You are on page 1of 6

The Second International Conference on Next Generation Mobile Applications, Services, and Technologies

A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks

Abdelaziz Babakhouya Yacine Challal Abdelmadjid Bouabdallah


CERIST Center of Research, Heudiasyc lab. Heudiasyc lab.
Algiers, Algeria. UMR CNRS 6599 UTC, UMR CNRS 6599 UTC,
University of Bjaia, Algeria. Compigne, France Compigne, France
babakhouya@cerist.dz ychallal@hds.utc.fr bouabdal@hds.utc.fr

Abstract The problem of all the current ad hoc routing protocols is


that they trust all nodes and assume that they behave prop-
Mobile Ad hoc Networks (MANETs) rely on the cooper- erly; therefore they are vulnerable to attacks launched by
ation of all participating nodes to provide the fundamen- misbehaving nodes. According to [9] nodes misbehave be-
tal operations such as routing and data forwarding. How- cause they are malfunctioning, selfish or malicious. Mal-
ever, misbehaving nodes may not follow the cooperation functioning nodes are simply suffering from hardware fail-
paradigm and cause a serious affect on network perfor- ure or software errors. Selfish nodes can agree to forward
mance. Nodes misbehave because they are malicious, self- packets on behalf of other nodes but silently drop the pack-
ish or malfunctioning. In this paper, we present a simulation ets in attempt to save their resources (energy and band-
study of the effects of misbehaving nodes on DSR routing width). Malicious nodes may try to sabotage other nodes
protocol performances and discuss some countermeasures or even the whole network, for example one malicious node
to mitigate misbehaving node effects. can advertise itself as having the shortest path to all nodes
in the network then it can cause Denial of Service (DoS)
by dropping all the received packets, in Black hole attack,
1. Introduction or selectively dropping packets in Gray hole attack. Even
more, malicious nodes can cause sever damage by collabo-
A Mobile Ad hoc NETwork (MANET) is a collection rating in the attack, such as wormhole attack. Several ad hoc
of wireless mobile nodes which may form a temporary net- routing protocols attacks [1] [6] [19] have been discussed in
work, without the use of any fixed infrastructure or central- the literature. However, as far as we can say, there is not a
ized administration [4]. Nodes rely on multi-hop routing deep study of the impact of such attacks on the performance
protocols to forward data packets sent from a source node of routing protocols through simulations.
to a destination node which is out of its transmission range. To provide network services under the presence of mis-
Every node may function as both a data source and a router behaving nodes, it is necessary to consider ”fault tolerance”
that forward data for other nodes. as a main objective at the design level of routing protocols.
Routing protocols are essential for a MANET in order to To address this concern, several secure routing protocols
discover network topology and build routes, MANET rout- have been proposed recently. Some of these protocols han-
ing protocols are designed to dynamically maintain routes dle attacks by malicious nodes but not the selfish nodes and
between any pair of communicating nodes in spite of fre- some handle selfish nodes but not malicious nodes. At the
quent topology changes caused by nodes’ mobility. A lot of best of our knowledge, there is no solution that handles all
routing protocols have been proposed in the literature [15], misbehaving nodes actions. We think that it is necessary
including proactive, reactive, and hybrid solutions. Broch to provide a simulation study that measures the impact of
et al. [2] gives a simulation study of MANET routing proto- misbehaving nodes in order to provide protocol designers
cols on different mobility and traffic scenarios. Djenouri with new guidelines that help in the design of fault / attack
et al. [5] have shown that reactive protocols are more tolerant routing protocols for MANETs.
adaptable to MANET environments than proactive proto- In this paper, we give a simulation study of misbehav-
cols. Dynamic Source Routing (DSR) [8] is a reactive rout- ing nodes impact on DSR [8] performance. First of all, we
ing protocol which is largely adopted by IETF’s MANET present an overview of DSR in section 2. Then, in section 3
working group [17]. In this paper we deal with nodes mis- , we give details on our misbehaving nodes model that in-
behaviour impact when DSR routing protocol is used. clude both selfish and malicious nodes at routing level. In

