Implimentation and Results

download Implimentation and Results

of 14

Transcript of Implimentation and Results

  • 7/30/2019 Implimentation and Results

    1/14

    CHAPTER- 5

    IMPLEMENTATION AND RESULT

    IMPLEMENTATION

    For better understanding of our work i.e. evaluation of friendship mechanism in manet we have

    framed our work in three scenarios which consist of a simple manet protocol for now we have

    taken DSDV in consideration and performed a comparative study by implementing a attack

    scenario on the same and after attack for confirming that whether our friendship mechanism is

    working in proper manner or not we have designed a code for prevention of attacked mechanism

    in dsdv protocol using trust based algorithm in manet.. In our work we have performed 3

    simulations First scenario is with a normalized dsdv protocol. Second is for DSDV which is

    having some malicious nodes in it and then the scenario which is showing the prevention

    mechanism in DSDV protocol. We have taken 30 nodes for our implementation to be done. The

    simulation is done using NS-2 simulator, To analyze the performance of the network by applying

    various types of data flow following parameters has used to evaluate the performance of the

    work done which are as given below:

    i) Total No. of Drop Packets: It is the difference between sending and received packets.

    ii) Packet Delivery Ratio: The ratio between the numbers of packets received to the send.

    iii) Throughput: Throughput is the average rate of successful message delivery over a

    communication channel.

    iv) End to end Delay: It can be defined as the time a packet takes to travel from source to

    destination.

  • 7/30/2019 Implimentation and Results

    2/14

    Outcomes and their analysis:

    We have reached towards outcome by implementing three protocols.

    1. Normalized DSDV

    2. DSDV with attack/malicious node i.e. blackholedsdv

    3. DSDV with prevention and modification named as .MDSDV

    Nam implementation for DSDV PROTOCOL.

    In the first scenario where there is no Black Hole attack i.e. simple DSDV, in figure 1 we can see

    that there is no constant packet drop in nam output.

    Fig.1 Packet flow under DSDV without attack

  • 7/30/2019 Implimentation and Results

    3/14

    Nam implementation for with blackholedsdv protocol: In the second scenario where there is a

    Black Hole DSDV Node, there is packet dropping between Node 11 and Node 21, when we look

    at the animation of the simulation, using NAM.

    Fig.2

    Packet flow under DSDV with blackhole attack

    Nam implementation for prevented dsdv protocol: In the figure3 below we have implemented

    prevention technique in which the friendship mechanism is implemented there is packet drop

    between nodes but very less as compare to attacked dsdv in second scenario where there is a

    Black Hole DSDV Node.

    Fig.3 Packet flow under Prevented DSDV with blackhole attack

  • 7/30/2019 Implimentation and Results

    4/14

    5.2 Results and their analysis:

    We have analyzed results under various parameters/performance matrices of all the three

    scenarios i.e normalized dsdv,blackholedsdv and prevented dsdv under the following parameters

    which are as follows:

    Packet Delivery Ratio of dsdv protocol: Figure 3 show the total no of sending and receiving

    packet under dsdv protocol.

    Fig.4 PDR graph for sending and receiving Packets on DSDV without black hole attack

    Packet Delivery Ratio under blackholedsdv protocol: Figure 5 show the total no of sending

    and receiving packet under dsdv protocol.

  • 7/30/2019 Implimentation and Results

    5/14

    Fig.5pdr graph for sending and receiving Packets on DSDV with black hole attack

    Packet Delivery Ratio under preventeddsdv protocol: Figure 6 show the total no of sending

    and receiving packet under prevented and modified dsdv protocol.

  • 7/30/2019 Implimentation and Results

    6/14

    Fig.6pdr graph for sending and receiving Packets on DSDV with prevention of black

    hole attack

    Analysis of Packet Delivery Ratio: For analysis of packet delivery ratio from resultant graphs

    of sending and receiving packet we can see that from above figures fig.4,fig.5 and fig 6 of

    dsdv,blackholedsdv and prevented dsdv respectively that without presence of any selfish node

    the total no of sent and received packet reaches around 12000 packet and there is limited drop

    but when attack occurs the packet dropping increase which is shown in fig 5 as the diffrence in

    sending and receiving packet is more. Finally in fig6 when we have implemented friendship

    mechnism even if attack is there than also there is a limited packet drop in prevented dsdv

    protocol using friendship mechanism.

    Throughput of dropping packets:

  • 7/30/2019 Implimentation and Results

    7/14

    Throughput of dropping packets for DSDV Protocol: Figure 7 shows the throughput of

    dropping packet with respect to time under normalized DSDV protocol.

    Fig.7 Throughput of dropping packet w.r.t. time under DSDV protocol without black hole attack

    Throughput of dropping packets for blackholedsdv Protocol: Figure 8 shows the throughput

    of dropping packet with respect to time under attacked DSDV protocol.

