. A traffic which is a set of
application which generates the packet both exponential and constant when the
simulation time starts with random destination or selected destination packet delivery.
However is it essential to define a trajectory especially where nodes in the network
are constantly moving. The figure 9.6 show the parameter set for traffic model.
MANET Traffic
MANET node is a set of functional element which processes the communication
throughout the node itself and on network which are of similar specifications. The
MANET node consists of WLAN MAC layer (wireless_lan_mac). The wireless LAN
receiver (wlan_port_rx_0_0) accept the transmission on physical layer and pass it to
(ARP,TCP/IP) where the frame encapsulation opens and the packet is forward to
network layer, network layer look at the IP address hence TCP,UDP is analyse the
format of the packet weather its TCP or UDP once clear its routed to MANET
gateway (man_rt_mgr). The wireless transmitter (wlan_port_tx_0_0) receives the
Application configuration
Application configuration in OPNET MODELER is a set of rules which has varieties
of libraries to generate the traffic on the network according to the user requirement. In
order to simulate the OPNET MODELER simulation for each new project in the
software there is a need to configure the application configuration. For the network of
50 nodes in our network model application configuration is configured. Two
applications are defined in application configuration, HTTP, and FTP. HTTP is
configured as a heavy browsing and FTP is configured as high load. The reason for
generation high load on both application are to generate more traffic on the network
as the load on network will heaver it will be a good practice to understand the result
and having analysis on them.
Mobility Configuration
The mobility configuration required to create the mobility option for Mobile Ad hoc
nodes. Mobility configuration attributes are set as default random waypoint as shown
in figure 9.10
Performance Metrics
Performance metrics are essential feature which help to understand and evaluate the
attributes and performance of the network. Performance metric are well organized in
light of security attack against MANET network, performance metrics bring up a
better understanding of understand the network.
Throughput
To analyse the network we use the throughput of each scenario for each attack which
will help understanding the results.
Pulse Jammer attack can be deployed as fixed, Mobile and satellite in project editor.
Pulse jammer attack transmit noise in wireless medium hence the pulse jammer nodes
cause DoS attack with in the wireless channel. Pulse Jammer nodes transmit on a
single frequency marked by a periodic pulse train in time. To perform a jammer attack
on the network two jammers are deployed in the 50 nodes network area of 80x80.
Pulse jammer default values are change as default value shall not work well in our
network. Trajectory of the pulse jammer is configure as “vector” altitude is change to
12 instead of 0 because on 0 altitude the surface of the earth is curves on it and it will
affect the pulse jammer to transmits signal. Jammer band base frequency is set to
2,402, jammer bandwidth set 100,000, transmitter power 0.001 and pulse width 1.0.
As shown in diagram 10.1
The Pulse Jammer attack is implemented on the 50 nodes network with routing
implementation of AODV after configuration the Jammer node. The values of run
time simulation are kept as it is as mention in network model. The result of the Pulse
Jammer attack is taking from the Jammer scenario and is compared with the normal
network scenario. The throughput of the Jammer attack reduced the traffic on the
network compare to the normal network traffic. There is significant traffic destruction
of packets transmission on network when employing a Pulse Jammer attack.
Throughput
Pulse Jammer attack showed a traffic drop when jammer is implemented on the
network it not only disturbs the packet forwarding on nodes on network but also
degrade the network traffic. To analysis the traffic between normal network and Pulse
jammer network significant network packet dropping notice as pulse jammer
activation on the network keep the traffic at 20,00000 compare to the normal network
Summary
The experiment of Pulse Jammer attack showed that jammer attack is harmful for
network as jammer can easily break down the communication in network nodes. With
small amount of power jammer can spoil the atmosphere of the network and network
bandwidth and resources suffer from it. A jammer attack is a severe attack on physical
layer.
The throughput result showed in the presence of misbehaving nodes the transmission
degrade as misbehaving nodes drop the data and are not coloration in the network. As
the throughput shows the misbehaving node start dropping the packet when
simulation start compare to the normal network, the misbehaving nodes dropping
packet reach it minimum packet dropping delay at 10 minutes where packet dropping
rate is 18,00000 packet where as compare to normal network at 10 minutes time the
packet forwarding to other nodes on the network was maximum of almost 30,00000
packet. At the stage of 15 minutes the packet forwarding for misbehaving node and
normal network rate keep constant than suddenly as time passes the packet rate of
each network keep dropping for misbehaving node and packet rate keep constant for
normal network nodes. At the stage of 25minutes onward the misbehaving nodes
forwarding packet to other nodes on the network, however analysis showed the
average packet forwarding on normal network is 28,00000 packet duration time of 30
minutes on the other hand the misbehaving nodes in the network showed the packet
forwarding is not stable and its keep degrading with the passage of time. Thus
misbehaving node reach the 28,00,000 packet forwarding at 25 minutes and start
dropping. As shown in the figure 10.4
Summary
The misbehaving nodes showed that network performance degrade if they start act
malicious and not forwarding packet on time to other nodes. As results showed the
network traffic effected badly when malicious misbehaving node start dropping the
forwarding packet to other nodes on the network.
