You are on page 1of 12

AVOIDANCE OF WORMHOLE ATTACK IN MANET

USING AODV ROUTING PROTOCOL


A PROJECT REPORT
Submitted in partial fulfillment for the award of the degree
of

Master of Computer Applications


by

Deepika. V
(12MCA0073)

SCHOOL OF INFORMATION TECHNOLOGY & ENGINEERING

[SITE]
MAY, 2015

DECLARATION BY THE CANDIDATE

I hereby declare that the project report entitled AVOIDANCE OF


WORMHOLE

ATTACK

IN

MANET

USING

AODV

ROUTING

PROTOCOL submitted by me to VIT University, Vellore in partial fulfillment


of the requirement for the award of the degree of Master of Computer
Applications is a record of bonafide project work carried out by me under the
guidance of Dr. K. JOHN SINGH. I further declare that the work reported in this
project has not been submitted and will not be submitted, either in part or in full,
for the award of any other degree or diploma in this institute or any other institute
or university.

Vellore:

Signature of the Candidate

Date:

ii

SCHOOL of INFORMATION TECHNOLOGY AND


ENGINEERING
CERTIFICATE
This is to certify that the project report entitled AVOIDANCE OF
WORMHOLE

ATTACK

IN

MANET

USING

AODV

ROUTING

PROTOCOL submitted by Deepika. V (12MCA0073) to VIT University,


Vellore, in partial fulfillment of the requirement for the award of the degree of
Master of Computer Application in Computer Application is a record of bonafide
work carried out by him under my guidance. The project fulfills the requirements
as per the regulations of this Institute and in my opinion meets the necessary
standards for submission. The contents of this report have not been submitted and
will not be submitted either in part or in full, for the award of any other degree or
diploma and the same is certified.
Internal GUIDE
The project work is satisfactory / unsatisfactory

Internal Examiner

External Examiner
Approved by

Program Chair

Dean

MCA

School of Information Tech. and Engg.


iii

ACKNOWLEDGEMENT
It is my pleasure to express with deep sense of gratitude to Dr. K. John Singh,
School of Information Technology & Engineering (SITE), VIT University, for his
constant guidance, continual encouragement, and understanding, more than all, he
taught me patience in my endeavor. My association with him is not confined to
academics only, but it is a great opportunity on my part of work with an
intellectual and expert in the field of network security. I would like to express my
gratitude to Dr. G.Viswanathan, Mr. G.V.Selvam, Dr. V. Raju, Dr. S. Narayanan,
and Dean Dr. K. Ganesan, School of Information Technology and Engineering, for
providing with an environment to work in and for his inspiration during the tenure
of the course. In jubilant mood I express ingeniously my whole-hearted thanks to
Program Chair Dr. Jeyanthi. N, all teaching staff and members working as limbs of
our university for their not-self-centered enthusiasm coupled with timely
encouragements showered on me with zeal, which prompted the acquirement of
the requisite knowledge to finalize my course study successfully. I hereby thank
MCA Project coordinator, Dr. Prabukumar M - SITE, Assistant Professor (SG) for
their valuable suggestions and continuous support throughout my MCA course. I
would like to thank my parents for their support. It is indeed a pleasure to thank
my friends who persuaded and encouraged me to take up and complete this task.
At last but not least, I express my gratitude and appreciation to all those who have
helped me directly or indirectly toward the successful completion of this project.
Place: Vellore
Date:

Deepika. V

iv

ABSTRACT

A Mobile Ad hoc Network (MANET) is an infrastructure less network that


includes of the mobile nodes which are independent of each other and connected
through a wireless network. This type of network always faces the security threats.
Networks have different types of attacks, in that wormhole attack is one of the
well-known and noticeable attacks. These type of attack lets the malicious node to
pretend like its an actual node in the network and acts like it is the nearest node to
the source node. And also it is capable of dropping the packets sent by the source
node to the destination node. Earlier many approaches were proposed in order to
avoid and reduce the wormhole attack. In order to provide an efficient method to
overcome this problem, an efficient method is proposed which is capable of
reducing the packet loss and assures the security. This proposed method is used
along with the AODV (Ad hoc On demand Distance Vector) routing protocol
which is capable of reducing packet loss and delay.

