Professional Documents
Culture Documents
Abstract—Mobile ad hoc Network (MANET) consists of au- quickly and to have a good response time between the trusted
tonomous mobile nodes without any centralized control. These nodes. In trust-based models central trust authority of the
mobile nodes move arbitrarily within the self-configurable Cluster Heads is a superfluous requirement.
MANET environment. Each of these mobile nodes can act as
a router while receiving and forwarding information. Secure In this paper we have analyzed and compared the performance
routing is an important issue in MANET as mobile nodes of three routing protocols - AODV, DSR and OLSR in two
are prone to attacks from malicious nodes and the overall trust-based frameworks - NTM and TLEACH. In the Node-
performance of the network depends on it. In this setting, three based Trust Management (NTM) framework, the trust of every
routing protocols have been analyzed and compared: OLSR, DSR node is calculated by the interaction history and Cluster Head
and AODV. The metrics are being used are Packet Delivery Ratio,
Delay and Throughput. Network Simulator (NS2) has been used (CH) recommendation [8]. In trust-based LEACH (low energy
as tool for the experiments. The performance analysis of these adaptive clustering hierarchy) or TLEACH (Trusted-LEACH)
protocols also compared for power usage using two trust-based protocol provides secure routing, while preserving the essential
models: Node based Trust Management (NTM) Scheme and functionality of the original protocol [1]. These frameworks
TLEACH. Simulation results show that OLSR protocol performs provide feasible approach to meet the trust requirements of
well compared to AODV and DSR.
data packets.
This paper is organized as follows: Section II introduces the
I. I NTRODUCTION
relevant literature survey. Section III discusses the routing
Mobile ad hoc Networks (MANETs) are self-configuring protocols used for this research. Section IV presents the trust
systems where mobiles nodes are connected through wireless models that we used to compare the performance of the routing
interfaces. Nodes in MANETs have features like dynamic protocols. Section V describes the performance metrics and
topologies, limited battery life and low physical security. The section VI provides the performance analysis on the basis
dynamic topology makes complex routing protocol design. of metrics mentioned in above section. Finally section VII
There are three types of routing protocols: Proactive Protocols, concludes the paper.
Reactive Protocols and Hybrid Protocols. Proactive protocols
are table-driven that constantly update lists of destinations II. R ELATED W ORKS
and routes. Reactive protocols respond on demand where as Many researchers have proposed different methods to secure
Hybrid protocols combine the features of both Reactive and the routing protocols [2] [4] [5]. At this setting, we focus on
Proactive protocols. The main goal of routing protocols is securing AODV, DSR and OLSR routing protocols for this
to minimize delay, maximize network throughput, maximize survey.
network lifetime and energy efficiency and to discover a A performance evaluation of reactive (AODV, DSR) and
secured path from source to the destination. proactive (OLSR, DSDV, TORA) routing protocols was con-
Data packets which are routed via intermediate nodes, can be ducted based on the performance criteria i.e. packet delivery
dropped by malicious nodes without being forwarded to the ratio (PDR), average end to end delay (Delay), routing over-
destination. This introduces not only a much bigger end-to-end head and throughput under various mobility model (RPGM,
delay, but also rapid energy deplete of the nodes. The energy CMM, RWP) using the network simulator NS-2 in Nitiket et al
constraint of the nodes and the attacks of malicious nodes [11]. The authors here concluded that mobility pattern of node
are the prominent reasons for path failure. This path failure has significant impact on routing and the reactive protocols
causes frequent route discovery which affects the performance performed well with respect to PDR, Delay, Normalized
of overall routing protocol. Nodes have to share routing routing load (NRL) and throughput. The delay is greater in
information with their neighboring nodes to find the route to DSR as compare to AODV. In AODV throughput and PDR
the destination. This requires nodes to trust each other. In this are high when the number of nodes was increased.
setting we state that trust is a key concept in secure routing The performance of DSR and AODV on demand reactive
mechanisms. routing protocols for MANET are analyzed using varying
The rationale behind using trust models is to find a route time, packet delivery ratio, throughput and end-to-end delay
881
877
or for increased robustness. Other advantages of the DSR are only allowed to carry the information.
protocol include easily guaranteed loop-free routing, support Advantages of OLSR protocol are it does not need central
for use in networks containing unidirectional links and very administrative system to handle its routing process, the link is
rapid recovery when routes in the network change. The DSR reliable for the control messages, since the messages are sent
protocol is designed mainly for mobile ad hoc networks of periodically and the delivery does not have to be sequential
up to about two hundred nodes, and is designed to work well and OLSR is suitable for high density networks. Whereas the
with even very high rates of mobility. main disadvantages are OLSR protocol periodically sends the
Unlike AODV, in DSR the intermediate nodes do not maintain updated topology information throughout the entire network
routing information in order to route the pockets they receive. and It allows high protocol bandwidth usage.