Throughput
Comparison with normal network and Byzantine node attack show a throughput result
in diagram. The malicious node drops the packets and not forwarding packet for other
nodes is clearly seen in the network result. As the run time of this simulation is for 30
minutes the Byzantine node in network throughput is slightly higher than the normal
network however it shows the network is having malicious activity on the network.
The overall run time simulation can be observed from the comparison of normal
network and Byzantine attack scenario. The average packet rate to forwarding packet
on normal network is 80 on the other hand the Byzantine network the packet
The function of Byzantine attack is to drop the packet and also drop the routing table
which are forward to other nodes to find a short route to other destination. The
Byzantine attack in this scenario showed that it is dropping the routing table for other
nodes and behaving malicious on purpose. AODV routing table forwarding for
normal network is 32,000 but when a malicious node attack on the network with
Byzantine activities it start dropping the routing table route to forwarding for other
nodes. The average response forwarding routing table route to other nodes is 26,000
which is significantly less and clearly showed the dropping of routing route of nodes
in network as shown in figure 10.7.
Summary
The Byzantine attack on AODV routing protocol showed the network routing table
dropped when malicious node activate itself, the attack spoil the transmission and
network traffic suffer badly.
As only few attacks are implemented on this project. If we have given more time we
look at the other attack and try to implement in the project with more nodes and make
the network bigger. Jammer attack model which effect the transmission on network by
making noise and degrade the network performance. Misbehaving nodes attack stop
forwarding packet to other nodes and start misbehaving in the network. And
Byzantine attack drops the routing forwarding table or drops the forwarding packet to
other nodes give a significant result to understand the MANET in vulnerable
scenarios.
3 Amitabh Mishra, 2008. Security and quality of services in ad hoc wireless networks,
Cambridge press, page 57.
4 Andreas Hafslund and Jon Andersson, Thales Norway AS, 2006. 2-Level
Authentication Mechanism in an Internet connected MANET.
http://www.wireless.kth.se/adhoc06/submissions_final/05_02Andreas_Hafslund.pdf
[Accessed Feb – April 2010]
5 Ashikur Rahman, Pawel Gburzynski, 2006. Hidden Problems with the Hidden
Node Problem. http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.61.365&rep=rep1&type=pdf. [Accessed Feb – April 2010]
8 Cisco Networking
http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.pdf [Accessed Feb –
April 2010]
11 Dinesh Mishra, Yogendra Kumar Jain, Sudhir Agrawal, 2009. Behavior Analysis of
Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network.
12 Erdal Cayirci, Chunming Rong, page 116, 2009. Book Security in wireless Ad Hoc
and Sensor Network, John Wiley & Sons Ltd.
16 Hasnaa Moustafa and Houda Labiod, 2005. Source Routing-based Multicast Protocol
for Mobile Ad hoc Networks.
18 Houda Labiod, Mohamad Badra, 2007. New technologies, mobility and security,
springer.
19 Imrich Chlamtac, Marco Conti, Jennifer J. N. Liu, 2003. Mobile ad hoc networking:
imperatives and challenges.
20 http://www.scribd.com/doc/19471793/MobileAdHocNetworkingImperativesa
ndChallenges [Accessed Feb – April 2010]
22 Jerry Banks, John S. Carson II, Barry L. Nelson, David M. Nicol, 2010. Discrete-
Event System Simulation, Fifth Edition, Chapter No 1, page no 16. Pearson.
24 Junfang Xiao, Guihua Zeng, Jian Liao and Peiwei, 2006. Huang Improved Threshold
Ring Signature for Ad-hoc Group.
25 Kamanshis and Md. Liakat, 2007, Security Threats in Mobile Ad hoc Network.
Master Thesis. Blekinge Institute of Technology.
28 Marianne Azer, Sherif El- Kassas, Magdy El-Soudani, 2009. A Full Image of the
wormhole attaks, towards Introducing Complex Wormhole Attacks in wireless ad hoc
networks.
29 http://arxiv4.library.cornell.edu/ftp/arxiv/papers/0906/0906.1245.pdf
[Accessed Feb – April 2010]
32 N. Shanthi, Dr. Lganesan and Dr. K. Ramar, 2010. Study of Different attack on
multicast mobile ad hoc network.
36 Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala, 2008. A Review
of Current Routing Attacks in Mobile Ad Hoc networks.
http://eprints.utm.my/8213/1/NgadiMA2008_AReviewCurrentRoutingAttacksInMobi
leAd-hocNetworks.pdf [Accessed Feb – April 2010]
41 Ye, S. Lu, and L. Zhang, 2004. Security in Mobile Ad hoc Networks: Challenges and
Solutions.
44 Yihong Zhou, Dapeng Wu, Scott M. Nettles, 2004. Analyzing and Preventing
MAC-Layer Denial of Service Attacks for Stock 802.11 Systems.
http://www.arias.ece.vt.edu/publications/conferences/UKC06.pdf [Accessed Feb –
April 2010]
45
46 Yannick Lacharite, Dang Quan Nguyen, Maoyn Wang, and Louise Lamont,
2008. A Trust-Based Security Architecture For Tactical MANETs.
http://202.194.20.8/proc/MILCOM08/Milcom08/pdfs/654.pdf [Accessed Feb – April
2010]