SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
DOI : 10.5121/ijcnc.2016.8207 77
PERFORMANCE EVALUATION OF WIRELESS SENSOR
NETWORK UNDER HELLO FLOOD ATTACK
Mohammad Abdus Salam and Nayana Halemani
Department of Computer Science, Southern University and A&M College
Baton Rouge, USA
ABSTRACT
Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight
sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are
tiny and lightweight, they put some limitations on resources such as usage of power, processing given task,
radio frequency range. These limitations allow network vulnerable to many different types of attacks such
as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is
one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and
compared the network performance as number of attackers increases. Network performance is evaluated
by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It
has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know
how the network performance changes. The simulation results show that as the number of attackers
increases the performance in terms of throughput and delay changes.
KEYWORDS
Wireless sensor networks, security, hello flood attack, passive attack, active attack
1. INTRODUCTION
Applications of WSN are numerous and growing rapidly. WSNs are widely used in situations like
battlefield, intelligent communications, smart buildings, bushfire response, military command,
wildlife monitoring, industrial quality control, observation of critical infrastructures, examining
human heart rates, smart homes, and many more scenarios. Wireless sensor networks are prone
to failures and malicious attacks. Due to their deployment in remote areas, these networks may
lead to numerous security threats and affect network performance. Many researchers have
discussed these various types of attacks and security issues [1-2].
Hello flood attack is most common attack in WSN. In this kind of attack a malicious node keep
sending hello request to the legitimate node, which will alter the security of the system [4].It
occurs on network layer in which an adversary node, which is not a legal node,sends hello
packets request to most of the nodes in the network. As these adversary nodes have high
transmission power, they have capacity to transmit hello packets to most nodes in network and
become reason to break security of WSN, which in turn lead to bad network performance.
Although there are many detection and prevention algorithms, but most of the algorithms have
some disadvantage by which they fail to detect attacker in network.
In many cases the hello packets are sent to every node before sending actual packet to know if it
is friend or stranger node, if node replies back for hello message then it is considered as friend
nodes or otherwise it is stranger node. In some other algorithms if node does not reply in certain
threshold time it is detected as malicious node. Hello flood attack can cause harm to the following
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
78
protocols: TinyOs beaconing, directed diffusion and its multipath variant, minimum cost
forwarding, clustering based protocols (LEACH, TEEN, PEGASIS), and energy conserving
topology maintenance (SPAN, GAF, ECE, AFECA) [3].
In this research, we have considered hello flood attack and identified performance penalties by
several metrics such as throughput and delay in networks with no attacker, single attacker, and
multiple attackers’ scenarios.
The network with no attacker performs well as compared to single and multiple attackers.
Network performance of each is evaluated by comparing metrics, which are throughput and
delay. Thus it will be able to know by how much percent each case vary and accordingly it may
lead to further research for providing good mechanism for detection of attackers and securing the
network from attackers.
2. SECURITY GOALS OF SENSOR NETWORK
Many applications rely on security performance of the network. Major security goals of sensor
network are as follows [4-8]:
1. DATA CONFIDENTIALITY - Data confidentiality is managing access of files either in
storage or in transit. Basically it is the ability to protect messages from attackers so that
any message communicated through sensor network remains confidential.
2. DATA INTEGRITY - Data Integrity in sensor networks is needed to ensure the
reliability of data and refers to the ability to confirm that the information is not changed
due to malicious intent or by accident.
3. DATA AUTHENTICATION - The receiving node need to ensure that the data originates
from the reliable resource. Due to the wireless nature of the media and the unattended
nature of sensor networks, attaining authentication is major challenge.
4. DATA AVAILABILITY – Sensor node may run out of battery power due to large
amount of processing or communication and become unavailable, which will cause
failure of base station and worsen the entire network. Hence ability of sensor node to use
resources or the ability of network for message to communicate determines data
availability.
5. DATA FRESHNESS – Data freshness can be attained by ensuring no old data is
replayed.
6. SELF-ORGANIZATION – There is no fixed infrastructure for WSN network
management hence every sensor node must have capability of self-organizing.
7. TIME SYNCHRONIZATION – Sometimes nodes need to recharge after they have used
their power hence it is necessary for nodes to turn off periodically to regain their energy.
8. SECURE LOCALIZATION– Sensor network need accurate location for secured data
processing however attacker can easily inject false data in secured location by reporting
false signal strengths and my divert communication path.
3. TYPES OF ATTACKERS
Due to the broadcast nature of the transmission medium WSNs are more prone to security attack.
Often, nodes are placed in a hostile or dangerous environment where there is no physical
protection; hence this may lead to security threats. Many types of attacks were documented. Two
major types of attacks are active attack and passive attack. Figure 1 shows the basic classification
of attacks under general categories [2].
International Journal of Computer
PASSIVE ATTACKS: A malicious
communication channel. This type
contribute anything in the communication
confidential information and prepare
ACTIVE ATTACKS: A malicious
data stream to the communication
and pretends as a valid node. It injects
services.
Many routing protocols for wireless
Most of the routing attacks are: hello
selective forwarding attack. Some
affect the routing protocols.
Figure
Hello flood attack: In WSN, many
flood attacks make use of such type
high energy at all time. With this
another node, which may have
neighboring nodes. As a result, the
that they may consider it as base
following Figures 2(a) through Figure
2(a) and Figure 2(b) show no influence
network setup message to the nodes
Computer Networks & Communications (IJCNC) Vol.8, No.2, March
malicious unauthorized node is monitoring and listening
type of attack is harder to detect since the attacker
communication channel. The attacker’s intention
prepare for an active attack.
malicious unauthorized node is monitoring, listening, and modifying
communication channel. In this type of attack, the attacker plays
injects or modifies transmission messages. It may cause
wireless sensor networks are very simple and very easy
hello flood, Sybil attack, wormhole attack, Black hole
Some attacks manipulate the user data directly and
Figure 1: Classification of WSN attacks
many protocols require to send hello packets to its neighbor.
type of packets. This ideal characteristicof the attacker
this high energy, it has the capacity to send or reply hello
