International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 2347 ISSN (P): 2347-6079 Analyzing Aodv And Dsdv Protocol To Prevent Wormhole Attack In Wsn Harleen Kaur1, Neetu Gupta2 Department of ECE, GIMET GIMET, Amritsar, Punjab, India ABSTRACT Wireless sensor network are usually deployed in unattended or hostile environment for information gathering and transmitting it to the base station for evaluation. Due to built built-in in deficiencies of sensors, security is the major threat in WSN. WSNs are responsive to various external and internal attacks bbeing eing curbed by computation assets, definite memory capacity and battery life, mechanism power, lack of tamper resistant packaging and the use of doubtful wireless communication channels. The wormhole attack is one of the intense attacks on WSN that can aff affect ect the networks performance. In this paper, protocol (AODV and DSDV) that is based on security is implied against wormhole attack in WSN. The evaluation of AODV and DSDV protocol is evaluated on the basis of metrics like throughput, average energy, packet overhead, packet delivery ratio. We present a technique to identify wormhole attack in wireless ad hoc network and a solution to discover a safe route by using NS NS-2 2 simulator. Keywords: Wireless sensor network, security, AODV, DSDV, overhead, wormhole. 1. INTRODUCTION Wireless Sensor Networks (WSN) is a collection of nodes organized into a cooperative network [1]. Each node consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a single Omni directional antenna), have a power source (e.g., batteries batte and solar cells), and accommodate various sensors and actuators. Systems of 1000s or even 10,000 nodes are anticipated. Such S systems can revolutionize the way we live and work. Security is a major challenging issue in wireless sensor networks applications because they are operated in public and unrestrained areas. The foremost goal of providing security is to protect protec the network work resources against a number of attacks such as DoS attack, wormhole attack, black hole attack, grayhole attack, routing table overflow attack, packet replication attack, and modification of packets attack [2]. The paper is organized as follows. In the section II, description of Wormhole attack and AODV routing protocol is given. In section III proposed algorithm is described. Section IV discusses about the simulation setup and result results and evaluation of simulation is given in section V and at the end in section VI conclusion of simulation scenarios is drawn out. © Copyright reserved by IJETR (Impact Factor: 0.997) 99 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 5900 ISSN (P): 2347-6079 2347 2. WORMHOLE ATTACK AND ROUTING PROTOCOL AODV The main scheme of this attack is to tunnel packets established on one part of the system to another. It is located in a desired environment, wormhole can entirely mess routing. These wormholes can utilize routing race circumstances which occur when node takes routing decisions [3] depending on the primary course advertisement. This may persuade distant nodes that they are very close to the sink. This may also headed to sinkhole if node on the other end foes elevated quality way to sink. Figure1: Wormhole attack in WSN Wormholes may induce 2 nodes that they are neighbors when the they y are far away from each other. It can be used in conjunction with sybil attack. Encryption alone cannot prevent this attack AODV (Ad-hoc hoc on Demand Distance Vector) is a reactive protocol. The reactive routing protocols do not periodically update the routi routing ng table like table driven proactive protocols periodically. It is the modification of DSDV (Destination Sequence Distance Vector) Vector). [11] 11] It provides unicast, multicast and broadcast. It works on, on demand algorithm. It searches for route between nodes onl only y which is decided by the source nodes. These routes are maintained as long as they are needed by source. AODV builds route using route request and route reply query cycle. It is the loop free, selfself starting scale to large number of nodes. AODV is a well well-known nown distance vector routing protocol and it works as follows. Whenever a node wants to communicate with another node, it looks for an available path to the destination node, in its local routing table. If there is no path exists, then it broadcasts a rout routee request (RREQ) message to its neighborhood nodes. Any node that receives this message for route discovery looks for a path leading to the respective destination node. The important feature fea of AODV is the maintenance of time based states. This means that routing entry which is not used recently is expired. The intermediate nodes store the route information in the form of route table table. A. Counter Attacks: To detect and for the solution of this attack, there is an easy exchange of 4 way handshaking messages. It is easy to implement and it does not entail any location information ation or time synchronization [4 [4]. Detection can be done on basis of data packet flow. In the proposed journal [5], by using network simulator NS2 whose code is written as tcl script pt this attack detection can be implemented. This attack is detected based on packet reception r and dropped ratio, and also based on throughput. Number of packets is declini declining exponentially so WSNs can be protected by using this technique. technique © Copyright reserved by IJETR (Impact Factor: 0.997) 100 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 In [6], a way out to this attack for adhoc networks where all nodes are ready with directional antennas. For perceiving and shielding against this attack Packet Leash [7] is one of the most suitable Method. This method has 2 types of leashes they are Geographic and Temporal. Geographic Leashes: All the nodes have a synchronized clock and know its exact location. Each node attaches its transmission time and existing position