Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is always a possibility for an intruder to launch a jamming attack in order to intercept communication among communication nodes. In this study, a network simulation has been carried out in order to explore and evaluate the possible impacts of jamming attack on MACAW protocol. Ad-hoc network modelling is used to provide communication infrastructure among mobile nodes in order to modelling the simulation scenarios. In simulation model, these nodes have used AODV routing protocol which is designed for MANET while second scenario contains simulated MACAW node models for comparison. On the other hand, this paper is the first study that addresses performance evaluation of MACAW protocol under a constant Jamming Attack. The performance of MACAW protocol is simulated through OPNET Modeler 14.5 software.
Wireless networks take important place in the world of communication. Today a great number of people such as businessmen, managers, students and employees can easily access to the internet or to the corporate networks through wireless connections. Although wireless technologies expand the limits of communication area, they are exposed to some problems due to their nature. These problems violate quality of wireless communication.
Collision, one of these problems occurs when two nodes in the same network, attempt to transmit data at the exact same time [
MACAW, one of these solutions provides effective collision avoidance mechanisms. MACAW protocol is generally used in mobile wireless networks [
On the other hand, security attacks which are another reason for collision occurrence, result in loss of quality in communication as well. In this study, a network simulation has been carried out in order to evaluate performance of MACAW protocol. During this simulation, MACAW protocol has been exposed to a constant Jamming Attack which results high collision occurrence rate in the network. The entire network mechanisms are simulated through OPNET Modeler 14.5 simulation software which is widely used in the network industry to estimate behaviors of network component in a virtual environment. The importance of this study is the first simulation case that addresses performance evaluation of MACAW protocol under a Jamming Attack.
In computer networks, there are many nodes and they have to transmit data packages over the same carrier. This carrier can be an optic cable in wired networks while it is a frequency in wireless networks. Owing to this networking principle, if two nodes in the same network attempt to send data packages to the communication line at the exact same time, a collision occurs. Collisions are important problems for networks because they violate data transmission and results in loss of information. When any collision occurs in the network, the communication stops; ultimately, data packages are dropped. Collisions always results in less throughput of the network, high network load, high delay and high data drop rate [
As mentioned previously, owing to collisions, network nodes face with loss of packet integrity. That means a proper communication cannot be established in the network. In seven layer OSI model [
Multiple Access with Collision Avoidance for Wireless (MACAW) is a widely used MAC sub layer protocol. MACAW is useful for mobile ad-hoc networks. It contains new collision avoidance mechanisms. By these mechanisms data transmission is completed in five steps. These five steps are Request-to-Send (RTS), Clear-to- Send (CTS), Data Sending (DS), data packages and Acknowledgement (ACK). RTS is a message, sent from data sender node to receiver node, notifies that a node attempts to transmit data to another node. CTS message is a respond for transmission request. If receiver node available for transmission then sends a CTS message. DS frame informs receiver node about the size of data package. After that, data transmission starts. When it completes properly, receiver node sends an ACK message to sender node. ACK notifies that data transmission completed successfully [
In computer networking field, testing a complete network’s behaviors in a real environment is a quite costly process. In this case network simulation techniques provide an opportunity to test network equipment such as routers, servers and cables in an inexpensive way. Besides that, network protocols, networks services and other network features can be tested to see behaviors of nodes. Network simulation actions are performed by network simulators in a virtual environment. A network simulator is a software application that estimates behaviors of nodes, equipment and protocols of a modelled network. Simulators typically support commonly used networking technologies such as Wi-Max, WLAN, and ZigBee. Most of these simulators have a Graphical User Interface (GUI). As well as GUI simulators, Command Line Interface (CLI) simulators are also available. Some network simulation software are open source while some are proprietary software. Commonly used simulators are GNS3, ns, OPNET, NetSim, OMNeT++ [
In this simulation experiment while evaluating collision effects on network, mobile nodes have been used. These mobile nodes create an ad-hoc network among them. In OPNET simulator these types of nodes are called as “manet_station_adv”. While simulating scenario, 50 nodes were used.
While performing simulation scenarios, OPNET Modeler 14.5 has been used. In this simulation, 2 different scenarios are designed. The simulation was performed in a 1000 × 1000 meters campus area with 50 mobile nodes. These nodes share the common parameter attributes. In table 1, all global simulation parameters are shown in detail.
In this simulation model, MACAW and AODV protocols are used. The performance evaluation and contents of the protocol is exposed by the researchers in the literature before [
Parameters | Attributes |
---|---|
Protocols | MACAW-AODV |
Simulation Time | 1 Hour |
Simulation Area | 1000 × 1000 (meters) |
Mobility Model | Simple Random Waypoint |
Mobility m/s | 1/10 |
Performance Parameters | Throughput, Network Load, Delay, Drop Rate |
Transmit Power (W) | 0.005 |
RTS Threshold (bytes) | 1024 |
Data Rate (Mbps) | 11 Mbps |
Pkt. Reception power Threshold | −95 dbm |
Buffer Size | 1024,000 |
Pkt. Size (bits) | 2000 |
Pkt. Interarrival time (seconds) | 0.03 |
Trajectory | VECTOR |
Start time (seconds) | 10 |
End Time | End of Simulation |
No of Seeds | 40,000 |
was set as Vector which means mobile nodes change their location unsymmetrically. Finally, Seed value which is number of network events performed in 1 second, was set as 40,000. The successful simulation scenarios have been conducted on simulated different contention-based or contention-less protocols through OPNET in the literature [
In the first scenario, there are 50 mobile nodes that have an ad-hoc network among them. They move at a constant speed of 10 meters per second.
