Professional Documents
Culture Documents
DSR [8] is an on-demand routing protocol which is 1. Selfish node type 1: Theses nodes participate cor-
based on source route approach. In this approach, each rectly in routing function but not forward data pack-
packet carry in its header the source route which contains ets it receive for other node; so data packets may be
the complete, ordered list of nodes through which the packet dropped instead of being forwarded to their destina-
must pass. tion.
The DSR protocol consists of two mechanisms: Route 2. Selfish node type 2: Theses nodes do not participate
Discovery and Route Maintenance. Route Discovery is the correctly in routing function by not advertising avail-
mechanism by which a node S wishing to send a packet to able routes, for example: in DSR selfish node may
a destination D obtains a source route to D. To perform a drop all RREQ they received or not forward a RREP
Route Discovery, the source node S broadcasts a ROUTE to some destination. Consequently, this selfish node
REQUEST (RREQ) packet that is flooded through the net- will not participate in the requested routes.
work in a controlled manner and is answered by a ROUTE
REPLY (RREP) packet from either the destination node or
3.2. Malicious nodes
another node that knows a route to the destination. To re-
duce the cost of Route Discovery, each node maintains a
cache of source routes it has learned or overheard. Unlike, selfish nodes, malicious nodes don’t preserve
their resource and try to sabotage other nodes by trying
Route Maintenance is the mechanism by which a
to participate in all established routes. Consequently, the
packet’s sender S detects if the network topology has
malicious nodes can force other nodes to use a ”danger-
changed. When Route Maintenance indicates a source route
ous” route which is under their control. The manoeuvre
is broken, S is notified with a ROUTE ERROR (RERR)
that the malicious nodes may take is protocol-dependent. In
packet. The sender S can then attempt to use any other
the context of DSR routing protocol, a malicious node can
route to D already in its cache or can invoke Route Discov-
claim to have a route to some destination and reply with
ery again to find a new route.
false information to the received RREQ. After being se-
lected in the requested route, it can cause DoS attack by
3. Misbehaving nodes model dropping all the received packets, in Black Hole attack,
or selectively dropping packets in Grey hole attack. Even
more, malicious nodes can cause severe damage by collab-
Routing protocols provide two main functions: Rout- orating in the attack, such as wormhole attack.
ing function and data forwarding function. The former is
concerned with routes discovery and routes maintenance.
The latter is concerned with data packets relaying toward 4. Simulation
the destination through the established route. Both routing
and data forwarding can be affected by misbehaving nodes In order to measure the impact of selfish or malicious
presence; misbehaving nodes can lead the network into mal- nodes on ad hoc network performances we modified the
function by not following routing and packets forwarding DSR implementation in (ns-2) [18] to simulate the different
functions. We consider two kinds of misbehaving nodes: kinds of misbehaving nodes described in section 3: selfish
selfish nodes and malicious nodes. We consider the follow- type1, selfish type 2 and malicious. First we present self-
ing parameters that may govern the severity of an attack: ishness impact, then malicious node impact. In our simu-
lations, nodes move according to the random waypoint mo-
bility model [2]. We use 30 or 60 mobile nodes that move in
• Time: start and stop time,
a rectangular surface of size 1000×1000 m2 to increase the
average number of hops per route, creating a more challeng-
• Degree: the probability (P ) of misbehaviour, ing environment for the routing protocol. The data com-
munication pattern in our study uses 20 source-destination
• Target: victims’ nodes (all nodes, a subset of nodes). pairs, each sending a Constant Bit Rate (CBR) flow of 4
593
Parameter Value Here we consider selfish nodes that behave according to
Routing Protocol DSR selfish type 1 then selfish type 2 described in section 3.1.
Simulation time 500 seconds Selfish nodes target all nodes during all simulation time.
Number of mobile nodes 30 nodes/ 60 nodes As shown in figure 1(a), the percentage of selfish nodes
Transmission Range 250 m has a significant effect on the fraction of packets that are
Movement Model Random Waypoint successfully delivered in the network. The PDF decreases
Pause time 10 seconds when the percentage of selfish nodes increases. We note that
Max speed 5 m/s the selfish type 1 behaviour have the same effect on PDF
Traffic type CBR in both low and high nodes density. However, as shown
Data payload 512 bytes in figure 1(b), this effect decreases when the probability of
Rate 2 packets/seconds selfishness type 1 decreases.