before transferring the packet. Receiving node figures out the path/ distance and also calculates the time for the packets to reach. To guess whether the predictable packet passed through wormhole or not, distance information can be used. Temporal Leashes: Here the correspondent puts the sending time with the packet and then the receiving node calculates the distance/ path of that packet by pretentious promulgation and exploiting the discrepancy between time to send and receive the packet. One particular class of protocols which seems to be resistant to wormhole attacks is geographic routing protocols [9]. These protocols direct the traffic to the base station along a geographically shortest path and therefore do not rely on advertisements from potential adversaries[10]. B. Classification of Wormhole Attack There are several ways to classify the wormhole attack. Wormhole can be classified into two classes- Hidden Attack and Exposed Attack, depending on whether malicious nodes show their identity into packet's header when tunneling and replaying packets [12]. 1. Hidden Attack Each participating node on the path updates packet's header before forwarding it to the subsequent node by putting their identity (MAC address) to allow receivers know the packet directly comes from. In hidden attack, wormhole nodes do not put their identity into the packet's header so that do not realize the existence of them. For example, in this kind of attack a path from S to D via wormhole link A, B will be S-P-Q-R-D. In this way Q seems to get the packets directly from P so it considers P its neighbour although P is Out of radio range from Q. In general in hidden attack nodes within A's vicinity are fake neighbours of nodes within B's vicinity and vice versa. 2. Exposed Attack In exposed attacks, wormhole nodes include their identities in the packet's header as other authenticated nodes do. Therefore, other nodes are aware of the existence of wormhole nodes but they do not know wormhole nodes are malicious. In case of exposed attacks, the path from S to D via wormhole will be S-P-A-B-Q-R-D. In hidden attacks, there are many fake neighbours created by wormhole link but there is no fake neighbour except (A, B) in exposed attacks 3. PROPOSED ALGORITHM This paper presents a novel approach to secure AODV against wormhole attack in WSN using data tracker node analysis. In this work, data tracker analysis approach analyzes the neighboring nodes so as to check the authenticity of the nodes for secure © Copyright reserved by IJETR (Impact Factor: 0.997) 101 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 5900 ISSN (P): 2347-6079 2347 transmission of data over the network. According to this approach a node will request to its neig neighboring hboring nodes and perform a request and response mechanism. The node will maintain the table to track the timeout. If the reply time is not accurate there is an attack in the network. All the intermediate nodes are analyzed to detect the presence of wormhole le attack using AODV protocol in WSN. The steps of proposed algorithm are: Step 1: Divide the network in number of zones information of number of nodes and packet routing. Step 2: Select the leader for the respective zones giving the information of each no node. Step 3: Assign the data tracker for each zone keeping the track of data send and received by the destination. Step 4: Mismatch between data sent by source and received by destination will lead to the detection of the wormhole in the network. Step 5: If the number of received packet - number of forwarded packets was more. Step 6: Isolate the wormhole nodes from the network by sending alert messages to the nodes. Step 7: Nodes after receiving the alert message will not communicate with the wormhole. 4. SIMULATION SETUP Network Simulator tool is used to evaluate the performance of different routing protocols in Wireless sensor networks. In this thi simulation, we have tested routing protocols with scalability of nodes. The nodes are deployed randomly in a terrain of size 1100 * 1100m. 00m. CBR is used as data traffic application with multiple source and destination. It consists of basic network entities en as sensor nodes (mobile). The performance of different rrouting protocols is analyzed on behalf of metrics like li throughput, overhead, Packet delivery ratio and energy consumption. The parame parameters used in the simulation are summarized in the table below: A. Scenario design Figure1: Scenario environment © Copyright reserved by IJETR (Impact Factor: 0.997) 102 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 B. Simulation Parameters Parameters Values Number of nodes 56 MAC type IEEE 802.11 Initial Energy 100 Sleep Power 0.0005 Transmission Power 0.002 Transmission Time 0.005 Routing Protocol AODV Number of sent messages 30 Extent of territory 1100m x 1100m Traffic model CBR(UDP) Figure2: Simulation Environment 5. Results and Evaluation We evaluate the effect of wormhole attack on different routing protocols on the basis of metrics like throughput, overhead, packet delivery ratio, average energy consumption in WSN. The attacks effect the routing of the data from source to destination by changing their path or say the routing table information of different protocols. The wormhole attacks works in different mode namely in threshold. To analyze the performance of the routing protocols by varying the nodes, the metrics used to evaluate the performance are given below. 