Anda di halaman 1dari 4

Performance Comparison of

Two On-Demand Routing Protocols for


Ad Hoc Networks
Sovan Kar1 , Siddhant Khemka2, Shubham Narnolia3, Sonal R.4, Prof. M. Sheela Devi5
1,2,3,4
UG Scholars, 5Assistant Professor ,Dept. of Computer Science & Engineering, SSCE, Bengaluru.

Abstract— Ad hoc networks are characterized by multihop wireless links. While DSR and AODV share the on-demand
wireless connectivity, frequently changing network behaviour in that they initiate routing activities only in the
topology and the need for efficient dynamic routing presence of data packets in need of a route, many of their
protocols. We compare the performance of two prominent routing mechanics are very different. In particular, DSR uses
on-demand routing protocols for mobile ad hoc networks: source routing, whereas AODV uses a table-driven routing
Dynamic Source Routing (DSR) and Ad Hoc On-Demand framework and destination sequence numbers. DSR does not
Distance Vector Routing (AODV). A detailed simulation rely on any timer based activities, while AODV does to a
model with MAC and physical layer models is used to certain extent. One of our goals in this study is to extract the
study interlayer interactions and their performance relative merits of these mechanisms. The motivation is that a
implications. We demonstrate that even though DSR and better understanding of the relative merits will serve as a
AODV share similar on demand behaviour, the differences cornerstone for development of more effective routing
in the protocol mechanics can lead to significant protocols for mobile ad hoc networks. The rest of the article is
performance differentials. The performance differentials organized as follows. In the following section, we briefly
are analyzed using varying network load, mobility, and review the DSR and AODV protocols. We present a detailed
network size. Based on the observations, we make critique of the two protocols, focusing on the differences in
recommendations about how the performance of either their dynamic behaviours that can lead to performance
protocol can be improved. differences. This lays the foundation for much of the context
of the performance study. We describe the simulation
I. INTRODUCTION environment. We present the simulation results, followed by
In an ad hoc network, mobile nodes communicate with each their interpretations. Related work is presented. We finally
other using multihop wireless links. There is no stationary draw conclusions and also make recommendations for the
infrastructure; for instance, there are no base stations. Each improved design of either protocol.
node in the network also acts as a router, forwarding data
packets for other nodes. A central challenge in the design of 2. A DESCRIPTION OF THE PROTOCOLS
ad hoc networks is the development of dynamic routing A. DSR:
protocols that can efficiently find routes between two
communicating nodes. The routing protocol must be able to The key distinguishing feature of DSR [is the use of source
keep up with the high degree of node mobility that often routing. That is, the sender knows the complete hop-by-hop
changes the network topology drastically and unpredictably. route to the destination. These routes are stored in a route
cache. The data packets carry the source route in the packet
Our goal is to carry out a systematic performance study of two header. When a node in the ad hoc network attempts to send a
dynamic routing protocols for ad hoc networks: the Dynamic know the route, it uses a route discovery process to
Source Routing protocol (DSR) and the Ad Hoc On-Demand dynamically determine such a route. DSR makes very
Distance Vector protocol (AODV). DSR and AODV share an aggressive use of source routing and route caching. No special
interesting common characteristic — they both initiate routing mechanism to detect routing loops is needed. Also, any
activities on an on demand basis. This reactive nature of these forwarding node caches the source route in a packet it
protocols is a significant departure from more traditional forwards for possible future use. Several additional
proactive protocols, which find routes between all source- optimizations have been proposed and have been evaluated
destination pairs regardless of the use or need for such routes. to be very effective by the authors of the protocol , as
The key motivation behind the design of on-demand protocols described in the following:
is the reduction of the routing load. High routing load usually
has a significant performance impact in low-bandwidth
• Salvaging: An intermediate node can use an alternate route dynamically, by taking into consideration the temporal locality
from its own cache when a data packet meets a failed link on of routes.
its source route.
A Critique of DSR and AODV
• Gratuitous route repair: A source node receiving an RERR The two on-demand protocols share certain salient characteristics.