Target of attacks All nodes
Frome figure 2, we note that selfishness type 2 has not
Time of attacks 500 seconds
a big effect on PDF, especially in high nodes density. The
Table 1. Simulation parameters reason is that selfish nodes that drop the received RREQ are
avoided from participating in routes setup giving chance to
other well behaving nodes to participate in the route con-
data packets per second. Each data packet is 512 bytes in struction. However, as shown in figure 3, selfishness be-
size. All simulations were run on identical movement and haviour type 2 can affect the average end to end delay by
communication scenarios. The results presented here are introducing long time buffering at intermediate nodes which
the average from 10 simulation runs with different seeds. cooperate in packet forwarding process. The average EED
The seeds influence the placement and the movement of the increases when the percentage of selfish nodes increases,
nodes. Table 1 resumes simulation parameters. especially in low node density.
To measure the impact of misbehaving nodes we use two
metrics :
4.2. Simulation result of malicious be-
• Packet Delivery Fraction (PDF) : The fraction of the haviour
data packets generated by the CBR source that are de-
livered to destination.
In this section we measure the impact of one malicious
• Average End to End Delay (EED) : The average de- node performing black hole attack by varying nodes mobil-
lay between the sending of data packet by the CBR ity and number of CBR connections. We consider one ma-
source and its receipt by the corresponding receiver. licious node located in the center of the area of simulation
This includes all delays caused during route acquisi- that performs black hole attack to all nodes (degree = 1.0)
tion and buffering at intermediate nodes during all period of simulation.
One problem with route discovery process in DSR is that
not only the destination node can send a route reply mes-
4.1. Simulation result of selfish behaviour
sage (RREP); it is also possible that a node in the middle
knows a valid route and can send an RREP message back to
Multiple selfish nodes may exist and operate indepen-
the sender. When a malicious node receives a route request
dently in the network. We have developed a script that se-
message (RREQ), it sends a forged RREP packet back to
lects m nodes to be configured with the adequate selfishness
the source node that initiates a route discovery, pretending
type, time, degree and target. The impact of the selfish be-
that the destination node is only one or few hops away from
haviour is studied on two different scenarios: according to
it, and consequently drops all data traffic from the source
nodes density and probability of selfishness :
node.
• In the first scenario we fix probability of selfishness to From figure 4, we can see that the PDF falls to 55%
one (P = 1) and study the effect of selfish behaviour when only one malicious node performs the black hole at-
in high and low nodes density1 . tack. This result persists in different mobility and data traf-
fic loads. The reason is that the malicious node position (in
• In the second scenario we take a scene of 30 nodes the centre) gives it more chance to participate in all routes
(low density) and study the effect of selfish nodes in by advertising forged RREP, and consequently preventing
different probabilities (P ) values. other nodes from discovering optimal routes. Gray hole at-
1 High nodes density means 60 nodes in a surface of 1000 × 1000m2 tack which is a variant of black hole attack can have little
and Low nodes density means 30 nodes in a surface of 1000 × 1000m2 impact on PDF by selectively dropping data traffic.
