You are on page 1of 7

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)

ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

IDENTIFYING AND EVALUATING JELLY FISH ATTACK


USING AODV PROTOCOL
,
b
Kulbir Singh a , Jyoti Arora
a

M.Tech Student, CSE Department , DBU, Manigobindgarh


b

Assistant Professor, CSE, DBU, Manigobindgarh

ABSTRACT

Routing is a process of exchanging information from one station to other stations of the network. The
characteristics of self-organization and wireless medium make Mobile Ad hoc Network (MANET) easy to set
up and thus attractive to users. The open and dynamic operational environment of MANET makes it vulnerable

to various network attacks. A common type of attacks targets at the underlying routing protocols. Jelly Fish

go through themselves.

.O

Attack has opportunities to modify or discard routing information or advertise fake routes to attract user data to

Keywords: AODV, Jelly Fish attack, Network Layer, MAC, Physical Layer.

INTRODUCTION

IJ
TC

I.

A Mobile Ad-hoc Network (MANET) is a self-configuring network composed of mobile


nodes without any fixed infrastructure. In a MANETs, there are no difference between a host
node and a router so that all nodes can be source as well as forwarders of traffic. Moreover,
all MANET components can be mobile. They provide robust communication in a variety of
hostile environment, such as communication for the military or in disaster recovery situation
when all infrastructures are down. A very important and necessary issue for mobile ad hoc
networks is to finding the root between source and destination that is a major technical
challenge due to the dynamic topology of the network. Routing protocols for MANETs could
be differ depending on the application and network architecture. The efficiency of the
wireless link can be increase by Multicasting through sending single copy of messages to all
group members. Multicast transmission is a more effective mechanism when compared to
unicasting in supporting group communication applications. There are various routing
protocols that have been proposed for MANETs. In this paper, we present AODV based
routing protocols that works on unicast or multicast routing schema.

93

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

II. CLASSIFICATION OF ATTACKS

Fig. 1: Infrastructure Ad Hoc Networks

IJ
TC

.O

Mobile Ad Hoc Networks form a network cloud of clients and routers. The routers can be
either fixed in their location providing high speed routing functionality to clients and
connecting them to internet via gateway routers (Fixed Infrastructure or centralized topology)
or behave as both client and router (Dynamic Network topology). The network can be
attacked in any of the layers by jamming the signals in physical layer, misusing the protocol
in MAC layer, misrouting the packets in network layer or physically tampering the devices.
Various attacks are being shown in the Table 1.1 below:
Table 1.1: Attack Classifications

Layer

Attacks

Routing Layer

Jelly Fish Attack, Black Hole, Grey


Hole Attack, Sybil Attack

MAC Layer

Selfish , MAC Misbehavior

Physical Layer

Jamming ,Scrambling

III. RELATED WORK

Aad, Hubaux and Knightly et.al.[1] in 2008 discovered that mobile ad hoc network
suffered from number of security issues i.e. an attack that degrades the performance of
mobile ad hoc network. There are number of attacks discovered and they are categorized as
94

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

active as well as passive attacks, and also categorized as layered attacks. One of them was
jelly fish attack. There is a jelly fish attacker node which first needs to intrude into multicast
forwarding group. It then delays data packets unnecessarily for some amount of time before
forwarding them. This results in significantly high end-to-end delay and thus degrades the
performance of real time applications. It affects the packet end-to-end delay and the delay
jitter, but not the packet delivery ratio or the throughput.

M.Ramakrishan and S.Shanmugavel et.al.[27] in 2008, aimed on the study of various


routing techniques for MANET nodes to obtain the routing through which data is to be
transferred to the destination with maximum throughput. The first technique, to study and
implement the changeover routing protocols from DSR to AODV using Glomosim
simulator. In the second routing technique, the self-healing routing methodology for ad hoc
on demand routing protocol with shortest path using Glomosim.

V. Singla, R. Singla and A. Kumar et.al.[31] in 2009, comparison the routing protocols i.e.
AODV, TORA, OLSR and DSR by using metrics such as network load, throughput and
delay. TORA shows good performance in terms of transmission of packets. AODV show
better performance for throughput and DSR shows an average level of performance. Highest
amount of traffic is sent by OLSR.

.O

I.Raza and S.A Hussain et.al.[29] in 2010, how to counter misinterpretation packet
reordering with packet loss when retransmissions are due to persistent packet reordering by
malicious nodes rather than packet loss due to traditional reasons. They concluded that the
performance of TCP variants differs in AODV and DSR network under packet reordering
attack (persistent packet).