978-0-7695-3333-9 /08 $25.00 © 2008 IEEE 592


DOI 10.1109/NGMAST.2008.56
section 4, we measure, through different simulation scenar- 3.1. Selfish nodes
ios, DSR performance in presence of each type of misbe-
having nodes. We end up our paper by some countermea- Selfish nodes try to save their own resources since re-
sures to secure or mitigate misbehaving nodes impact. sources are very constrained in wireless devices. So selfish
nodes may decide to not consume their resource in forward-
ing data packets for other nodes: this can be achieved in two
2. Overview of DSR ways:

DSR [8] is an on-demand routing protocol which is 1. Selfish node type 1: Theses nodes participate cor-
based on source route approach. In this approach, each rectly in routing function but not forward data pack-
packet carry in its header the source route which contains ets it receive for other node; so data packets may be
the complete, ordered list of nodes through which the packet dropped instead of being forwarded to their destina-
must pass. tion.
The DSR protocol consists of two mechanisms: Route 2. Selfish node type 2: Theses nodes do not participate
Discovery and Route Maintenance. Route Discovery is the correctly in routing function by not advertising avail-
mechanism by which a node S wishing to send a packet to able routes, for example: in DSR selfish node may
a destination D obtains a source route to D. To perform a drop all RREQ they received or not forward a RREP
Route Discovery, the source node S broadcasts a ROUTE to some destination. Consequently, this selfish node
REQUEST (RREQ) packet that is flooded through the net- will not participate in the requested routes.
work in a controlled manner and is answered by a ROUTE
REPLY (RREP) packet from either the destination node or
3.2. Malicious nodes
another node that knows a route to the destination. To re-
duce the cost of Route Discovery, each node maintains a
cache of source routes it has learned or overheard. Unlike, selfish nodes, malicious nodes don’t preserve
their resource and try to sabotage other nodes by trying
Route Maintenance is the mechanism by which a
to participate in all established routes. Consequently, the
packet’s sender S detects if the network topology has
malicious nodes can force other nodes to use a ”danger-
changed. When Route Maintenance indicates a source route
ous” route which is under their control. The manoeuvre
is broken, S is notified with a ROUTE ERROR (RERR)
that the malicious nodes may take is protocol-dependent. In
packet. The sender S can then attempt to use any other
the context of DSR routing protocol, a malicious node can
route to D already in its cache or can invoke Route Discov-
claim to have a route to some destination and reply with
ery again to find a new route.
false information to the received RREQ. After being se-
lected in the requested route, it can cause DoS attack by
3. Misbehaving nodes model dropping all the received packets, in Black Hole attack,
or selectively dropping packets in Grey hole attack. Even
more, malicious nodes can cause severe damage by collab-
Routing protocols provide two main functions: Rout- orating in the attack, such as wormhole attack.
ing function and data forwarding function. The former is
concerned with routes discovery and routes maintenance.
The latter is concerned with data packets relaying toward 4. Simulation
the destination through the established route. Both routing
and data forwarding can be affected by misbehaving nodes In order to measure the impact of selfish or malicious
presence; misbehaving nodes can lead the network into mal- nodes on ad hoc network performances we modified the
function by not following routing and packets forwarding DSR implementation in (ns-2) [18] to simulate the different
functions. We consider two kinds of misbehaving nodes: kinds of misbehaving nodes described in section 3: selfish
selfish nodes and malicious nodes. We consider the follow- type1, selfish type 2 and malicious. First we present self-
ing parameters that may govern the severity of an attack: ishness impact, then malicious node impact. In our simu-
lations, nodes move according to the random waypoint mo-
bility model [2]. We use 30 or 60 mobile nodes that move in
• Time: start and stop time,
a rectangular surface of size 1000×1000 m2 to increase the
average number of hops per route, creating a more challeng-
• Degree: the probability (P ) of misbehaviour, ing environment for the routing protocol. The data com-
munication pattern in our study uses 20 source-destination
• Target: victims’ nodes (all nodes, a subset of nodes). pairs, each sending a Constant Bit Rate (CBR) flow of 4