have been located far away. This may lead to misguidance
the nodes try to send packets through the attacker or
base station and thus are deceived by the attacker
Figure 2(d), we explain how hello flood attack takes
influence of hello flood attacker. The base station
nodes and forms the network (Figure 2(a)). Once the
March 2016
79
listening to the
attacker does not
is to gather
modifying the
an active role
cause denial of
easy to attack.
hole attack, and
some attacks
neighbor. Hello
attacker possesses
hello packets to
misguidance to
or it is possible
attacker [3]. In the
place. Figure
station sends initial
the initial setup
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
80
phase is completed, the nodes send message to the base station directly or through other
intermediary nodes depending upon the network routing topology (Figure 2(a)). A high power
adversary node in introduced in the network as an attacker (Figure 2(c)). She is trying to get
control of the nodes by sending high power hello messages to the nodes. The legitimate nodes
consider the attacker as a valid node or base station and start sending or routing packages through
the attacker (Figure 2(d)). Therefore, under the worst-case scenario, the network will be under the
full control of the hello flood attacker. Here the attacker sends single-hop broadcast messages to
most nodes.
Many hierarchical based clustering protocols, such as LEACH and directed diffusion are easy to
fall under this type of attack. Many security measurements are proposed to handle the hello flood
attack [3].
4. DETECTION & PREVENTION MECHANISM AGAINST HELLO FLOOD
Even though there are different mechanisms to detect and prevent network from this type of
attack, there is no such mechanism that is 100% efficient.Adversaries can attack on network flow,
network latency, and get control over the networks.Prevention mechanism used in [9] involves
authentication between communicating nodes, each node in this is capable of calculating pairwise
key between nodes so that network will have secured communication on multi-hop routing. This
mechanism is a very secure communication but calculating pairwise key and setting up the route
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
81
may need more processing hence this is not efficient. In [14], the author has adopted identity
verification protocol and this protocol used echo back mechanism for verification of bi-
directional of a link. The attacker can compromise a node before feedback message can block
other nodes by dropping feedback messages. Thus when an attacker has high sensitive receiver
and powerful transmitter this mechanism becomes inefficient. In [10], the authors used
cryptographic method to prevent hello flood attack. In their study, the message reached to
destination node can decrypt and verify the message. This mechanism is not efficient when
attacker is capable of spoofing its identity and then generates attack. There are many other
mechanisms to detect and prevent but every mechanism has been shown inconsistency with
regard to security issue and has greater impact on network performance [11].
5. PERFORMANCE FACTOR
As shown in Figure 2, performance of network depends on factors like network delay, success
rate, throughput, energy consumption, latency, and network lifetime [6]. These factors are briefly
described as follows.
• NETWORK DELAY: It is the measurement of time taken to send the message and time
take to successfully receive message at destination.
• ENERGY CONSUMPTION: It is sum of energy used for communication including,
energy transmitted (Pt), energy received (Pr), and energy used at idle state (Pi). Assuming
each transmission consume an energy unit. Total energy consumption is the total number
of packet sent in network.
• SUCCESS RATE: It measures the success rate of message received. It is defined as total
number of packetsreceived at destination against total number of packet sent from the
sources [10].
• LATENCY: It is the amount of time between start of disseminating a data and its arrival
at node interested in receiving the data. Hence latency calculates the performance of
individual message.
• THROUGHPUT: It is the measure of packets received per second at the destination
• NETWORK LIFETIME: It is time until message loss rate is above given threshold
Packet generation ratio: number of packets that the sensor node transmits in one time
period, usually a second [10].
The threats against WSNs can be implemented in different layers of the OSI protocol stack. The
common types of these attacks [12], classified based on the OSI layers, are presented in Table 1.
Table 1: WSN attacks on OSI layers
OSI LAYER ATTACKS
Application Layer Clock Skewing, Selective Message Forwarding, Data Aggregation
Distortion.
Physical layer Jamming, Radio interference, Tampering or Destruction.
Data link Collision Exhaustion, Unfairness, Interrogation, Sybil Attack.
Network Layer Sinkhole, Flooding(Hello flood, Ping flood), Node capture, Selective
forwarding or Black hole or Neglect and Greed Sensor nodes
Attack,Attack, Wormhole, Spoofed or Altered, Replayed routing
information, Acknowledgment spoofing, Misdirection, Internet Smurf,
and Homing.
Transport Layer Flooding (SYN flood), Desynchronization.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
82
6. CONFIGURING NETWORK SIMULATOR
In NS2 simulator, manysensor nodes can be created and data transfer among the nodes is very
convenient.After creating the nodes, a connection must be established between the nodes in the
network. There are several protocols that can be used to establish connectivity among the nodes.
The user datagram protocol (UDP) is a connection less protocol and it can be used when there is a
lot of traffic in the system. Transmission control protocol (TCP) is a connection-oriented protocol
that provides acknowledgement from the receiver. Once connection is established, data can be
sent bidirectional. There are TCP agent and TCP sink. TCP agent is responsible for sending the
packets in the network, which can be called as a source node. TCP sink is the receiver node,
which receives the packets sent by the sender.
The hello flood attackis introduced into the system by making some of the nodes as malicious
nodes. In our system, the simulation is shown from no attacks to multiple attacks.
We have performed the throughput and delay computation by using network simulator, NS2. In
our studies malicious node (which is under hello flood attack) is introduced and performance of
network is analyzed with routing protocol. Simulation is performed for no attacker, single
attacker, and multiple attacker scenarios. For our network, we have considered 100 nodes. The
hello flood attack is simulated by modifying the aodv.h and aodv.cc files in NS2 simulator [15].
There are two types of attacks that are popular with the WSN, namely, physical attack and
logical attack [13]. Physical 1ttack includes capturing of the nodes and tampering the nodes,
which will lead to loss of data. On the other hand, logical attack includes sinkhole attack,
wormhole attack, hello flood attack, selective forwarding attack, Sybil attack, and denial of
service attack.
6.1 Simulation Of Hello Flood Attack
In hello flood attack, the node, which receives a message, assumes that the sender has sent it,
which is not the case always. It can occur when there is huge amount of traffic in the system.
Several cryptographic techniques and methods have been implemented in order to prevent this
attack but each one had its own drawback. This attack is simulated in order to create hello flood
attack where we can see the target node being flooded by the packets. The aodv.h and aodv.cc