1. Throughput In our study we have calculate the throughput on the node around which tunnel is formed. During the normal communication the throughput value was observed to be around 32 Kbps which drops to zero which signifies that tunnel has been made and the node is not receiving any data. The increase in the throughput is after preventing the wormholes and making a new path to resume the communication. From the figure of throughput it shows that throughput of AODV routing protocol is more as compared with routing protocol DSDV © Copyright reserved by IJETR (Impact Factor: 0.997) 103 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 5900 ISSN (P): 2347-6079 2347 Figure3: AODV throughput Figure4: DSDV throughput 2. Overhead The above results show the comparison between AODV and DSDV for the wormhole attack on the basis of performance metrics. As the results of DSDV are based on the routing table and number of hop counts and in AODV routing protocol, routes are established dynamically at intermediate node. The impact of the above mentioned results for AODV will check out Wormhole attack when cluster head does not receive any data from the mobile nodes. The proposed AODV and base DSDV routing protocol produce result for tracing and isolation of wormhole attack by calculating its throughput and overhead. From the figure of overhead it shows that overhead of AODV is less as compared with DSDV i.e. overhead of 1.75 is observed which signifies the amount of routing required to transmit the data in the network is 1.75 times the data packets in AODV. © Copyright reserved by IJETR (Impact Factor: 0.997) 104 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 5900 ISSN (P): 2347-6079 2347 Figure5: AODV overhead Figure6: DSDV Overhead 3. Packet delivery ratio PDR [8]] is the ratio of number of packets received at destination node to that of number of packets sent by source node. PDR decreases drastically indicating the formation of tunnel and increase afterwards depicts formation of new path to resume the communication as show in figure. © Copyright reserved by IJETR (Impact Factor: 0.997) 105 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 5900 ISSN (P): 2347-6079 2347 Figure7: AODV PDR 4. Average energy Figure shows energy consumption. The metric is measured as the percent of energy consumed by a node with respect to its initial energy The initial energy and the final energy left in the node, at the end of the simulation run are measured The percent energy en consumed by a node is calculated ed as the energy consumed to the initial energy.. Figure8: AODV average energy And finally the percent energy consumed by all the nodes in a scenario is calculated as the average of their individual energy energ consumption of the nodes 6. Conclusion In this paper aper we present different routing protocols in wireless sensor network and how the attack named wormhole attack can affect the routing. The performance of different routing protocols can be evaluated on the basis of different parameters like © Copyright reserved by IJETR (Impact Factor: 0.997) 106 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 throughput, overhead, packet delivery ratio and average energy consumption. Wireless sensor networks have an additional vulnerability because nodes are generally deployed in unprotected environment. The throughput of AODV routing protocol under wormhole threshold mode is more than DSDV protocol as shown in figure. AODV over WSN is simulated with different operation modes. The comparison of the WSN with and without malicious node by encapsulating the wormhole is done by modified routing table With the results of AWK programming and trace graph, we can conclude that in the case of simple AODV PDR decreases drastically indicating the formation of tunnel and increase afterwards depicts formation of new path to resume the communication and also increase in throughput by isolating the wormholes and decrease in the packet overhead. References [1]Varsha Sahni , “Result Analysis of AODV and DSR with Different Node Mobility Using Wormhole Attack in Wireless Sensor Network”, International Journal of Computer Science and Technology Vol. 4, Issue 1, Jan - March 2013. [2] Adnan Ahmed, “Performance Evaluation of Wireless Sensor Network in Presence of Grayhole Attack”, Quaid-E-Awam University Research Journal Of Engineering, Science & Technology, Volume 13, No. 1, Jan-Jun. 2014. [3]Nusrat Fatema, “Attacks and Counterattacks on Wireless Sensor Networks”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.6, December 2013. [4] Virendra Pal Singh, Aishwarya S. Anand Ukey , Sweta Jain, “Signal Strength based Hello FloodAttack Detection and Prevention in Wireless Sensor Networks” International Journal of ComputerApplications (0975 – 8887) Volume 62– No.15. [5] Kashyap Patel, Mrs.T.Manoranjitham, 2013. “Detection of Wormhole Attack in Wireless Sensor Network” India International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 5, May – 2013. [6] Lingxuan Hu and David Evans, 2004. “Using directional antennas to prevent Wormhole Attack”, In Proceedings of the Network and Distributed System Security Symposium, pp. 131-141. [7] Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003. “Packet Leashes: A defence against Wormhole Attacks in Wireless Networks”. INFOCOM 2003. Twenty-Second Annual Joint conferences of the IEEE Computer and Communications. IEEE, pp. 267-279. [8] Vandana C.P, A. Francis Saviour Devaraj, “Evaluation of impact of wormhole attack on AODV International Journal of Advanced Networking and Applications, ISSN 0975-0290 Volume: 04 Issue: 04 pp. 1652-1656, 2013. [9] Karlof, C., & Wagner,. D. (2003), “secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols”, Vol.1, (p293-315), Elsevier Publications. © Copyright reserved by IJETR (Impact Factor: 0.997) 107 International Journal of Emerging Technology & Research Volume 2, Issue 1, Jan - Feb, 2015 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 [10] [24] Law, Y. W., & Havinga, P. (2005) How to secure a wireless sensor network. (P 89-95) [11] K.Rashidha Begam, M.Savitha Devi2, “Protected Data Transfer in Wireless Sensor Network Using Promiscuous Mode”, IJCSMC, Vol. 3, Issue. 11, November 2014, pg.643 – 648 [12]Sweety Goyal, Harish Rohil, “Securing MANET against Wormhole Attack using Neighbor Node Analysis”, International Journal of Computer Applications (0975 – 8887) Volume 81 – No 18, November 2013 © Copyright reserved by IJETR (Impact Factor: 0.997) 108