In this scenario illustrated, Application profile, Profile configuration and Mobility configuration are defined to meet network requirements specified in
In this scenario again 50 mobile nodes have been used. Unlike Scenario 1, here also 3 mobile jammer nodes have been used. Scenario 2 is shown on the
While these nodes attempting to communicate between each other properly, two jammer nodes violate communication. They constantly sent large size data packages to the network so that it causes less network throughput, collision occurrences and high network traffic. These jammer nodes were specified according to requirements of the project. Jammer nodes transmit data packages in large sizes. It sends constantly 10,000 bits size of data packages. In simulation model this jamming attack will keep being as long as the simulation continue. Therefore network communication is affected adversely.
All these circumstances directly affect network throughput. In scenario 2, these conditions have been simulated and evaluated. Comparison results of two scenarios clearly show how jamming attacks cause less throughput and high collision occurrence.
Simulation results are evaluated according to determined network performance criteria. In this experiment four performance metrics are taken. These metrics are Network Throughput, Network Load, WLAN Delay and Data Dropped. The network throughput refers to the amount of bits forwarded successfully from one network layer to another in a given time. Network throughput is typically measured as bits per second (bps), megabits in per second (Mbps) and gigabits per second (Gbps). On the other hand, Network Load is described as measurement of total data traffic on a WLAN Base Station Subsystem (BSS). It shows BSS load statistics of a network separately. Other performance metric which is WLAN Delay, represents latency of packages while they are travelling from one device to another. Finally Data Dropped statistics show total amount of data packages that are discarded by higher network level due to high buffer size of packages.
Two scenarios have been subjected to simulation for one hour. In first scenario 50 mobile nodes had a proper communication between each other. There were not any malicious nodes or security attacks. These nodes have used MACAW protocol as collision avoidance protocol as well as they have used AODV protocol as mobile ad-hoc network routing protocol. Likewise scenario 1, scenario 2 had the same protocols, and equal number of mobile nodes. On the other hand unlike scenario 1, scenario 2 had also 3 mobile constant jammer nodes. Network model in scenario 2 was exposed to a powerful and constant jamming attack. These jammer nodes have sent large data packages to the network. In simulation results we have seen the performance of MACAW protocol under jamming attack condition. These 2 scenarios were simulated within a Discrete Event Simulation (DES) environment. Simulation outcomes and statistics were generated by OPNET Modeler 14.5 in graphical charts according to mentioned conditions.
As stated before, Network Throughput refers to number of bits that are forwarded successfully one layer to another in a given time. Measurement for this statistics is used to be bits per second (bps). In this topic, two scenarios’ throughput is compared to each other. It is expected that throughput of scenario 1 would be higher than scenario 2 because as mentioned in previous chapters, malicious nodes and security attacks directly affect overall network performance. OPNET Modeler 14.5 has provided throughput comparison of the two scenarios as a consequence of 1 hour simulation. In the following figure, WLAN Throughput statistics comparison of 2 scenarios is shown.
Wireless LAN Delay statistics represent package latency while they are transferring one layer to another. When network performance is low, package transmission slows down. In this case total network delay becomes high. In figure 4, comparison graphics of scenarios for Wireless LAN Delay statistics can be seen.
Blue line which represents Scenario 1 shows that WLAN Delay rate is close to zero seconds. In normal network state, packages are delivered one layer to another without more delay. However in second scenario it can be seen that package delay have rapidly increased. Jamming attack caused a significant latency of packages.
As discussed previously, data drop rate represents data packages that are discarded by higher level network layer. When buffer size of a data package is higher than determined acceptable value, network automatically drops the data package. As known, in Denial of Service attacks malicious nodes constantly send packages in large sizes to make network resources unavailable. As measure, network administrators adjust server nodes to drop these large size data packages. In simulation scenarios, “Large Packet Processing” option is set as “Drop” in order to protect the network against possible damages of large size packages. Below
Network Load represents measurement of total amount of data over entire network. In figure 6 Wireless LAN Network Load statistics comparison of two scenarios is shown.
As it is shown through direct relationship between the average WLAN Data Dropped Rate on
In the simulation case of study, the performance of MACAW protocol is evaluated. During this simulation, MACAW protocol has been exposed to a constant Jamming Attack. The main goal of this study is to observe possible impacts of a constant Jamming Attack on MACAW protocol. MACAW has shown a good performance unless it has been exposed to a Jamming Attack. It is seen in the simulation results that, a Jamming Attack in a mobile ad-hoc network leads to loss of performance of MACAW. Based on the simulation results, it can be claimed that Jamming Attacks cause approximately three times loss of network throughput where MACAW protocol is implemented. Delay rate in the network has significantly increased up to 800 seconds during Jamming Attack while it is close to zero second under normal network conditions. On the other hand, Data Dropped statistics show that 600,000 packages are discarded when MACAW is exposed to attack. In normal network conditions, this statistics is stable at the rate of 200,000 dropped data packages. In the jamming scenario, Network Load which is the final performance criteria shows that average load is at the rate of 4500,000 bits per second in the beginning of the simulation whereas it is stable at approximately 3500,000 bits per second at the end of the simulation. However, in the normal scenario Network Load statistics is stable at the rate of 1000,000 bits per second. Jamming Attack causes not only three times decrease in the network throughput but it also causes three times increase in the network load. This simulation experiment is the first study that deals with the performance evaluation of MACAW protocol under a constant Jamming Attack. Depending on results of our simulation experiment, it is strongly recommended other researchers to simulate performance of MACAW protocol under different security attacks such as Man in the Middle, Distributed Denial of Service and Spoof Attack. It is also recommended that precautions against attacks should be taken in MACAW protocol.
ŞadanCambazoglu,ArifSari, (2015) Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite. International Journal of Communications, Network and System Sciences,08,533-542. doi: 10.4236/ijcns.2015.813048