contain all the codes about the routing, providing a path for routing and information on the packet
forwarding. Figure 3shows the simulation of hello flood attack. A node is made as a target node
and it is flooded with lots of hello messages, which creates black circles in the simulator. The
user can enter the source and destination as he wishes which is shown in Figure 3. Here, blue
nodes are source and destination.Trace file for network having single hello flood attacker is
shown in Figure 4.
International Journal of Computer
Figure 3:
Figure 5 and Figure 6 show the
Figure 4:Trace
Computer Networks & Communications (IJCNC) Vol.8, No.2, March
Network with one malicious node(node 100)
the network diagrams for 4 and 6 attackers, respectively.
:Trace file for network having single hello flood attacker
March 2016
83
respectively.
International Journal of Computer
Figure 5: Network
Figure 6: Network with
Computer Networks & Communications (IJCNC) Vol.8, No.2, March
Network with four malicious nodes (100, 101,102, and 103)
with 6 malicious nodes (100,101,102,103,104, and 105)
March 2016
84
International Journal of Computer
7. RESULTS
Using the network simulator NS2,
network performance. It calculates
Throughput in the network can
analyzing the network performance.
generate a graph. The X- axis represents
when transmission starts there is
and slowly it drops as the number
The delay is the difference of time
received at the destination. Like
network performance. In Figure
shows the effect of delay on the
network but as time elapses and the
Computer Networks & Communications (IJCNC) Vol.8, No.2, March
NS2, the attacks is simulated and graphsare generated to
calculates throughput and delay of the network in each case.
be affected by various numbers of factors. It plays
performance. The trace file generated is passed as an input
represents time and Y-axis represents throughput rate.
is huge amount of traffic in the system, so the throughput
number of attackers increased (Figure 7).
Figure 7:Graph for throughput
time between when the message is sent and when it is
Like throughput, delay is also one of the factors for analyzing
Figure 8, the X-axis represents time and Y-axis represents
the wireless sensor network. Initially, there will not be
the number of attackers increase, the delay increases.
Figure 8: Graph for delay
March 2016
85
to monitor the
case.
plays vital role in
input in order to
rate. Initially,
throughput is high
is successfully
analyzing the
represents delay. It
be any delay in
increases.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
86
The Table 2 shows the percentage of increase and decrease in delay and throughput as compared
to with no attacker.
Table 2: Simulation output for delay and throughput
Number of Attacker Delay (in percent) Throughput (in percent)
1 90.91 44.83
4 272.73 60.07
5 290.91 65.52
6 318.18 72.41
8. CONCLUSION
In this paper, we have simulated hello flood attack using NS2 simulator and performance of
network is analyzed based on AODV routing protocol. We have considered 100 sensor nodes. We
simulated the network from no attacker scenario to many attackers scenarios. Hello flooding
basically occurs when any malicious node in the network transmits packets with very high power
in a frequent interval of time. So, the actual damage in the network is based on this periodicity of
sending information and power. It does not depend on packet size. The throughput and delay of
the network with no attacker and single attacker has no much difference till the first 20 seconds
and as number of attackers increases the throughput will decrease and delay increases.
We have considered only delay and throughput as a performance factors. There are other factors
or network parameters like latency, success rate, network lifetime, which are not included in this
research. As a future exploration, we plan to conduct research on the overall performance of
wireless sensor networks on these parameters. Also, there are several research topics on severity
of various attacks and their performance measure.
ACKNOWLEDGEMENTS
The authors would like to thank anonymous reviewers for their valuable comments and
suggestions that have improved this paper.
REFERENCES
[1] Al-Sakib Khan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless Sensor Networks:
Issues and Challenges”, International conference on Advanced Computing Technologies, page: 1043-
1045, 2006.
[2] G.Padmavati and D.Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in
Wireless Sensor Networks”, vol.4, 2009.
[3] Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures”, AdHoc Networks (elsevier), page: 299-302, 2003.
[4] A. Patham, Hyung-Woo Lee,ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and
Challenges” Advanced Communication Technology (ICACT), 2006.
[5] T. Zia andA. Zomaya, “Security Issues in Wireless Sensor Networks”, Systems and Networks
Communications (ICSNC), 2006.
[6] MD.Abdul Hamid,Mamun-Or-Rashid, and ChoongSeon Hong, ”Defense against laptop class attacker
in wireless sensor network,” 8th International conference,2006.
[7] Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah, and KashifNaseer
Qureshi "Security Issue in Attackers in Wireless Sensor Networks", IDOSI Publications, 2014.
[8] J. Undercoffer,S. Avancha, A. Joshi, and J. Pinkston, “Security for Sensor Networks”. In Proceedings
of the CADIP Research Symposium, University of Maryland, Baltimore County, USA, 2002.
International Journal of Computer
[9] VenkataGiruka,MukeshSinghal,
vol.8,2008.
[10] Chris Karlof and David Wangner,
Countermeasures”, IEEE,2003.
[11] M. Razzaque and Ahmad Salehi,“Security
the Road Ahead”, Wireless Networks
[12] R. E. Shannon, “Introduction to
winter simulation (WSC’98), 1989.
[13] Virendra Pal Singh, Aishwarya
Attack Detection and Prevention
Applications (0975 – 8887), Volume
[14] Damandeep Kaur and Parminder
the Performance of WSNs during
January 2014.
[15] NisargGandhewar and Rahila
simulator”, 2011.
AUTHORS
Mohammad Abdus Salam is a
Southern University, Baton Rouge,
Fukui University, Japan.He is a senior
wireless communication, error controlcoding,
Nayana Halemani earned Masters
University, Baton Rouge, Louisiana.
Science at Visvesvaraya Technological
worked for 2 years as a teaching assistance
in teaching profession, she took
structure C++.
Computer Networks & Communications (IJCNC) Vol.8, No.2, March
VenkataGiruka,MukeshSinghal,James Royalty, and Varanasi, ”Security in wireless sensor
Wangner, ”Secure Routing in Wireless Sensor Networks:
IEEE,2003.
Salehi,“Security and Privacy in Vehicular Ad- Hoc Networks:
Networks and Security, Springer: 107- 132, 2013.
to the art and science of simulation,” in Proc. of the 30th
1989.
Aishwarya S. AnandUkey, and Sweta Jain "Signal Strength based
Prevention in Wireless Sensor Networks" nternational Journal
Volume 62– No.15, January 2013.
Parminder Singh "Various OSI Layer Attacks and Countermeasure
during Wormhole attack", IEEE Int. J. on Network Security,
Patel, "Performance evaluation of AODV protocol in Magnetusing
professor in the Department of Computer Science at
Rouge, Louisiana, USA. He received his PhD degree from
senior member of IEEE. His research interests include
ontrolcoding, and sensor networks.
Masters of Computer Science in 2015 from Southern
Louisiana. She completed her Bachelor's Degree in Computer
Technological University in, Karnataka, India in 2009. She
assistance in engineering college, India. While she was
responsibility to teach C programming and data
March 2016
87
sensor networks,”
Networks: Attacks and
Networks: Survey and
30th conference on
based Hello Flood
Journal of Computer
Countermeasure to Enhance
Security, Vol. 5, No. 1,
Magnetusing NS2