    Fig.8 Throughput of dropping packet w.r.t. time under blackholeDSDV protocol with black hole

    attack

  • 7/30/2019 Implimentation and Results

    8/14

    Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 9 shows the

    throughput of dropping packet with respect to time with implemented friendship mechanism

    under prevented DSDV protocol.

    Fig.9 Throughput of dropping packet w.r.t. time under preventeddsdv protocol with black hole

    attack

  • 7/30/2019 Implimentation and Results

    9/14

    Analysis of Throughput of dropping packet: For analysis of Throughput of dropping packet

    w.r.t. time we can see that from above figures fig.7,fig.8 and fig 9 of dsdv,blackholedsdv and

    prevented dsdv respectively that without presence of any selfish node the throughput of dropping

    is more as compare to normalized dsdv and prevented dsdv .Thus we can say that when we

    implemented friendship mechanism under blackhole attack the rate of dropping degraded which

    can be verified from figure 9.Hence if the rate of packet dropping is decreased than there will be

    less no of packet which will be dropped.

    End to end delay:

    End-End Delay for DSDV Protocol: Figure 10 shows the End to End delay with respect to time

    under DSDV protocol.

    Fig 10End to end delay of packets on DSDV without black hole attack

    Throughput of dropping packets for blackholedsdv Protocol: Figure 11 shows the End to

    End delay with respect to time under BlackholeDSDV protocol.

  • 7/30/2019 Implimentation and Results

    10/14

    Fig 11 End to end delay of packets on DSDV with black hole attack

    Throughput of dropping packets for modified/prevented dsdv Protocol: Figure 12 shows the

    End to End delay with respect to time under Blackhole attack in dsdv protocol with friendship

    mechanism.

  • 7/30/2019 Implimentation and Results

    11/14

    Fig 12 End to end delay of packets on DSDV with friendship mechanism.

    Analysis of End to End Delay: For analysis of End to End delay we can refer figures

    fig.10,fig.11 and fig 12 of dsdv,blackholedsdv and prevented dsdv respectively. As we increases

    security the delay increases hence if we compare above mentioned graphs the attacked dsdv has

    very less e2e delay whereas when we have applied trust mechanism for friendship application

    among nodes the delay increeases which shouls be because when we increase the security the

    delay between source and destination for packet to be transferred increases.

    .

    Conclusion:

    In this project simulation is done under Black hole attack using DSDV protocol in

    wireless mobile ad-hoc networks a node for examining the friendship of a node .For this purpose

    it is modified & implemented into a new DSDV routing protocol which behaves like a Black

    hole. we simulated different scenarios, where each one has one or two Black hole nodes that use

    the modified M DSDV protocol. In different scenarios the location of the Black hole nodes is

    to evaluate the impact. Moreover, it changed the number of nodes in different topologies. The

    packet loss is measured. Similarly other parameters like throughput and end- to -end delay due to

    Black hole attack is calculated and results are produced in the form of graphs using trace graph

    The main advantage of this work is that it enlightens the vulnerabilities of the DSDV protocol

    and it let very easy to find a friendship node and malicious node. Besides the study will help us

    to overcome the DSDV protocol flaws so that it could be made more robust against the attack.

  • 7/30/2019 Implimentation and Results

    12/14

    Also the paper presents the overall measurement of the impact when a network is under the

    Black hole attack and helps in designing the topology which is more robust.

    The limitation of the simulation is that the measurement of the impact on

    MANETs becomes difficult when the mobility of the nodes increases too much. The possible

    application of this project is that the study can help to determine the impact on other routing

    protocols and other layers also. Another application of this work is determining the impact on

    sensor and mesh networks under Black hole attack or other attacks as well.

    FUTURE SCOPE

    This work can enhance the strength of next generation network designers and administrators to

    accommodate all their challenges for determination of network worm into common hierarchy

    and can eliminate the possibilities of wormhole, black hole and their occurrence in MANET.

    This work and the simulations gave various results to actuate the problem of network worms and

    respective attacks occurrence and to motivate the friendship node to update.

  • 7/30/2019 Implimentation and Results

    13/14

    APPENDIX

    A .PUBLICATIONS:

    1.A Novel Paradigm: Friendship Etiquette in MANET by Nivedita Shirke ,a research

    scholar,Shri Satya Sai Institute of science and technology, Sehore and Gajendra Singh Chandel,

    an assistant professor, Shri Satya Sai Institute of science and technology, Sehore at IJERT, vol.2,issue 1, January 2013.

    2. Implementation of friendship mechanism to enhance security in MANET by NiveditaShirke ,a research scholar,Shri Satya Sai Institute of science and technology, Sehore and

    Gajendra Singh Chandel, an assistant professor, Shri Satya Sai Institute of science and

    technology, Sehore,proceeding in VSRD international journal, august 2013.

  • 7/30/2019 Implimentation and Results

    14/14

    14