IJ
TC

G.S Bindra, A. Kapoor and A. Aggarwal et.al.[7]in 2012, present a technique to identify
multiple black holes cooperating with each other and a solution to discover a safe route
avoiding cooperative black hole attack. The proposed solution can be applied to identify
multiple black hole nodes and to discover secure path from source to destination.
IV. EXPERIMENTAL SCENARIO

The scenario shown in figure 2 contains 60 wireless mobile nodes of mobile ad-hoc network
built in the OPNET 14.0 Modeler. It contains jellyfish attacker nodes which disrupts the
performance of mobile ad-hoc networks. Here, 25 to 59 are the attacker nodes. So all these
components contribute to form mobile ad-hoc network, and all the components are present in
the object palette (library) of OPNET 14.0 Modeler.
Simulation is to start the network for its working and then we check the performance by
collecting the results. The forwarding rate is taken as 5000 packets per second in Jelly fish
flow and in the normal flow the value for forwarding rate is 500000 packets per second.

95

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

.O

Fig. 2: Experimental Setup

V. ANALYZING RESULTS

I. AODV Protocol (with Normal Flow)

IJ
TC

In this scenario, 60 mobile nodes are simulated. The AODV Protocols gives results for four
parameters (Delay, Data dropped, Network load and Throughput) for 60 mobile nodes with
Normal Flow.

Fig. 3: Data dropped in AODV protocol with 60 Nodes


96

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

The first graph gives Data Dropped (Buffer Overflow) which is initially equals to 0.0sec.
After some time data drop rate gradually increased with the elapse of time. Second graph
shows delay/sec. third graph shows the load in bits/sec initially load is 0 (zero) at the end of
simulation the peak value of load is more than 10,00,000 bits/sec. fourth graph shows the
throughput. It increases with the as simulation reaches to its end. Peak value of throughput is
more than 10,000,000 bits/sec.
II. AODV Protocol (with Jelly Fish Flow)

IJ
TC

.O

The above figure 4 shows performance of AODV protocol after Jelly Fish attacker nodes are
inserted in the Network. First graph shows data dropped (buffer overflow), initially we
observed no data drop, after few minutes it gradually increased up to 400000 bits\sec. Second
graph shows delay, Maximum value of delay is 40 sec at the end of simulation. Third graph
shows the Load, at 0 sec load was 0 bits/sec. After few minutes of simulation it gradually
increased up to peak value of more than 1,000,000bits/sec. Fourth line graph displays
Throughput of network, initially throughput was 0 bits/sec but after some time its value
become more than 10,000,000bits/sec.

Fig. 4: Data dropped in AODV protocol with 60 Nodes for Jelly Fish Flow

IV. CONCLUSION AND FUTURE WORK

In this thesis, we have implemented Jelly Fish Attack and have also simulated the network
attack models that exploit the weakness of the existing network. The attack models are used
to make jelly fish attacker wireless nodes and create various malicious environments, in
which the performance of network is evaluated. Through the collected evaluation metrics
from the existing and attacking scenarios, the impacts of attack upon the existing network are
97

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

then studied. The mobility model of the malicious nodes affects the number of data packets
to the destinations.
REFERENCES
[1] Aad, I. Hubaux, J.P. and Knightly, E.W. (2008), Impact of Denial of Service Attacks on Ad Hoc
Networks, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4.
[2]Ahmed, M. Momen, A. and Haitham, S.H. (2010), A Survey on Security Enhanced Multicast Routing
Protocols in Mobile Ad Hoc Networks, IEEE.
[3] Ali, S. Omari, K.A. and Sumari, P. (2010), An overview of mobile ad-hoc networks for the existing
protocols and applications, Journal on Applications of Graph Theory in Wireless Ad-hoc networks and Sensor
Networks, Vol.2, No.1.

[4] Amandeep kaur and Deepinder Singh Wadhwa, Effects of Jelly Fish attack on Mobile Adhoc
Networks Routing Protocol, International journal of Engineering Research and Application, vol 3, Issue 5
Sep-Oct2013.

[5] Ashok Desai, Review Paper on deection and prevention techniques of gray hole attack in MANET,
IJCSMC, Vol 2 May 2013.
[6] Bilandi, N. and Verma,H.K., Comparative analysis of reactive, proactive and Hybrid routing protocols in
MANET , IJECSE.

.O

[7] Bindra, G.S. Kapoor, A. Narang, A. and Aggarwal, A. (2012), Detection and Removal of Co-operative
Black hole and Gray hole Attacks in MANETs, International Conference on System Engineering and
Technology, Bandung, Indonesia.

IJ
TC

[8] Diya Naresh Vadhwani, Deepak kulhare, Megha Singh, Behaviour Analysis of DSR MANET Protocol with
HTTP Traffic Using OPNET , International Journal of innovative Research in Computer and Communication
Engineering.
[9] Ekta Barkhodia; Parulpreet Singh; Gurleen Kaur Walia, Performance analysis of AODV Using HTTP
traffic under Black Hole attack in MANET. CSEIJ,Vol 2 june 2012.
[10] Ekta Nehra, Er. Jasvir singh, Performance Comparison of AODV, TODV, OLSR, ABR Using OPNET,
International Journal of Advanced Research in Computer Science and Software engineering, Vol 3, Issue 5,
May 2013.