593
Parameter Value Here we consider selfish nodes that behave according to
Routing Protocol DSR selfish type 1 then selfish type 2 described in section 3.1.
Simulation time 500 seconds Selfish nodes target all nodes during all simulation time.
Number of mobile nodes 30 nodes/ 60 nodes As shown in figure 1(a), the percentage of selfish nodes
Transmission Range 250 m has a significant effect on the fraction of packets that are
Movement Model Random Waypoint successfully delivered in the network. The PDF decreases
Pause time 10 seconds when the percentage of selfish nodes increases. We note that
Max speed 5 m/s the selfish type 1 behaviour have the same effect on PDF
Traffic type CBR in both low and high nodes density. However, as shown
Data payload 512 bytes in figure 1(b), this effect decreases when the probability of
Rate 2 packets/seconds selfishness type 1 decreases.
Target of attacks All nodes
Frome figure 2, we note that selfishness type 2 has not
Time of attacks 500 seconds
a big effect on PDF, especially in high nodes density. The
Table 1. Simulation parameters reason is that selfish nodes that drop the received RREQ are
avoided from participating in routes setup giving chance to
other well behaving nodes to participate in the route con-
data packets per second. Each data packet is 512 bytes in struction. However, as shown in figure 3, selfishness be-
size. All simulations were run on identical movement and haviour type 2 can affect the average end to end delay by
communication scenarios. The results presented here are introducing long time buffering at intermediate nodes which
the average from 10 simulation runs with different seeds. cooperate in packet forwarding process. The average EED
The seeds influence the placement and the movement of the increases when the percentage of selfish nodes increases,
nodes. Table 1 resumes simulation parameters. especially in low node density.
To measure the impact of misbehaving nodes we use two
metrics :
4.2. Simulation result of malicious be-
• Packet Delivery Fraction (PDF) : The fraction of the haviour
data packets generated by the CBR source that are de-
livered to destination.
In this section we measure the impact of one malicious
• Average End to End Delay (EED) : The average de- node performing black hole attack by varying nodes mobil-
lay between the sending of data packet by the CBR ity and number of CBR connections. We consider one ma-
source and its receipt by the corresponding receiver. licious node located in the center of the area of simulation
This includes all delays caused during route acquisi- that performs black hole attack to all nodes (degree = 1.0)
tion and buffering at intermediate nodes during all period of simulation.
One problem with route discovery process in DSR is that
not only the destination node can send a route reply mes-
4.1. Simulation result of selfish behaviour
sage (RREP); it is also possible that a node in the middle
knows a valid route and can send an RREP message back to
Multiple selfish nodes may exist and operate indepen-
the sender. When a malicious node receives a route request
dently in the network. We have developed a script that se-
message (RREQ), it sends a forged RREP packet back to
lects m nodes to be configured with the adequate selfishness
the source node that initiates a route discovery, pretending
type, time, degree and target. The impact of the selfish be-
that the destination node is only one or few hops away from
haviour is studied on two different scenarios: according to
it, and consequently drops all data traffic from the source
nodes density and probability of selfishness :
node.
• In the first scenario we fix probability of selfishness to From figure 4, we can see that the PDF falls to 55%
one (P = 1) and study the effect of selfish behaviour when only one malicious node performs the black hole at-
in high and low nodes density1 . tack. This result persists in different mobility and data traf-
fic loads. The reason is that the malicious node position (in
• In the second scenario we take a scene of 30 nodes the centre) gives it more chance to participate in all routes
(low density) and study the effect of selfish nodes in by advertising forged RREP, and consequently preventing
different probabilities (P ) values. other nodes from discovering optimal routes. Gray hole at-
1 High nodes density means 60 nodes in a surface of 1000 × 1000m2 tack which is a variant of black hole attack can have little
and Low nodes density means 30 nodes in a surface of 1000 × 1000m2 impact on PDF by selectively dropping data traffic.