More Related Content

What's hot (20)

PDF
Blackhole attack in Manet
Prof Ansari
 
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
pijans
 
PDF
I1802046780
IOSR Journals
 
PPTX
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
PDF
A secure routing process to simultaneously defend against false report and wo...
ieijjournal
 
PDF
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
PPTX
Wormhole attack
Harsh Kishore Mishra
 
PDF
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
PPT
Security in wireless sensor networks
Piyush Mittal
 
PPT
Security in mobile ad hoc networks
Piyush Mittal
 
PPTX
6. security in wireless sensor netwoks
Rushin Shah
 
PDF
A security method for multiple attacks in sensor networks against false repor...
ieijjournal
 
PDF
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
IOSR Journals
 
PDF
Hg3312711275
IJERA Editor
 
PPTX
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PDF
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
eSAT Journals
 
PDF
A review paper on watchdog mechanism in wireless
eSAT Publishing House
 
PDF
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
PPTX
Security Issues in MANET
Nitin Verma
 
PPTX
Black hole attack
Richa Kumari
 
Blackhole attack in Manet
Prof Ansari
 
An ids scheme against black hole attack to secure aomdv routing in manet
pijans
 
I1802046780
IOSR Journals
 
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
A secure routing process to simultaneously defend against false report and wo...
ieijjournal
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
Wormhole attack
Harsh Kishore Mishra
 
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
Security in wireless sensor networks
Piyush Mittal
 
Security in mobile ad hoc networks
Piyush Mittal
 
6. security in wireless sensor netwoks
Rushin Shah
 
A security method for multiple attacks in sensor networks against false repor...
ieijjournal
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
IOSR Journals
 
Hg3312711275
IJERA Editor
 
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
eSAT Journals
 
A review paper on watchdog mechanism in wireless
eSAT Publishing House
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
Security Issues in MANET
Nitin Verma
 
Black hole attack
Richa Kumari
 

Viewers also liked (19)

PDF
A survey of multimedia streaming in
IJCNCJournal
 
PDF
A predictive framework for cyber security analytics using attack graphs
IJCNCJournal
 
PDF
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
IJCNCJournal
 
PDF
PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT...
IJCNCJournal
 
PDF
Localization for wireless sensor
IJCNCJournal
 
PDF
Assessment of health monitoring
IJCNCJournal
 
PDF
Qos evaluation of heterogeneous
IJCNCJournal
 
PDF
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
PDF
A scheme for maximal resource
IJCNCJournal
 
PDF
Using spectral radius ratio for node degree
IJCNCJournal
 
PDF
On the approximation of the sum of lognormals by a log skew normal distribution
IJCNCJournal
 