packet piggybacks the RERR in the following RREQ. This In particular, they both discover routes only when data
helps clean up the caches of other nodes in the network that packets lack a route to a destination. Route discovery in
may have the failed link in one of the cached source routes. either protocol is based on query and reply cycles, and route
information is stored in all intermediate nodes along the route
• Promiscuous listening: When a node overhears a packet not in the form of route table entries (AODV) or in route caches
(DSR). However, there are several important differences in
addressed to itself, it checks whether the packet could be the dynamics of these two protocols, which may give rise to
routed via itself to gain a shorter route. If so, the node sends a significant performance differentials.
gratuitous RREP to the source of the route with this new, First, by virtue of source routing, DSR has access to a significantly
better route. Aside from this, promiscuous listening helps a greater amount of routing information than AODV. For
node to learn different routes without directly participating in example, in DSR, using a single request-reply cycle, the source
the routing process. can learn routes to each intermediate node on the route in
addition to the intended destination. Each intermediate node
B. AODV: can also learn routes to every other node on the route. Promiscuous
listening of data packet transmissions can also give DSR
access to a significant amount of routing information. In particular,
AODV shares DSR’s on-demand characteristics in that it also it can learn routes to every node on the source route of
discovers routes on an as needed basis via a similar route that data packet. In the absence of source routing and promiscuous
discovery process. However, AODV adopts a very different listening, AODV can gather only a very limited amount
mechanism to maintain routing information. It uses traditional of routing information. In particular, route learning is limited
routing tables, one entry per destination. This is in contrast to only to the source of any routing packets being forwarded. This
DSR, which can maintain multiple route cache entries for each usually causes AODV to rely on a route discovery flood more
destination. Without source routing, AODV relies on routing often, which may carry significant network overhead.
table entries to propagate an RREP back to the source and, Second, to make use of route caching aggressively, DSR
subsequently, to route data packets to the destination. replies to all requests reaching a destination from a single
request cycle. Thus, the source learns many alternate routes to
AODV uses sequence numbers maintained at each destination the destination, which will be useful in the case that the primary
to determine freshness of routing information and to prevent (shortest) route fails. Having access to many alternate routes
routing loops. These sequence numbers are carried by all saves route discovery floods, which is often a performance
routing packets. bottleneck.
An important feature of AODV is the maintenance of timer- However, there may be a possibility of a route reply
based states in each node, regarding utilization of individual flood. In AODV, on the other hand, the destination replies
routing table entries. A routing table entry is expired if not only once to the request arriving first and ignores the rest. The
used recently. A set of predecessor nodes is maintained for routing table maintains at most one entry per destination.
Third, the current specification of DSR does not contain
each routing table entry, indicating the set of neighbouring
any explicit mechanism to expire stale routes in the cache, or
nodes which use that entry to route data packets. These nodes prefer “fresher” routes when faced with multiple choices. As
are notified with RERR packets when the next-hop link noted in [7], stale routes, if used, may start polluting other
breaks. Each predecessor node, in turn, forwards the RERR to caches. Some stale entries are indeed deleted by route error
its own set of predecessors, thus effectively erasing all routes packets. But because of promiscuous listening and node
using the broken link. In contrast to DSR, RERR packets in mobility, it is possible that more caches are polluted by stale
AODV are intended to inform all sources using a link when a entries than are removed by error packets. In contrast,
failure occurs. Route error propagation in AODV can be AODV has a much more conservative approach than DSR.
visualized conceptually as a tree whose root is the node at the When faced with two choices for routes, the fresher route
point of failure and all sources using the failed link as the (based on destination sequence numbers) is always chosen.
Also, if a routing table entry is not used recently, the entry is
leaves. expired. The latter technique is not problem-free, however. It