594
100 100
30 nodes
60 nodes
90 90

80 80

70 70
Packet Delivery Fraction

Packet Delivery Fraction


60 60

50 50

40 40

30 30

20 20

10 10 P=1.0
P=0.5
P=0.1
0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes persentage of selfish nodes

(a) (b)

Figure 1. Packet Delivery Fraction vs percentage of Selfish nodes type 1

100 100

90 90

80 80

70 70
Packet Delivery Fraction

Packet Delivery Fraction

60 60

50 50

40 40

30 30

20 20

10 10 P=1.0
30 nodes P=0.5
60 nodes P=0.1
0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes percentage of selfish nodes

(a) (b)

Figure 2. Packet Delivery Fraction vs percentage of Selfish type nodes 2

2 2
30 nodes P=1.0
60 nodes P=0.5
1.8 1.8 P=0.1

1.6 1.6

1.4 1.4
End to End Delay

End to End Delay

1.2 1.2

1 1

0.8 0.8

0.6 0.6

0.4 0.4

0.2 0.2

0 0
0 10 20 30 40 50 60 0 10 20 30 40 50 60
percentage of selfish nodes percentage of selfish nodes

(a) (b)

Figure 3. Average End to End Delay vs percentage of Selfish nodes type 2

595
100 100

90 90

80 80

70 70
Packet Delivery Fraction

Packet Delivery Fraction


60 60

50 50

40 40

30 30

20 20

10 10
DSR DSR
DSR−BH DSR−BH
0 0
0 2 4 6 8 10 12 14 16 18 20 5 10 15 20
max speed Number of connections

(a) (b)

Figure 4. Packet Delivery Fraction, one Malicious node, varying Mobility in (a) and CBR Connection
in (b)

5. Countermeasures 6. Conclusion

Misbehaving nodes presence is one major security threat


in MANETs that can affect the performance of the under-
Several works on securing ad hoc routing protocols have
lying protocols. In this paper, we have studied the misbe-
been proposed [20][13][16][7]. A common approach to-
having nodes impact on MANET performance when DSR
wards secure ad hoc routing protocols is the use of crypto-
routing protocol is used. Similar results can be found when
graphic mechanisms to secure the ad hoc routing process.
using AODV [14] routing protocol.
These approaches are built on different security assump-
Through simulations, we have seen how much selfish
tions, ranging from a single security association between
and malicious nodes can affect network performance. Sim-
the corresponding nodes to the assumption of an always
ulation results brought up two important conclusions :
available public key infrastructure to support cryptographic
operations. Cryptographic approaches handle active attacks • Selfish node type 2 (dropping RREQ) do not cause any
”inject false routing information” launched by malicious damage in network with high nodes density. However,
nodes on route discovery process. However, they do not it can really affect the end to end delay and lead to
address passive attacks ”silently drop packets” from selfish congestion in a low density network.
nodes.
• One malicious node carrying a balck hole attack can
Other related works [3][11] try to mitigate nodes misbe- have the same effect as 20% to 30% of selfish nodes
haviour using neighbours monitoring [10] to detect and iso- type 1 (Data dropping).
late misbehaving nodes from a route. Nodes misbehaviour
against which the proposals are targeted, have not yet been Therefore, both data and routing packets need to be se-
well described. Some works, such as Michiardi et al. [12] cured from selfish and malicious nodes. We believe that a
describe the influence of selfish nodes according to nodes good solution would be a combination of cryptographic and
energy. The underlying simulation approach, however, can- monitoring mechanisms in order to detect and isolate mis-
not be easily generalized. In our work we proposed a mis- behaving nodes.
behaving node model including both selfish and malicious
nodes enhanced with more action capabilities such as time References
of attack, target of the attack, degree (probability) of having
a specific behavior. We evaluated the impact of this model [1] A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Rout-
on DSR performance trough different simulation scenarios. ing Protocols. RFC 4593 (Informational), Oct. 2006.
We believe that a good countermeasure would be a combi- [2] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva.
nation of cryptographic and monitoring mechanisms in or- A performance comparison of multi-hop wireless ad hoc
der to detect and isolate bisbehaving nodes. network routing protocols. Proceedings of the 4th annual