PDF
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
IJCNCJournal
 
PDF
Maximizing network interruption in wireless
IJCNCJournal
 
PDF
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
IJCNCJournal
 
PDF
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
IJCNCJournal
 
PDF
The comparison of immunization
IJCNCJournal
 
PDF
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
IJCNCJournal
 
PDF
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
IJCNCJournal
 
PDF
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
IJCNCJournal
 
A survey of multimedia streaming in
IJCNCJournal
 
A predictive framework for cyber security analytics using attack graphs
IJCNCJournal
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
IJCNCJournal
 
PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT...
IJCNCJournal
 
Localization for wireless sensor
IJCNCJournal
 
Assessment of health monitoring
IJCNCJournal
 
Qos evaluation of heterogeneous
IJCNCJournal
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
A scheme for maximal resource
IJCNCJournal
 
Using spectral radius ratio for node degree
IJCNCJournal
 
On the approximation of the sum of lognormals by a log skew normal distribution
IJCNCJournal
 
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
IJCNCJournal
 
Maximizing network interruption in wireless
IJCNCJournal
 
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
IJCNCJournal
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
IJCNCJournal
 
The comparison of immunization
IJCNCJournal
 
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
IJCNCJournal
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
IJCNCJournal
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
IJCNCJournal
 
Ad

Similar to PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK (20)

PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
PPTX
Wireless Sensor Network Security
ghaidaa WN
 
PDF
A Review of Network Layer Attacks and Countermeasures in WSN
iosrjce
 
PDF
C010631015
IOSR Journals
 
PDF
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
PDF
intrution to WSN.pdf.....................
danieldencil27
 
PDF
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
CSCJournals
 
PDF
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
PDF
wireless sensor network security
aibad ahmed
 
PDF
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
IRJET Journal
 
PDF
Survey on data aggregation based security attacks in wireless sensor network
IJECEIAES
 
PDF
Ar34261268
IJERA Editor
 
PDF
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
PDF
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
PDF
Neighbor Node Trust Based Intrusion Detection System for WSN
Hitesh Mohapatra
 
PPTX
Vampire attack in wsn
Richa Kumari
 
PDF
Sunilkumar2017
Sharonp15
 
PDF
Sunilkumar2017
Sharonp15
 
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
PDF
Attacks and counterattacks on wireless sensor networks
ijasuc
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
Wireless Sensor Network Security
ghaidaa WN
 
A Review of Network Layer Attacks and Countermeasures in WSN
iosrjce
 
C010631015
IOSR Journals
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
intrution to WSN.pdf.....................
danieldencil27
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
CSCJournals
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
wireless sensor network security
aibad ahmed
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
IRJET Journal
 
Survey on data aggregation based security attacks in wireless sensor network
IJECEIAES
 
Ar34261268
IJERA Editor
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
Neighbor Node Trust Based Intrusion Detection System for WSN
Hitesh Mohapatra
 
Vampire attack in wsn
Richa Kumari
 
Sunilkumar2017
Sharonp15
 
Sunilkumar2017
Sharonp15
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
Attacks and counterattacks on wireless sensor networks
ijasuc
 
Ad

More from IJCNCJournal (20)

PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
PDF
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
PDF
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
PDF
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
PDF
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 

Recently uploaded (20)

PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
PPTX
Structural Functiona theory this important for the theorist
cagumaydanny26
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PPTX
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Smart_Cities_IoT_Integration_Presentation.pptx
YashBhisade1
 
PPT
Total time management system and it's applications
karunanidhilithesh
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
File Strucutres and Access in Data Structures
mwaslam2303
 
PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PPTX
Mining Presentation Underground - Copy.pptx
patallenmoore
 
PDF
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
PDF
13th International Conference of Networks and Communications (NC 2025)
JohannesPaulides
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
Structural Functiona theory this important for the theorist
cagumaydanny26
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Smart_Cities_IoT_Integration_Presentation.pptx
YashBhisade1
 
Total time management system and it's applications
karunanidhilithesh
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
File Strucutres and Access in Data Structures
mwaslam2303
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
Mining Presentation Underground - Copy.pptx
patallenmoore
 
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
13th International Conference of Networks and Communications (NC 2025)
JohannesPaulides
 

PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 DOI : 10.5121/ijcnc.2016.8207 77 PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK Mohammad Abdus Salam and Nayana Halemani Department of Computer Science, Southern University and A&M College Baton Rouge, USA ABSTRACT Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes. KEYWORDS Wireless sensor networks, security, hello flood attack, passive attack, active attack 1. INTRODUCTION Applications of WSN are numerous and growing rapidly. WSNs are widely used in situations like battlefield, intelligent communications, smart buildings, bushfire response, military command, wildlife monitoring, industrial quality control, observation of critical infrastructures, examining human heart rates, smart homes, and many more scenarios. Wireless sensor networks are prone to failures and malicious attacks. Due to their deployment in remote areas, these networks may lead to numerous security threats and affect network performance. Many researchers have discussed these various types of attacks and security issues [1-2]. Hello flood attack is most common attack in WSN. In this kind of attack a malicious node keep sending hello request to the legitimate node, which will alter the security of the system [4].It occurs on network layer in which an adversary node, which is not a legal node,sends hello packets request to most of the nodes in the network. As these adversary nodes have high transmission power, they have capacity to transmit hello packets to most nodes in network and become reason to break security of WSN, which in turn lead to bad network performance. Although there are many detection and prevention algorithms, but most of the algorithms have some disadvantage by which they fail to detect attacker in network. In many cases the hello packets are sent to every node before sending actual packet to know if it is friend or stranger node, if node replies back for hello message then it is considered as friend nodes or otherwise it is stranger node. In some other algorithms if node does not reply in certain threshold time it is detected as malicious node. Hello flood attack can cause harm to the following
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 78 protocols: TinyOs beaconing, directed diffusion and its multipath variant, minimum cost forwarding, clustering based protocols (LEACH, TEEN, PEGASIS), and energy conserving topology maintenance (SPAN, GAF, ECE, AFECA) [3]. In this research, we have considered hello flood attack and identified performance penalties by several metrics such as throughput and delay in networks with no attacker, single attacker, and multiple attackers’ scenarios. The network with no attacker performs well as compared to single and multiple attackers. Network performance of each is evaluated by comparing metrics, which are throughput and delay. Thus it will be able to know by how much percent each case vary and accordingly it may lead to further research for providing good mechanism for detection of attackers and securing the network from attackers. 2. SECURITY GOALS OF SENSOR NETWORK Many applications rely on security performance of the network. Major security goals of sensor network are as follows [4-8]: 1. DATA CONFIDENTIALITY - Data confidentiality is managing access of files either in storage or in transit. Basically it is the ability to protect messages from attackers so that any message communicated through sensor network remains confidential. 2. DATA INTEGRITY - Data Integrity in sensor networks is needed to ensure the reliability of data and refers to the ability to confirm that the information is not changed due to malicious intent or by accident. 3. DATA AUTHENTICATION - The receiving node need to ensure that the data originates from the reliable resource. Due to the wireless nature of the media and the unattended nature of sensor networks, attaining authentication is major challenge. 4. DATA AVAILABILITY – Sensor node may run out of battery power due to large amount of processing or communication and become unavailable, which will cause failure of base station and worsen the entire network. Hence ability of sensor node to use resources or the ability of network for message to communicate determines data availability. 5. DATA FRESHNESS – Data freshness can be attained by ensuring no old data is replayed. 6. SELF-ORGANIZATION – There is no fixed infrastructure for WSN network management hence every sensor node must have capability of self-organizing. 7. TIME SYNCHRONIZATION – Sometimes nodes need to recharge after they have used their power hence it is necessary for nodes to turn off periodically to regain their energy. 8. SECURE LOCALIZATION– Sensor network need accurate location for secured data processing however attacker can easily inject false data in secured location by reporting false signal strengths and my divert communication path. 3. TYPES OF ATTACKERS Due to the broadcast nature of the transmission medium WSNs are more prone to security attack. Often, nodes are placed in a hostile or dangerous environment where there is no physical protection; hence this may lead to security threats. Many types of attacks were documented. Two major types of attacks are active attack and passive attack. Figure 1 shows the basic classification of attacks under general categories [2].
  • 3. International Journal of Computer PASSIVE ATTACKS: A malicious communication channel. This type contribute anything in the communication confidential information and prepare ACTIVE ATTACKS: A malicious data stream to the communication and pretends as a valid node. It injects services. Many routing protocols for wireless Most of the routing attacks are: hello selective forwarding attack. Some affect the routing protocols. Figure Hello flood attack: In WSN, many flood attacks make use of such type high energy at all time. With this another node, which may have neighboring nodes. As a result, the that they may consider it as base following Figures 2(a) through Figure 2(a) and Figure 2(b) show no influence network setup message to the nodes Computer Networks & Communications (IJCNC) Vol.8, No.2, March malicious unauthorized node is monitoring and listening type of attack is harder to detect since the attacker communication channel. The attacker’s intention prepare for an active attack. malicious unauthorized node is monitoring, listening, and modifying communication channel. In this type of attack, the attacker plays injects or modifies transmission messages. It may cause wireless sensor networks are very simple and very easy hello flood, Sybil attack, wormhole attack, Black hole Some attacks manipulate the user data directly and Figure 1: Classification of WSN attacks many protocols require to send hello packets to its neighbor. type of packets. This ideal characteristicof the attacker this high energy, it has the capacity to send or reply hello have been located far away. This may lead to misguidance the nodes try to send packets through the attacker or base station and thus are deceived by the attacker Figure 2(d), we explain how hello flood attack takes influence of hello flood attacker. The base station nodes and forms the network (Figure 2(a)). Once the March 2016 79 listening to the attacker does not is to gather modifying the an active role cause denial of easy to attack. hole attack, and some attacks neighbor. Hello attacker possesses hello packets to misguidance to or it is possible attacker [3]. In the place. Figure station sends initial the initial setup