The recent specification of AODV includes an optimization is possible to expire valid routes this way if unused beyond an expiry
technique to control the RREQ flood in the route discovery time. Determination of a suitable expiry time is difficult,
process. It uses an expanding ring search initially to discover because sending rates for sources, as well as node mobility,
routes to an unknown destination. In the expanding ring may differ widely and can change dynamically. In a recent
search, increasingly larger neighbourhoods are searched to paper [8], the effects of various design choices in caching
find the destination. The search is controlled by the Time-To- strategies for on-demand routing protocols are analyzed.
Live (TTL) field in the IP header of the RREQ packets. If the Fourth, the route deletion activity using RERR is also conservative
in AODV. By way of a predecessor list, the error
route to a previously known destination is needed, the prior
packets reach all nodes using a failed link on its route to any
hop-wise distance is used to optimize the search. This enables destination. In DSR, however, a route error simply backtracks
computing the TTL value used in the RREQ packets the data packet that meets a failed link. Nodes that are not on
the upstream route of this data packet but use the failed link Phishers are targeting the customers of banks and online
are not notified promptly. payment services. Emails, supposedly from the Internal
The goal of our simulations that follow is to determine the Revenue Service, have been used to glean sensitive data
relative merits of the aggressive use of source routing and from U.S. taxpayers. While the first such examples were
caching in DSR, and the more conservative routing table and
sequence-number-driven approach in AODV.
sent indiscriminately in the expectation that some would
be received by customers of a given bank or service, recent
3. PHISHING ATTACKS : research has shown that phishers may in principle be able
to determine which banks potential victims use, and target
2001: The first known direct attempt against a payment
bogus emails accordingly.
system affected E-gold in June 2001, which was followed
up by a "post-9/11 id check" shortly after the September 11 Social networking sites are a prime target of phishing, since
attacks on the World Trade Center. the personal details in such sites can be used in identity
theft.
2003: The first known phishing attack against a retail bank
was reported by The Banker in September 2003. In January 2009, a phishing attack resulted in unauthorized
wire transfers of US$1.9 million through Experi-Metal's
2004: It is estimated that between May 2004 and May
online banking accounts.
2005, approximately 1.2 million computer users in the
United States suffered losses caused by phishing, totaling
approximately US$929 million. United States businesses
lose an estimated US$2 billion per year as their clients 4. METHODS OF PREVENTION :
become victims.
There are anti-phishing websites which publish exact
messages that have been recently circulating the internet, such
as FraudWatch International and Miller smiles. Such sites
often provide specific details about the particular messages.
To avoid directly dealing with the source code of web pages,
Phishing is recognized as a fully organized part of the hackers are increasingly using a phishing tool called Super
black market. Specializations emerged on a global scale Phisher that makes the work easy when compared to manual
that provided phishing software for payment (thereby methods of creating phishing websites.
outsourcing risk), which were assembled and implemented As recently as 2007, the adoption of anti-phishing strategies
into phishing campaigns by organized gangs. by businesses needing to protect personal and financial 2005:
2006: Almost half of phishing thefts in 2006 were In the United Kingdom losses from web banking fraud—
committed by groups operating through the Russian mostly from phishing—almost doubled to GB£23.2m in 2005,
Business Network based in St. Petersburg. Banks dispute from GB£12.2m in 2004, while 1 in 20 computer users
with customers over phishing losses. The stance adopted claimed to have lost out to phishing in 2005.
by the UK banking body APACS is that "customers must information was low. Now there are several different
also take sensible precautions ... so that they are not techniques to combat phishing, including legislation and
vulnerable to the criminal. Similarly, when the first spate technology created specifically to protect against phishing.
of phishing attacks hit the Irish Republic's banking sector These techniques include steps that can be taken by
in September 2006, the Bank of Ireland initially refused to individuals, as well as by organizations. Phone, web site, and
cover losses suffered by its customers, although losses to email phishing can now be reported to authorities, as
the tune of €113,000 were made good. described below.