This protocol comprises of three components namely routing,
route discovery and route maintenance. Routing of packets is IV. T RUST M ODEL A NALYSIS
performed as follows. The node which has a data to send will Security is not taken into consideration in the initial design
dynamically discover a source route. Each packet will carry of OLSR, neither is in AODV nor in DSR. These routing
in its header the complete list of nodes through which the protocols do not protect the routing packets in networks, so
data must pass to reach the destination. There is no periodic an attacker can easily modify them without being detected. In
transmission of router advertisements, link status, updating of this paper our motivation is to secure the overall MANET en-
routing information etc. But in the packet header, the complete vironment by using the trust models like NTM and TLEACH.
source route from a source node to a desired destination is
available. This source route can be cached by the intermediate A. Node-based Trust Management System(NTM)
nodes for future use. The Node-based Trust Management (NTM) Framework is
If the source route is not available, the node will initiate a route based on a Clustered mobile sensor network with backbone
discovery process. The source node will broadcast a route [8]; it introduces a trust of a node within local management
request message to all of its neighbors. Each route request strategy with help from the mobile agents running on each
is identified with a unique id number generated by source node. That is, a node‘s trust-based information is stored as a
node. It contains the details of source and destination. Also history on the node itself and managed by the local mobile
it contains a record of addresses of each intermediate nodes agent of the node. The goal is to provide nodes with a
through which the data has been forwarded. At the source mechanism to evaluate the trust level of its direct neighbors
node, the route record is empty. as shown in Figure-1.
It should be noted that when a node encounters a fatal
transmission problem at its data link layer, it generates a Route
Error packet. When a node receives a route error packet, it
removes the hop in error from it’s route cache. All routes that
contain the hop in error are truncated at that point. Acknowl-
edgment packets are used to verify the correct operation of
the route links. This also includes passive acknowledgments
in which a node hears the next hop forwarding the packet
along the route.
882
878
In NTM scheme, Trust Evaluators (TEs) can be computed by source node. PDR =(Packet received/Packet sent) The
grasping the TRUST-VALUE from equation 4. This scheme more accurate the results, the better performance
draws ideas from the Watchdog and Pathrater schemes [15], • Average end to end delay: This is the time taken for a
which has been utilized for cooperation of nodes in ad-hoc packet to be transmitted across a network from source to
destination. The delay experienced by the packet from it
networks. Therefore, a node ni ’s trust on another node nj was sent by the source to destination till it was received
can be defined as: at the destination. This whole process depends on packet
size, the interval and the route length as well. This
T nij = α1ni Tsnj + α2ni T nj o (1) includes all possible delays caused by buffering during
route discovery latency, queuing at the interface queue,
In the above equation, T nij is evaluated as a function of retransmission delays at the MAC, and propagation.
two parameters: Delayend−end = Links[Delaytransition + Delaypropagation
nj
• ni Ts : Node ni ’s self evaluated trust on nj ; ni computes +Delayprocess ]
this by directly monitoring nj . (2)
n
• ni T j o: Weighted sum of every other nodes’ trust on nj • Throughput: It is the average rate of successful packet delivery.
The throughput is usually measured in bits per seconds or
evaluated by ni .
packets per time slot.
• Constant Bit Rate (CBR) traffic has been used. Time intervals
B. Trusted-LEACH(TLEACH) between packets are exchanged between nodes with varied
Trust-based Low Energy Adaptive Clustering Hierar- number of nodes i.e. 50 and 100 nodes. It should be noted
that different transmit data rates can be achieved by varying
chy(TLEACH) is a Wireless Sensor Networks(WSNs) trust CBR parameters. CBR has been used as it limits the maximum
protocol [1]. TLEACH contains two main components, the number of packets that need to be sent from source to sink.