TABLE OF CONTENTS

CHAPTER NO.

TITLE

PAGE NO.
iii

ABSTRACT

vi

LIST OF FIGURES
LIST OF TABLES

Xi

LIST OF ABBREVIATIONS

xii

1.

INTRODUCTION

2.

LITERATURE SURVEY

2.1 DSR (Dynamic Source Routing)

2.2 Multipath On Demand Network Routing Protocol

2. 3 MANET

2.4 Passive Attack Mechanism

2.5 MAC Protocols

2.6 E-HSAM

2.7 Wireless Sensor Networks

2.8 Advanced Encryption Standard

12

2.9 Linear network coding

13

2.10 DAWN

14

2.11 Delay Tolerant Network

15

IMPROVED AODV ROUTING PROTOCOL

18

3.1 Objective

18

3.

vi

3.1.1 MANET

18

3.1.2 Characteristics of MANET

19

3.1.3 Advantages in using MANET

19

3.1.3 Attacks in MANET

19

3.2 AODV Routing Protocol

22

3.3 Drawback

24

3.4 Solution

24

3.5 MD5 Algorithm

26

3.6 System Architecture of IAODV

27

3.7 Module Description

27

3.7.1 Route Discovery

30

3.7.2 Monitoring

33

3.7.3 Self-Destruction

34

3.8 Detailed Design

36

3.8.1 Use Case Diagram of IAODV

36

3.8.2 Class Diagram of IAODV

37

3.8.3 Sequence Diagram of IAODV

37

3.8.4 Collaboration Diagram of IAODV

38

3.8.5 Activity Diagram of IAODV

39

3.8.6. State Transition Diagram

40

3.9 Testing

40

3.9.3 Functional Testing

vii

41

3.9.2 Unit Testing

40

3.9.4 System Testing

42

3.9.5 Performance Testing

42

3.9.6 Testing Approaches

42

3.9.6.1 Integration Testing

42

3.9.6.2 Top Down Integration

42

3.9.6.3

Setting

Up

Testing

Environment
3.9.6.4 Adding Test Scripts and Test
Data to the Project
4.

5.

42

42

IMPLEMENTATION

43

4.1 Basics

43

4.1.1 Starting NS

44

4.1.2 Starting NAM

46

4.1.3 NS Simulation (TCL) Script

47

4.1.4 Event Scheduler

50

4.2 Screen Shots

53

4.3 Graphical Representation

56

CONCLUSION

58

REFERENCES

59

viii

LIST OF FIGURES

FIGURE NO

TITLE

PAGE NO.

1.1

In Band Channel

1.2

Out Band Channel

3.1

AODV Protocol messaging

23

3.2

System Architecture of IAODV

27

3.3

Normal Data Transfer

29

3.4

Malicious Node Interruption

29

3.5

RREQ Message Format

32

3.6

RREP Message Format

32

3.7

HELLO Message Format

32

3.8

RERR Message Format

32

3.9

Use Case Diagram of IAODV

35

3.10

Class Diagram of IAODV

36

3.11

Sequence Diagram of IAODV

37

3.12

Collaboration Diagram of IAODV

38

3.13

Activity Diagram of IAODV

39

3.14

State Transition Diagram of IAODV

40

3.15

Testing Information Flow

42

ix

4.1

NAM Window

45

4.2

A Simple Network Topology

48

4.3

Event Scheduler

51

4.4

OTCL Event Command

51

4.3

Nodes Initiated

53

4.4

Node Tries to Access the Data

53

4.5

Route Discovery Process

54

4.6

Existence of Wormhole Attack

54

4.7

Choosing a Alter Path

55

4.8

Average End-to-End Delay

56

4.9

Average Throughput

56

LIST OF TABLES
TABLE NO

TITLE

PAGE NO.

3.1

Routing Table

34

4.1

TCL Member Functions

52

4.2

Simulation Setup

52

xi

LIST OF ABBREVIATIONS

MANET

Mobile Ad Hoc Network

CN

Current Node

PN

Priority Node

SPN

Second Priority Node

TTL

Time To Live

MN

Malicious Node

AODV

Ad Hoc On Demand Distance Vector

xii

You might also like