[11] Gowda, S.R. and Hiremath, P.S. (2013), Review of Security Approaches in Routing Protocol in Mobile
Ad-hoc Network, International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2.
[12] Harmanpreet kaur, Er. Jaswinder Singh, Performance comparison of OLSR, GRP, and TORA Using
OPNET, International Journal of Advanced Research in Computer Science and Software engineering, Vol 2,
Issue 10, Oct-2012.
[13] Hoebeke, J. Moerman, I. Dhoedt, B. and Demeester, P., An overview of Mobile Ad-hoc Network:
Applications and Challenges, Department of Information Technology, Ghent University- IMEC V2W, Sint
Pietersnienw straat 41, B-9000 Ghent Belgium.
[14] Jain, A.K. and Tokekar, V. (2010), Classification of Denial of Service Attacks in Mobile Ad Hoc
Networks, International Conference on Computational Intelligence and Communication Systems, IEEE.
[15] Jasjeet Singh, Er.Sukhjit Singh, Performance Analysis of variable bit rate for MANET protocols with
Video and Audio codec, IJAIR, ISSN 2278-7844.

98

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 1, Issue 3, DECEMBER 2015.

[16] Johansson, P. Larsson, T. and Hedman, N. (1999), Scenario based performance analysis of routing
protocols for Mobile a-hoc network, Mobicom 99 Scattle Washington USA.
[17] Jawandhiya, P.M. Ghonge, M.M. Ali, M.S. and Deshpande, J.S. (2010), A Survey of Mobile Ad Hoc
Network Attacks, International Journal of Engineering Science and Technology, Vol. 2(9).
[18] Khirasariya, H.R.(2013), Simulation study of jellyfish attack in MANET using AODV routing protocol ,
Journal of Information, Knowledge and Research in computer Engineering, Volume-02.
[19] Kuldeep Vats, Mandeep Dalal, Deepak Rohila, Vikas loura, OPNET Based Simulation and
Performance Analysis of GRP Routing Protocol , IJARCSSE, Vol 2, Issue 3, Mar-2012.
[20] Kumar, G. Saha, R. and Rai, M.K., DSAB- A hybrid approach for providing security in MANET,
International Journal of Information and Security Science, Vol.1, No.3.
[21] Mr.Hepikumar R. Khirasariya, Simulation Study of Jelly Fish attack in MANET using AODV Protocol,
Journal of Information, Knowledge and Research in Computer Engineering.

[22] Mohammad Wajid, Vipin Kumar and R H Goudar , Comparative Performance of analysis of Routing
protocols in Mobile Ad-hoc Networks under Jelly Fish Attack, IEEE International Conference on Parallel,
Distributed and Grid Computing.

[23] Osamah Yaseen Fadhil, Performance Evaluation of AODV and DSR routing protocols with PCM and
GSM Voice encoding Schemes, IJCSMC, Vol 2, Issue 9, Sep. 2013.

.O

[24] Papadimitratos, P. and Haas, Z.J. (2002), Security routing for mobile ad-hoc networks, proceedings of
CNDS 2002, San Antonio, TX.
[25] Park, V.D. Corson, M.S., A highly Adaptive Distributed Routing Algorithm for Mobile Wireless
Networks Sixteenth Annual Joint Conf. of the IEEE Comp. and Comm. Societies. Proc., vol.3 pages 1405
1413, 1997.

IJ
TC

[26] Patel, H.P. and Chaudhari, M.B. (2012), Impact Of Jellyfish On Wireless Ad-Hoc Network, IJERT,
VOL.1.
[27] Ramakrishnan, M. and Shanmugavel, S. (2008), New Approaches to Routing Techniques of MANET
Node for Optimal Network Performance, IJCSNS, VOL.8 No.11.

[28] Ramanathan, R. and Redi, J. (2012), A brief overview of Ad-hoc networks: Challenges and directions,
IEEE Communications magazine, 50th anniversary.
[29] Raza, I. Hussain, S.A. Ali, A. and Raza, M.H. (2010), Persistent packet reordering attack in TCP based
Ad hoc networks, IEEE.
[30] Singh, A. and Shaiendra, M. (2010), Performance Analysis of Routing Protocol in Mobile Ad hoc
Networks, IJCSNS VOL.10 No.8.
[31] Singla, V. Singla, R. and kumar, A. (2009), Performance Evaluation and Simulation MANET routing
protocols, IJEIT, Volume No. 1.
[32] Wazid, M. Katal, A. and Goudar, R.H. (2012), Cluster and super cluster based intrusion detection and
prevention techniques for jelly fish reorder attack, 2nd IEEE International conference on parallel, Distributed
and grid computing.
[33] Wazid, M. Kumar, V. and Goudar,R.H. (2012), Comparitive Performance Analysis of routing Protocols
In Mobile Ad Hoc Network under Jelly Fish Attack, 2nd IEEE International conference on parallel, Distributed
and grid computing

99

You might also like