top of page

Vulnerability Assessment of Ad Hoc Networks under Different Simulation Scenarios

Main: Text

Abstract

An Ad Hoc System is a set of wireless mobile nodes that creates a temporary dynamic network without using any existing network structure or centralized network system. The nodes utilize different routing protocols to communicate with each other, i.e., to forward packets of data to other nodes in the network. There are different classes of wireless ad hoc networks which include mobile ad hoc networks, vehicular ad hoc networks, wireless sensor networks, etc. Nowadays, it is quite challenging to ensure security in ad hoc network due to the lack of centralized privileges and limited resources. DDoS and Sybil attacks are the two most severe security threats in ad-hoc networks. Hence, significant security measures are essential for secured packet delivery operations. In our project, we explore the effects of multiple attacks in mobile ad hoc networks for multiple routing protocols. In the first scenario, we implement sybil attack on 20-node MANET network under AODV routing protocol. From the 2nd scenario to the 4th scenario, we conduct DDoS attack on 50-node wireless peer to peer network for AODV, DSR, and TORA routing protocols. Furthermore, we simulate different scenarios by using the network simulator of Riverbed Modeler Academic Edition 17.5. The performance results of our project work are evaluated based on parameters such as the different number of nodes, load, media access delay, end-to-end delay, number of packets dropped, throughput, FTP download response time, etc. Overall, we present the behavior of performance parameters when there is an attack to assess security vulnerabilities in ad hoc networks in this project.

References

[1] R. Redy, “A brief overview of ad hoc networks: Challenges and directions,” IEEE Communications Magazine, 25-May-2014.


[2] What is ad-hoc network? (n.d.). Retrieved April 15, 2022, from https://www.tutorialspoint.com/what-is-ad-hoc-network


[3] Srinivasan, Aaditya Vasan, “Simulation and Analysis of Sybil attack in MANET”,pp. 1, 2018, https://sfunet.wixsite.com/ensc835


[4] H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks in mobile ad hoc networks," 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012, pp. 1-6, doi: 10.1109/CCECE.2012.6335025.


[5] E. Fazeldehkordi, I. S. Amiri, O. A. Akanbi, and M. Neely, A study of Black Hole Attack Solutions: On AODV routing protocol in Manet. Waltham, MA: Elsevier, 2016.

https://doi.org/10.1016/C2015-0-04114-4


[6] Yingying Chen, Jie Yang, Chapter 8 - Defending Against Identity-Based Attacks in Wireless Networks,Editor(s): Sajal K. Das, Krishna Kant, Nan Zhang,Handbook on Securing Cyber-Physical Critical Infrastructure, Morgan Kaufmann, pp 191-222, 2012.


[7] Rashmi V. Deshmukh, Kailas K. Devadkar, Understanding DDoS Attack & its Effect in Cloud Environment, Procedia Computer Science, Volume 49, pp. 202-210, 2015.


[8] G. Kaur and P. Thakur, "Routing Protocols in MANET: An Overview," 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019, pp. 935-941, doi: 10.1109/ICICICT46008.2019.8993294.


[9] S. Sinha, A. Paul and S. Pal, "The sybil attack in Mobile Adhoc Network: Analysis and detection," Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 2013, pp. 458-466, doi: 10.1049/cp.2013.2629.


[10] R. Das et al., "Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5," 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016, pp. 1-9, doi: 10.1109/UEMCON.2016.7777831.


[11] Iftikhar, Waleed & Mahmood, Zunair & Vistro, Daniel. (2020). The Impact Of DDoS And Ping Of Death On Network Performance. International Journal of Scientific & Technology Research. 8. 276-282.


[12] Chhabra, Meghna & Gupta, B B & Almomani, Dr.Ammar. (2013). A Novel Solution to Handle DDoS Attack in MANET. Journal of Information Security. 04. 165-179. 10.4236/jis.2013.43019.


[13] P. M. Rao, Y. C. Rao and M. A. Kumar, "Performance analysis of ZigBee wireless sensor networks using Riverbed simulation modeler," 2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018, pp. 1272-1277, doi: 10.1109/ICISC.2018.8399010.


[14] F. Yihunie, E. Abdelfattah and A. Odeh, "Analysis of ping of death DoS and DDoS attacks," 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2018, pp. 1-4, doi: 10.1109/LISAT.2018.8378010.

[15] A. V. Srinivasan, “Simulation and Analysis of Sybil attack in MANET,” ensc835, 15-Apr-2018. [Online]. Available: https://sfunet.wixsite.com/ensc835. [Accessed: 16-Apr-2022].

[16] B. Banerjee and S. Neogy, "A brief overview of security attacks and protocols in MANET," 2021 IEEE 18th India Council International Conference (INDICON), 2021, pp. 1-6, doi: 10.1109/INDICON52576.2021.9691554.

Main: Text

Team

19390496_10213699537310874_8192973276523031036_o_edited.jpg

Rohil Malhotra

Hossain Mahbub

Md Nawshaad Khan

Main: Team Members
bottom of page