Ijebea15 417

Page 1

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

ISSN (Print): 2279-0020 ISSN (Online): 2279-0039

International Journal of Engineering, Business and Enterprise Applications (IJEBEA) www.iasir.net PERFORMANCE ANALYSIS OF INTRUSION DETECTION SYSTEM USING AODV DISTANCE VECTOR PROTOCOL Vijayendra Kushwaha1, Imran Khan2, Neelam Singh Parihar3 1 Student (M.Tech. CSE), 2HoD, 3Research Guide 1,2,3 Department of Computer Science & Engineering, Jawaharlal Nehru College of Technology (JNCT), Ratahara, Rewa, Madhya Pradesh 486001, INDIA __________________________________________________________________________________________ Abstract: MANET (mobile ad-hoc network) is baseless network and transmits information and updates using AODV distance vector protocol in this paper we are working on the performance analysis and intrusion detection system technique using AODV distance vector protocol. In this paper we will work with NS2 simulator to perform AODV distance vector protocol’s properties for performance analysis. Keywords: transmits, AODV, distance vector, intrusion detection, NS2 simulator. __________________________________________________________________________________________ I.

INTRODUCTION

Mobile Ad-hoc network (MANET) is a type of ad hoc network that can modify locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to bond to a variety of networks. This can be a regular Wi-Fi connection, or another intermediate such as a cellular or satellite communication. MANETs are limited to a local area of wireless devices (such as a set of laptop computers), while others may be connected to the Internet. For example, A VANET (Vehicular Ad Hoc Network) is a type of MANET that allows vehicles to communicate with roadside equipment. While the vehicles may not have a straight Internet connection, the wireless roadside equipment may be connected to the Internet, allowing data from the vehicles to be sent over the Internet. The vehicle data may be used to calculate traffic situation or keep track of trucking fleets. Because of the dynamic nature of MANETs, they are typically not very secure, so it is essential to be watchful what data is sent over a MANET.

Fig 1.0 Mobile Ad-hoc network II. APPLICATIONS OF MOBILE AD-HOC NETWORK The technology of Mobile Ad hoc Networking is rather one and the same with Mobile package Radio Networking Mobile Mesh Networking and Mobile, Multi hop, Wireless Networking. MANETs have several salient characteristics: 1) Dynamic topologies: Nodes are liberated to move arbitrarily; therefore, the network topology--which is typically multi hop--may change haphazardly and quickly at unpredictable times, and may consist of together bidirectional and unidirectional links. 2) Bandwidth-constrained, variable capability links: Wireless links will maintain to have significantly lesser capacity than their hardwired counterparts. In addition, the realized throughput of wireless communications--after accounting for the effects of multiple access, fading, sound, and interference conditions, etc. is repeatedly much less than a radio's greatest transmission rate.

IJEBEA 15-417; Š 2015, IJEBEA All Rights Reserved

Page 16


Vijayendra et al., International Journal of Engineering, Business and Enterprise Applications, 14(1), September-November, 2015, pp. 16-18

One effect of the relatively low to moderate link capacities is that congestion is typically the norm rather than the exception, EXAMPLE: Aggregate application demand will probable approach or go above network capacity frequently. As the mobile network is frequently simply an extension of the permanent network infrastructure, mobile ad hoc users will command similar services. These demands will continue to enhance as multimedia computing and two-way networking applications rise. III. PROPOSED TECHNIQUE we are working on the performance analysis and intrusion detection system technique using AODV distance vector protocol. In this paper we will work with NS2 simulator to perform AODV distance vector protocol’s properties for performance analysis. The protocol consists of two phases: i) Route Discovery ii) Route Maintenance. A node wishing to communicate with another node first seeks for a route in its routing table. If it finds path, the communication starts immediately, otherwise the node initiates a route discovery phase. The route discovery process consists of a route-request message (RREQ) which is broadcasted. If a node has a valid route to the destination, it replies to the route - request with a route - reply (RREP) message. Additionally, the replying node creates a so called reverse route entry in its routing table, which contains the address of the source node, the number of hops to the source, and the next hop's address, i.e. the address of the node from which the message was received. A lifetime is associated with each reverse route entry, i.e. if the route entry is not used within the lifetime it will be removed. The second phase of the protocol is called route maintenance. It is performed by the source node and can be subdivided into: (i) Source node moves: source node initiates a new route discovery process, destination or an intermediate. (ii) Node moves: a route error message (RERR) is sent to the source node. Intermediate nodes receiving a RERR update their routing table by setting the distance of the destination to infinity. If the source node receives a RERR it will initiate a new route discovery. To prevent global broadcast messages AODV introduces a local connectivity management. This is done by periodical exchanges of so called HELLO messages, which are small RREP packets containing a node's address and additional information. Type(8)