Monitoring Module and the Trust Evaluation Module. Each • Loss Monitor has been used to measure the throughput at the
node also maintains a Neighbor Situational Trust Table sink, over a given time window.
(NSTT) filled with trust value entries for each pair of node • Battery Power:Battery power, P ower can be expressed as-
ids and situational operations. Situational operations, such U plink Downlink
P ower = 1 − − (3)
as data sensing and routing, each have an individual trust U ploadvolume Downloadvolume
value because nodes may not behave maliciously for all VI. A NALYZING S IMULATION
operations. Whenever a monitoring node detects misbehavior,
the Monitoring Module les a misbehavior report tallying the The performance measures of three protocols i.e. DSR,
number of misbehavior and good behaviors. The trust update AODV and OLSR have been conducted in the NS2. The
slot allows the Cluster head to share its trust values with simulation has been spanned for 300 seconds for each test.
its cluster members. TLEACH losses less data than LEACH The initial and final 30 seconds (60 seconds in total) of
because half of all data sent by cluster members is received by simulation has been excluded from throughput measurement.
the gateway. TLEACH is, however, unable to stop the constant This is to ensure that the system was in steady state. The
loss of data because of the lack of monitoring on the cluster network dimensions are 500m × 500m with transmission
head. range of 250m for each node. In low density network we
deploy 50 nodes whereas in high density network it is 100
V. M ETRICS FOR P ERFORMANCE C OMPARISON nodes.
From the above analysis of routing protocols, the OLSR
MANET has number of qualitative and quantitative metrics outperforms the both AODV and DSR protocols in terms of
that can be used to compare ad hoc routing protocols. This End-to-end Delay, Packet Delivery and Throughput for 50 as
paper has considered the following metrics to evaluate the well as 100 mobile nodes as shown in Figures 2 - 6.
performance of ad hoc network routing protocols. The trust- In Figure-6, it is evident from the results that the delay is
based models ensure authentication and integrity of the routing higher in AODV and less in OLSR among the proactive
messages that satisfy the following conditions as no interaction protocols and in reactive protocols delay is less in DSR.
can be made unless the node‘s current trust information is But in increase in density of nodes from 50 to 100, when
revealed by the recommendation and a trusted node can be compared, OLSR has got the higher efficiency in delay.
selected as a Cluster Head by its battery life and good repu- In Figure-7 we have performed a power consumption
tation. The fairness of node‘s energy usage is measured using comparison for DSR, AODV and OLSR Protocols in NTM
the standard deviation of the energy consumed per node. This and TLEACH for 50 and 100 Nodes in MANET. It shows
is calculated by the square root of difference between energy that there is no significant impact on using different trust
consumed at each node and the average energy consumed per models for the routing protocols. We model power use based
node. on the experimental results for power consumption using
All the tests are done on the basis of the following Perfor- 802.11g link assuming a mobile node has full battery power
mance metrics: at the start of the simulation. It should be noted that uplink
• Packet Delivery Ratio (PDR): It is the ratio of the packets uses more power than the downlink.
successfully received by the destination node from the In this simulation, energy consumption for nodes varies from
883
879
5mA in idle mode, up-to 200mA in receiving mode and up-to
300mA in transmitting mode. Initial energy of each node is
1000 Joules. We have evaluated the following performance
indexes-
Figure 6. End to end delay comparison Protocols for 100 Nodes in MANET
VII. C ONCLUSION
The OLSR outperforms both AODV and DSR protocols in
terms of packet delivery and throughput in 50 mobile nodes.
The AODV puts low load than OLSR and DSR respectively.
Figure 4. Threshold comparison Protocols for 50 Nodes in MANET In 100 mobile nodes OLSR is again showing good results
in data loss, packet delivery and throughput than AODV and
DSR respectively. AODV offer good results in offering low
884
880
load on the network than OLSR and DSR respectively. High [14] T. Clausen and P. Jaqcquet, Optimized Link State Routing (OLSR)
Protocol, RFC 3626, IETF Networking Group, October 2003.
network load affects the MANET routing control packets. [15] S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbe-
Therefore in terms of analyzing routing protocols, the OLSR havior in Mobile Ad Hoc Networks. Mobicom 2000, August 2000, pp.
outperforms the both AODV and DSR protocols in terms 255-265.