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 80 phase is completed, the nodes send message to the base station directly or through other intermediary nodes depending upon the network routing topology (Figure 2(a)). A high power adversary node in introduced in the network as an attacker (Figure 2(c)). She is trying to get control of the nodes by sending high power hello messages to the nodes. The legitimate nodes consider the attacker as a valid node or base station and start sending or routing packages through the attacker (Figure 2(d)). Therefore, under the worst-case scenario, the network will be under the full control of the hello flood attacker. Here the attacker sends single-hop broadcast messages to most nodes. Many hierarchical based clustering protocols, such as LEACH and directed diffusion are easy to fall under this type of attack. Many security measurements are proposed to handle the hello flood attack [3]. 4. DETECTION & PREVENTION MECHANISM AGAINST HELLO FLOOD Even though there are different mechanisms to detect and prevent network from this type of attack, there is no such mechanism that is 100% efficient.Adversaries can attack on network flow, network latency, and get control over the networks.Prevention mechanism used in [9] involves authentication between communicating nodes, each node in this is capable of calculating pairwise key between nodes so that network will have secured communication on multi-hop routing. This mechanism is a very secure communication but calculating pairwise key and setting up the route
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 81 may need more processing hence this is not efficient. In [14], the author has adopted identity verification protocol and this protocol used echo back mechanism for verification of bi- directional of a link. The attacker can compromise a node before feedback message can block other nodes by dropping feedback messages. Thus when an attacker has high sensitive receiver and powerful transmitter this mechanism becomes inefficient. In [10], the authors used cryptographic method to prevent hello flood attack. In their study, the message reached to destination node can decrypt and verify the message. This mechanism is not efficient when attacker is capable of spoofing its identity and then generates attack. There are many other mechanisms to detect and prevent but every mechanism has been shown inconsistency with regard to security issue and has greater impact on network performance [11]. 5. PERFORMANCE FACTOR As shown in Figure 2, performance of network depends on factors like network delay, success rate, throughput, energy consumption, latency, and network lifetime [6]. These factors are briefly described as follows. • NETWORK DELAY: It is the measurement of time taken to send the message and time take to successfully receive message at destination. • ENERGY CONSUMPTION: It is sum of energy used for communication including, energy transmitted (Pt), energy received (Pr), and energy used at idle state (Pi). Assuming each transmission consume an energy unit. Total energy consumption is the total number of packet sent in network. • SUCCESS RATE: It measures the success rate of message received. It is defined as total number of packetsreceived at destination against total number of packet sent from the sources [10]. • LATENCY: It is the amount of time between start of disseminating a data and its arrival at node interested in receiving the data. Hence latency calculates the performance of individual message. • THROUGHPUT: It is the measure of packets received per second at the destination • NETWORK LIFETIME: It is time until message loss rate is above given threshold Packet generation ratio: number of packets that the sensor node transmits in one time period, usually a second [10]. The threats against WSNs can be implemented in different layers of the OSI protocol stack. The common types of these attacks [12], classified based on the OSI layers, are presented in Table 1. Table 1: WSN attacks on OSI layers OSI LAYER ATTACKS Application Layer Clock Skewing, Selective Message Forwarding, Data Aggregation Distortion. Physical layer Jamming, Radio interference, Tampering or Destruction. Data link Collision Exhaustion, Unfairness, Interrogation, Sybil Attack. Network Layer Sinkhole, Flooding(Hello flood, Ping flood), Node capture, Selective forwarding or Black hole or Neglect and Greed Sensor nodes Attack,Attack, Wormhole, Spoofed or Altered, Replayed routing information, Acknowledgment spoofing, Misdirection, Internet Smurf, and Homing. Transport Layer Flooding (SYN flood), Desynchronization.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 82 6. CONFIGURING NETWORK SIMULATOR In NS2 simulator, manysensor nodes can be created and data transfer among the nodes is very convenient.After creating the nodes, a connection must be established between the nodes in the network. There are several protocols that can be used to establish connectivity among the nodes. The user datagram protocol (UDP) is a connection less protocol and it can be used when there is a lot of traffic in the system. Transmission control protocol (TCP) is a connection-oriented protocol that provides acknowledgement from the receiver. Once connection is established, data can be sent bidirectional. There are TCP agent and TCP sink. TCP agent is responsible for sending the packets in the network, which can be called as a source node. TCP sink is the receiver node, which receives the packets sent by the sender. The hello flood attackis introduced into the system by making some of the nodes as malicious nodes. In our system, the simulation is shown from no attacks to multiple attacks. We have performed the throughput and delay computation by using network simulator, NS2. In our studies malicious node (which is under hello flood attack) is introduced and performance of network is analyzed with routing protocol. Simulation is performed for no attacker, single attacker, and multiple attacker scenarios. For our network, we have considered 100 nodes. The hello flood attack is simulated by modifying the aodv.h and aodv.cc files in NS2 simulator [15]. There are two types of attacks that are popular with the WSN, namely, physical attack and logical attack [13]. Physical 1ttack includes capturing of the nodes and tampering the nodes, which will lead to loss of data. On the other hand, logical attack includes sinkhole attack, wormhole attack, hello flood attack, selective forwarding attack, Sybil attack, and denial of service attack. 6.1 Simulation Of Hello Flood Attack In hello flood attack, the node, which receives a message, assumes that the sender has sent it, which is not the case always. It can occur when there is huge amount of traffic in the system. Several cryptographic techniques and methods have been implemented in order to prevent this attack but each one had its own drawback. This attack is simulated in order to create hello flood attack where we can see the target node being flooded by the packets. The aodv.h and aodv.cc contain all the codes about the routing, providing a path for routing and information on the packet forwarding. Figure 3shows the simulation of hello flood attack. A node is made as a target node and it is flooded with lots of hello messages, which creates black circles in the simulator. The user can enter the source and destination as he wishes which is shown in Figure 3. Here, blue nodes are source and destination.Trace file for network having single hello flood attacker is shown in Figure 4.