Reserved(16)

Hop Count(8)

RREQ ID(32) Destination IP Address(32) Destination Sequence Number(32) Originator IP Address(32) Originator Sequence Number(32)

AODV Route Request (RREQ) Message Format IV. PROPOSED ALGORITHMS Expanding ring search if (rt->rt_req_last_ttl < TTL_THRESHOLD) ih->ttl_ = rt->rt_req_last_ttl + TTL_INCREMENT; else { Network-wide broadcast ih->ttl_ = NETWORK_DIAMETER; rt->rt_req_cnt += 1; } } V. RESULT: TRAFFIC AND MOBILITY MODELS Constant bit rate (CBR) and File Transfer protocol (FTP) traffic sources with 512 byte data packets are used. The source-destination pairs are spread randomly over the network. The number of sources is varied in the simulations. The packet sending rate is set to 10 packets / second. The mobility model uses the random way point model.

IJEBEA 15-417; Š 2015, IJEBEA All Rights Reserved

Page 17


Vijayendra et al., International Journal of Engineering, Business and Enterprise Applications, 14(1), September-November, 2015, pp. 16-18

Fig 1.1 Performance analysis and evolution in AODV VI. CONCLUSION We have worked on the performance analysis and intrusion detection system technique using AODV distance vector protocol. In this paper we will work with NS2 simulator to perform AODV distance vector protocol’s properties for performance and by using above mentioned algorithms we have increased packet delivery performance in mobile ad-hoc network using distance vector protocol. REFRENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

S. R. Das, C. E. Perkins, E. M. Royer, and M. K. Marina, “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks,” IEEE personal Comm,Vol 8,pp.16-28,feb, 2001. Srdjan krco and marina dupcinov, Improved neighbour detection algorithm for aodv routing protocol, IEEE communications letters, December 2003. Pradeep kumar Mani, David W Petr, Development and Performance Characterization of Enhanced AODV Routing for CBR and TCP Traffic, 864-7762 0-7803-8246-3 2004 IEEE. Zhao Qiang Zhu Hongbo, “An optimized AODV protocol in mobile ad hoc Network”, In Wireless comm. networking & mobile computing 2008(WiCOM’08), 4th international conference on Oct 12-14, 2008, pp.1-4. Ammar Zahary and Aladdin Ayesh, “On-demand Multiple Route Maintenance in AODV”, in Computer Engineering & System, 2008, International Conference on Nov 25-27, 2008, pp.225-230. Xinsheng Wang, Qing Liu, Nan Xu, The Energy-Saving Routing Protocol Based on AODV, Fourth International Conference on Natural Computation, 978-0-7695-3304-9/08,2008 IEEE. Mehdi Zarei, Karim Faez, Javad Moosavi Nya, Modified Reverse AODV Routing Algorithm using Route Stability in Mobile Ad Hoc Networks, 978-1-4244-2824-3,2008 IEEE. YU Bin, SUN Bin, “Modify AODV For MANET/INTERNET Connection Through Multiple Mobile Gateways”, ISBN 978-895519-139-4 -1519- Feb. 15-18, 2009 ICACT 2009. Nastooh Taheri Javan, Reza Kiaeifar, Bahram Hakhamaneshi, Mehdi Dehghan“ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks”2009 Eigth IEEE/ACIS International Conference on Computer and Information Science. Hothefa Sh.Jassim, Salman Yussof, Tiong Sieh Kiong, S. P. Koh1, Roslan Ismail “A Routing Protocol based on Trusted and shortest Path Selection for Mobile Ad hoc Network” Proceedings of the 2009 IEEE 9th Malaysia International Conference on Communications 15 -17 December 2009.

IJEBEA 15-417; © 2015, IJEBEA All Rights Reserved

Page 18


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.