596
ACM/IEEE international conference on Mobile computing [20] M. G. Zapata. Secure ad hoc on-demand distance vec-
and networking, pages 85–97, 1998. tor routing. SIGMOBILE Mob. Comput. Commun. Rev.,
[3] S. Buchegger and J.-Y. L. Boudec. Performance analysis 6(3):106–107, 2002.
of the CONFIDANT protocol. MobiHoc ’02: Proceedings
of the 3rd ACM international symposium on Mobile ad hoc
networking & computing, pages 226–236, 2002.
[4] S. Corson and J. Macker. Mobile Ad hoc Networking
(MANET): Routing Protocol Performance Issues and Evalu-
ation Considerations. RFC 2501 (Informational), Jan. 1999.
[5] D. Djenouri, A. Derhab, and N. Badache. Ad hoc networks
routing protocols and mobility. Int. Arab J. Inf. Technol.,
3(2):126–133, 2006.
[6] Y. Hu and A. Perrig. A Survey of Secure Wireless Ad Hoc
Routing. IEEE SECURITY & PRIVACY, pages 28–39, 2004.
[7] Y. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On-
Demand Routing Protocol for Ad Hoc Networks. Wireless
Networks, 11(1):21–38, 2005.
[8] D. Johnson, Y. Hu, and D. Maltz. The Dynamic Source
Routing Protocol (DSR) for Mobile Ad Hoc Networks for
IPv4. RFC 4728 (Experimental), Feb. 2007.
[9] F. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber. Se-
curing ad hoc routing protocols. Proceedings. 30th Euromi-
cro Conference, pages 514–519, 2004.
[10] S. Marti, T. Giuli, K. Lai, M. Baker, et al. Mitigating Rout-
ing Misbehaviour in Mobile Ad Hoc Networks. Proceed-
ings of the Sixth Annual International Conference on Mobile
Computing and Networking (MobiCom 2000), pages 255–
265, 2000.
[11] P. Michiardi and R. Molva. CORE: A Collaborative Reputa-
tion Mechanism to enforce node cooperation in Mobile Ad
hoc Networks. Advanced Communications and Multime-
dia Security: IFIP TC6/TC11 Sixth Joint Working Confer-
ence on Communications and Multimedia Security, Septem-
ber 26-27, 2002, Portorož, Slovenia, 2002.
[12] P. Michiardi and R. Molva. Simulation-based analysis of
security exposures in mobile ad hoc networks. European
Wireless Conference, 2002.
[13] P. Papadimitratos and Z. Haas. Secure routing for mo-
bile ad hoc networks. SCS Communication Networks and
Distributed Systems Modeling and Simulation Conference
(CNDS 2002), pages 01–27, 2002.
[14] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc On-
Demand Distance Vector (AODV) Routing. RFC 3561 (Ex-
perimental), July 2003.
[15] E. Royer and C. Toh. A review of current routing protocols
for ad hoc mobile wirelessnetworks. Personal Communi-
cations, IEEE [see also IEEE Wireless Communications],
6(2):46–55, 1999.
[16] K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and
E. Belding-Royer. A secure routing protocol for ad hoc net-
works. Network Protocols, 2002. Proceedings. 10th IEEE
International Conference on, pages 78–87, 2002.
[17] The IETF web site. http://www.ietf.org.
[18] The Network Simulator ns-2 web site.
http://www.isi.edu/nsnam/ns.
[19] B. Wu, J. Chen, J. Wu, and M. Cardei. A Survey on Attacks
and Countermeasures in Mobile Ad Hoc Networks. Wire-
less/Mobile Network Security, 2008.

597

You might also like