  • 7. International Journal of Computer Figure 3: Figure 5 and Figure 6 show the Figure 4:Trace Computer Networks & Communications (IJCNC) Vol.8, No.2, March Network with one malicious node(node 100) the network diagrams for 4 and 6 attackers, respectively. :Trace file for network having single hello flood attacker March 2016 83 respectively.
  • 8. International Journal of Computer Figure 5: Network Figure 6: Network with Computer Networks & Communications (IJCNC) Vol.8, No.2, March Network with four malicious nodes (100, 101,102, and 103) with 6 malicious nodes (100,101,102,103,104, and 105) March 2016 84
  • 9. International Journal of Computer 7. RESULTS Using the network simulator NS2, network performance. It calculates Throughput in the network can analyzing the network performance. generate a graph. The X- axis represents when transmission starts there is and slowly it drops as the number The delay is the difference of time received at the destination. Like network performance. In Figure shows the effect of delay on the network but as time elapses and the Computer Networks & Communications (IJCNC) Vol.8, No.2, March NS2, the attacks is simulated and graphsare generated to calculates throughput and delay of the network in each case. be affected by various numbers of factors. It plays performance. The trace file generated is passed as an input represents time and Y-axis represents throughput rate. is huge amount of traffic in the system, so the throughput number of attackers increased (Figure 7). Figure 7:Graph for throughput time between when the message is sent and when it is Like throughput, delay is also one of the factors for analyzing Figure 8, the X-axis represents time and Y-axis represents the wireless sensor network. Initially, there will not be the number of attackers increase, the delay increases. Figure 8: Graph for delay March 2016 85 to monitor the case. plays vital role in input in order to rate. Initially, throughput is high is successfully analyzing the represents delay. It be any delay in increases.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 86 The Table 2 shows the percentage of increase and decrease in delay and throughput as compared to with no attacker. Table 2: Simulation output for delay and throughput Number of Attacker Delay (in percent) Throughput (in percent) 1 90.91 44.83 4 272.73 60.07 5 290.91 65.52 6 318.18 72.41 8. CONCLUSION In this paper, we have simulated hello flood attack using NS2 simulator and performance of network is analyzed based on AODV routing protocol. We have considered 100 sensor nodes. We simulated the network from no attacker scenario to many attackers scenarios. Hello flooding basically occurs when any malicious node in the network transmits packets with very high power in a frequent interval of time. So, the actual damage in the network is based on this periodicity of sending information and power. It does not depend on packet size. The throughput and delay of the network with no attacker and single attacker has no much difference till the first 20 seconds and as number of attackers increases the throughput will decrease and delay increases. We have considered only delay and throughput as a performance factors. There are other factors or network parameters like latency, success rate, network lifetime, which are not included in this research. As a future exploration, we plan to conduct research on the overall performance of wireless sensor networks on these parameters. Also, there are several research topics on severity of various attacks and their performance measure. ACKNOWLEDGEMENTS The authors would like to thank anonymous reviewers for their valuable comments and suggestions that have improved this paper. REFERENCES [1] Al-Sakib Khan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, International conference on Advanced Computing Technologies, page: 1043- 1045, 2006. [2] G.Padmavati and D.Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, vol.4, 2009. [3] Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), page: 299-302, 2003. [4] A. Patham, Hyung-Woo Lee,ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and Challenges” Advanced Communication Technology (ICACT), 2006. [5] T. Zia andA. Zomaya, “Security Issues in Wireless Sensor Networks”, Systems and Networks Communications (ICSNC), 2006. [6] MD.Abdul Hamid,Mamun-Or-Rashid, and ChoongSeon Hong, ”Defense against laptop class attacker in wireless sensor network,” 8th International conference,2006. [7] Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah, and KashifNaseer Qureshi "Security Issue in Attackers in Wireless Sensor Networks", IDOSI Publications, 2014. [8] J. Undercoffer,S. Avancha, A. Joshi, and J. Pinkston, “Security for Sensor Networks”. In Proceedings of the CADIP Research Symposium, University of Maryland, Baltimore County, USA, 2002.
  • 11. International Journal of Computer [9] VenkataGiruka,MukeshSinghal, vol.8,2008. [10] Chris Karlof and David Wangner, Countermeasures”, IEEE,2003. [11] M. Razzaque and Ahmad Salehi,“Security the Road Ahead”, Wireless Networks [12] R. E. Shannon, “Introduction to winter simulation (WSC’98), 1989. [13] Virendra Pal Singh, Aishwarya Attack Detection and Prevention Applications (0975 – 8887), Volume [14] Damandeep Kaur and Parminder the Performance of WSNs during January 2014. [15] NisargGandhewar and Rahila simulator”, 2011. AUTHORS Mohammad Abdus Salam is a Southern University, Baton Rouge, Fukui University, Japan.He is a senior wireless communication, error controlcoding, Nayana Halemani earned Masters University, Baton Rouge, Louisiana. Science at Visvesvaraya Technological worked for 2 years as a teaching assistance in teaching profession, she took structure C++. Computer Networks & Communications (IJCNC) Vol.8, No.2, March VenkataGiruka,MukeshSinghal,James Royalty, and Varanasi, ”Security in wireless sensor Wangner, ”Secure Routing in Wireless Sensor Networks: IEEE,2003. Salehi,“Security and Privacy in Vehicular Ad- Hoc Networks: Networks and Security, Springer: 107- 132, 2013. to the art and science of simulation,” in Proc. of the 30th 1989. Aishwarya S. AnandUkey, and Sweta Jain "Signal Strength based Prevention in Wireless Sensor Networks" nternational Journal Volume 62– No.15, January 2013. Parminder Singh "Various OSI Layer Attacks and Countermeasure during Wormhole attack", IEEE Int. J. on Network Security, Patel, "Performance evaluation of AODV protocol in Magnetusing professor in the Department of Computer Science at Rouge, Louisiana, USA. He received his PhD degree from senior member of IEEE. His research interests include ontrolcoding, and sensor networks. Masters of Computer Science in 2015 from Southern Louisiana. She completed her Bachelor's Degree in Computer Technological University in, Karnataka, India in 2009. She assistance in engineering college, India. While she was responsibility to teach C programming and data March 2016 87 sensor networks,” Networks: Attacks and Networks: Survey and 30th conference on based Hello Flood Journal of Computer Countermeasure to Enhance Security, Vol. 5, No. 1, Magnetusing NS2