[16] D. Kaur, N. Kumar, Comparative Analysis of AODV, OLSR, TORA, DSR
of Delay, Packet Delivery and Throughput for both 50 and and DSDV Routing Protocols in Mobile Ad Hoc Networks, in International
100 mobile nodes respectively. Results also show that the Journal of Computer Network and Information Security(IJCNIS), vol. 5,
NTM trust model can induce more secure routing environment no.3, pp.39,2013
[17] S. Gowrishankar, T. G. Basavaraju, M Singh and Subir Kumar Sarkar,
than the TLEACH approach. We conclude that the type of Scenario based Performance Analysis of AODV and OLSR in Mobile
traffic affects the performance of the routing protocols whereas Ad hoc Networks, In Proceeding of the 24th South East Asia Regional
mobility pattern does not have any impact on the performance Computer Conference, 2007.
[18] C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On Demand
of the routing protocols. Trust models also have less impact on Distance Vector (AODV) Routing, RFC 3561, July 2003.
the performance of the routing protocols. Future work should
include efforts to improve the robustness of security issues for
improving the overall performance of the system like the way
that the message authentication between intermediate Cluster
heads are treated, where there can be a delay in identifying a
malicious neighboring node.
R EFERENCES
[1] F. Song and B. Zhao. Trust-Based LEACH Protocol for Wireless Sensor
Networks, In Proceedings of the 2008 Second international Conference
on Future Generation Communication and Networking - Volume 01
(December 13 - 15, 2008). FGCN. IEEE Computer Society, Washington,
DC, pp-202-207.
[2] A.Mishra. Security and Quality of Service in Ad Hoc Wireless Networks,
Cambridge University Press, New York, 2008.
[3] S.Misra, I.Woungang, and S.Misra, Guide to Wireless Ad Hoc Networks,
Springer Science + Business Media, London, 2009.
[4] E.Cayirci and C.Rong. Security in Wireless Ad Hoc and Sensor Networks,
John Wiley and Sons, Ltd, Publication,2009.
[5] R.Gupta. Mobile Ad hoc Network (MANETS): Proposed solution to Secu-
rity Related Issues. Indian Journal of Computer Science and Engineering
(IJCSE), Vol - 2, Issue - 5, pp. 738-746, 2011.
[6] M. J. Handy, M. Haase, and D. Timmermann. Low energy adaptive
clustering hierarchy with deterministic cluster-head selection, In Proc. 4th
IEEE International Workshop on Mobile and Wireless Communications
Network (MWCN 2002), Stockholm, Sweden, September 2002, pp. 368-
372.
[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-
efficient communication protocol for wireless microsensor networks, Pro-
ceedings of the 33rd Annual Hawaii International Conference on System
Sciences, pp. 1-10 vol. 2, Jan. 2000.
[8] R. Ferdous, V. Muthukkumarasamy, E. Sithirasenan, Determining Similar
Recommenders using Improved Collaborative Filtering in MANETs, In
the 12th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-13). Melbourne,
Australia, 16-18 July, 2013, pp. 110-117
[9] F. Song and B. Zhao. Trust-Based LEACH Protocol for Wireless Sensor
Networks, In Proceedings of the 2008 Second international Conference
on Future Generation Communication and Networking - Volume 01
(December 13 - 15, 2008). FGCN. IEEE Computer Society, Washington,
DC, pp-202-207.
[10] D. B. Johnson, D. A Maltz, The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks, Internet Draft, draft-ietf-manet-dsr-07.txt, Feb.
2002
[11] N. M. Nitiket And P. B. Nilesh, Performance Evaluation of AODV
and DSR On-Demand Routing Protocols with Varying MANET Size,
International Journal of Wireless Mobile Networks (IJWMN) Vol. 4,
No. 1, February 2012, pp. 183-196.
[12] N. Goyal, N. Hemrajani, Comparative Study of AODV and DSR Routing
Protocols for MANET: Performance Analysis, International Journal of
Communication and Computer Technologies Volume 01 No.57 Issue:
06, Aug 2013, pp 198-202.
[13] C. Singh, V. Sharma, Comparative Performance Analysis of Study of
Routing Protocols for Adhoc Networks, International Journal of Advanced
Research in Computer Engineering and Technology (IJARCET) Volume
4 Issue 9, September 2015, pp 3494-3498.
885
881