A. Browsers alerting users to fraudulent websites:


Another popular approach to fighting phishing is to maintain a
list of known phishing sites and to check websites against the
list. Microsoft's IE7 browser, Mozilla Firefox 2.0, Safari 3.2,
and Opera all contain this type of anti-phishing measure.
Firefox 2 used Google anti-phishing software. Opera 9.1 uses
live blacklists from Phish tank, cyscon and GeoTrust, as well
as live whitelists from GeoTrust. Some implementations of
this approach send the visited URLs to a central service to be
checked, which has raised concerns about privacy. According
to a report by Mozilla in late 2006, Firefox 2 was found to be
more effective than Internet Explorer 7 at detecting fraudulent
sites in a study by an independent software testing company.
An approach introduced in mid-2006 involves switching to a
special DNS service that filters out known phishing domains:
this will work with any browser, and is similar in principle to 5. CONCLUSION:
using a host’s file to block web adverts. Phishing is a critical problem that results in a continual threat
To mitigate the problem of phishing sites impersonating a and the risk is high in social media. Phishing takes advantage
victim site by embedding its images (such as logos), several of the trust that the user may not be able to tell that the site
site owners have altered the images to send a message to the being visited, or program being used, is not real; therefore,
visitor that a site may be fraudulent. The image may be moved when this occurs, the hacker has the chance to gain the
to a new filename and the original permanently replaced, or a personal information of the targeted user, such as passwords,
server can detect that the image was not requested as part of usernames, security codes, and credit card numbers, among
normal browsing, and instead send a warning image. other things. This paper discuss about the various types of
phishing attacks and various anti phishing techniques used to
B. Augmenting password logins: prevent phishing attack.
The Bank of America's website is one of several that ask users This paper based study revealed that users are vulnerable to
to select a personal image (marketed as Site Key), and display phishing-based social engineering attacks indicating that there
this user-selected image with any forms that request a is still a significant lack of awareness in line with previous
password. Users of the bank's online services are instructed to findings. An understanding of how to identify a phishing
enter a password only when they see the image they selected. attack cannot be underestimated as current anti-phishing
However, several studies suggest that few users refrain from mechanisms may not guarantee the user complete protection.
entering their passwords when images are absent. In addition, As a result increased user awareness is paramount as a
this feature (like other forms of two-factor authentication) is countermeasure against phishing.
susceptible to other attacks, such as those suffered by
Scandinavian bank Nordea in late 2005, and Citibank in 2006.
REFERENCES
A similar system, in which an automatically generated [1] Engin Kirda and Christopher Kruegel 2005 ,” Protecting Users Against
Phishing Attacks with AntiPhish”. Computer Software and Applications
"Identity Cue" consisting of a colored word within a colored Conference, COMPSAC 2005. 29th Annual International (Volume: 1 ).
box is displayed to each website user, is in use at other [2] Craig M. McRae Rayford B. Vaughn 2007 ,” Phighting the
financial institutions. Phisher:Using Web Bugs and Honeytokens to Investigate the Source of
Security skins are a related technique that involves overlaying
a user-selected image onto the login form as a visual cue that Phishing Attacks “,Proceedings of the 40th Annual Hawaii International
the form is legitimate. Unlike the website-based image Conference on System Sciences (HICSS'07).
schemes, however, the image itself is shared only between the [3] Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei Bidgoli 2007, “Learn
To Detect Phishing Scams Using Learning and Ensemble Methods”,
user and the browser, and not between the user and the Proceedings of the 2007 IEEE/WIC/ACM.
website. The scheme also relies on a mutual authentication [4] M. Young, The Technical Writer’s Handbook. Mill Valley,.
protocol, which makes it less vulnerable to attacks that affect
user-only authentication schemes.
[5] Anti-Phishing Working Group (2009) “Phishing Activity Trends
Still another technique relies on a dynamic grid of images that Report: 3rd Quarter 2009”
is different for each login attempt. The user must identify the Availablehttp://www.antiphishing.org/reports/apwg_report_Q3_2009.pdf
(Accessed: 15 January 2010).
pictures that fit their pre-chosen categories (such as dogs, cars [6] Dhamija, R., Tygar, J.D. and Hearst, M. (2006) “Why Phishing Works”,
and flowers). Only after they have correctly identified the Proceedings of the SIGCHI conference on Human Factors in computing
pictures that fit their categories are they allowed to enter their systems, Montréal, Québec, Canada. pp. 581-590.
alphanumeric password to complete the login. Unlike the
static images used on the Bank of America website, a dynamic
image-based authentication method creates a one-time
passcode for the login, requires active participation from the
user, and is very difficult for a phishing website to correctly
replicate because it would need to display a different grid of
randomly generated images that includes the user's secret
categories.
C. Eliminating phishing mail:
Specialized spam filters can reduce the number of phishing
emails that reach their addressees' inboxes, or provide post-
delivery remediation, analyzing and removing spear phishing
attacks upon delivery through email provider-level integration.
These approaches rely on machine learning and natural
language processing approaches to classify phishing emails.
Email address authentication is another new approach.

Anda mungkin juga menyukai