Research
Implementation and Performance Evaluation of Proactive and Reactive Routing Protocols with Intrusion Detection in MANET
Supervisor: Dr. Dulal Chakraborty
January 2022 - September 2022
Research Objectives: The primary goal of this research is to analyze the impact of intrusion attacks on proactive and reactive routing protocols such as OLSR and AODV and propose a model to mitigate the impact of intrusion attacks.
Research Methodology: The entire research work is done through simulation. The OPNET 14.5 simulator is used for simulation work.
Research Challenges: Unstable development environment due to OPNET, model, or hardware issues such as tool crashes. Also, a lot of time is spent learning about and working around the models due to insufficient documentation.
Research Findings: Both AODV and OLSR routing protocols are vulnerable to intrusion attacks, and their performance is significantly reduced due to this attack. But their performance can be improved by taking the proper steps.
Future Research Prospects: In our future work, we will try to implement a trust-based security framework to reduce the impact of black hole attacks and improve the performance of AODV and OLSR protocols.
The work is divided into three main stages.
MANET simulation scenario for 30 nodes
First Stage: In the first phase of this research, we analyzed the three routing protocols (OLSR, AODV, and DSR) in terms of performance measures including end-to-end delay, network load, throughput, and retransmission attempts. The OPNET 14.5 (Educational Version) simulator is used to carry out the simulation work.
Average end-to-end delay (ms) vs. number of nodes of AODV, DSR, OLSR routing protocols
Average throughput vs. number of nodes of AODV, DSR, OLSR routing protocols
Second Stage: In the second phase of this research, we modeled the intrusion attack using two different protocols—reactive (AODV) and proactive (OLSR)—and analyzed the effects it had on the performance of the network. To accomplish this, we changed the parameters of the AODV and OLSR routing protocols so that they behave like black holes. In this stage, we evaluated the performance of the AODV and OLSR routing protocols in relation to network load, throughput, and end-to-end delay performance metrics in the presence of an intrusion attack.
Average end-to-end delay (ms) vs. number of nodes of AODV routing protocol with and without intrusion
Average network load vs. number of nodes of OLSR routing protocol with and without intrusion
Third Stage: In the final phase of this research, we suggested a model that would lessen the effects of intrusion attacks while enhancing performance. To do this, we once again altered the parameters of the routing protocols. Following a few precise simulations, we discovered that our approach enhances the network performance of both protocols.
Average end-to-end delay comparison of AODV for the proposed model
Average network load comparison of OLSR for the proposed model