594
100 100
30 nodes
60 nodes
90 90
80 80
70 70
Packet Delivery Fraction
50 50
40 40
30 30
20 20
10 10 P=1.0
P=0.5
P=0.1
0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes persentage of selfish nodes
(a) (b)
100 100
90 90
80 80
70 70
Packet Delivery Fraction
60 60
50 50
40 40
30 30
20 20
10 10 P=1.0
30 nodes P=0.5
60 nodes P=0.1
0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes percentage of selfish nodes
(a) (b)
2 2
30 nodes P=1.0
60 nodes P=0.5
1.8 1.8 P=0.1
1.6 1.6
1.4 1.4
End to End Delay
1.2 1.2
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes percentage of selfish nodes
(a) (b)
595
100 100
90 90
80 80
70 70
Packet Delivery Fraction
50 50
40 40
30 30
20 20
10 10
DSR DSR
DSR−BH DSR−BH
0 0
0 2 4 6 8 10 12 14 16 18 20 5 10 15 20
max speed Number of connections
(a) (b)
Figure 4. Packet Delivery Fraction, one Malicious node, varying Mobility in (a) and CBR Connection
in (b)
5. Countermeasures 6. Conclusion
596
ACM/IEEE international conference on Mobile computing [20] M. G. Zapata. Secure ad hoc on-demand distance vec-
and networking, pages 85–97, 1998. tor routing. SIGMOBILE Mob. Comput. Commun. Rev.,
[3] S. Buchegger and J.-Y. L. Boudec. Performance analysis 6(3):106–107, 2002.
of the CONFIDANT protocol. MobiHoc ’02: Proceedings
of the 3rd ACM international symposium on Mobile ad hoc
networking & computing, pages 226–236, 2002.
[4] S. Corson and J. Macker. Mobile Ad hoc Networking
(MANET): Routing Protocol Performance Issues and Evalu-
ation Considerations. RFC 2501 (Informational), Jan. 1999.
[5] D. Djenouri, A. Derhab, and N. Badache. Ad hoc networks
routing protocols and mobility. Int. Arab J. Inf. Technol.,
3(2):126–133, 2006.
[6] Y. Hu and A. Perrig. A Survey of Secure Wireless Ad Hoc
Routing. IEEE SECURITY & PRIVACY, pages 28–39, 2004.
[7] Y. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On-
Demand Routing Protocol for Ad Hoc Networks. Wireless
Networks, 11(1):21–38, 2005.
[8] D. Johnson, Y. Hu, and D. Maltz. The Dynamic Source
Routing Protocol (DSR) for Mobile Ad Hoc Networks for
IPv4. RFC 4728 (Experimental), Feb. 2007.
[9] F. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber. Se-
curing ad hoc routing protocols. Proceedings. 30th Euromi-
cro Conference, pages 514–519, 2004.
[10] S. Marti, T. Giuli, K. Lai, M. Baker, et al. Mitigating Rout-
ing Misbehaviour in Mobile Ad Hoc Networks. Proceed-
ings of the Sixth Annual International Conference on Mobile
Computing and Networking (MobiCom 2000), pages 255–
265, 2000.
[11] P. Michiardi and R. Molva. CORE: A Collaborative Reputa-
tion Mechanism to enforce node cooperation in Mobile Ad
hoc Networks. Advanced Communications and Multime-
dia Security: IFIP TC6/TC11 Sixth Joint Working Confer-
ence on Communications and Multimedia Security, Septem-
ber 26-27, 2002, Portorož, Slovenia, 2002.
[12] P. Michiardi and R. Molva. Simulation-based analysis of
security exposures in mobile ad hoc networks. European
Wireless Conference, 2002.
[13] P. Papadimitratos and Z. Haas. Secure routing for mo-
bile ad hoc networks. SCS Communication Networks and
Distributed Systems Modeling and Simulation Conference
(CNDS 2002), pages 01–27, 2002.
[14] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc On-
Demand Distance Vector (AODV) Routing. RFC 3561 (Ex-
perimental), July 2003.
[15] E. Royer and C. Toh. A review of current routing protocols
for ad hoc mobile wirelessnetworks. Personal Communi-
cations, IEEE [see also IEEE Wireless Communications],
6(2):46–55, 1999.
[16] K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and
E. Belding-Royer. A secure routing protocol for ad hoc net-
works. Network Protocols, 2002. Proceedings. 10th IEEE
International Conference on, pages 78–87, 2002.
[17] The IETF web site. http://www.ietf.org.
[18] The Network Simulator ns-2 web site.
http://www.isi.edu/nsnam/ns.
[19] B. Wu, J. Chen, J. Wu, and M. Cardei. A Survey on Attacks
and Countermeasures in Mobile Ad Hoc Networks. Wire-
less/Mobile Network Security, 2008.
597