Table 2: Simulation results in the Creation/Listening Scenario.
Parameter AODV DSR DSDV FSR ZRP
Avg. connectivity (%) 79.97/83.27 91.40/89.83 83.84/90.90 94.17/88.01 81.37/94.18
Avg. goodput (kbps) 250.64/315.42 240.26/275.73 206.99/359.25 220.21/361.98 263.05/299.72
Pkt delivery ratio (%) 95.14/94.02 94.13/87.63 96.07/96.63 96.32/96.67 95.22/95.27
Avg delay (ms) 231.2/190.3 350/271 162.7/162.1 169.7/166.8 165.2/161.7
Interc. packets (%) 2.95/12.83 1.12/11.24 7.05/17.01 5.72/13.23 4.57/13.64
Fake packets (%) 37.54/0.94 15.09/0.82 43.25/0.67 22.69/0.43 14.85/1.29
sults. Next we comment the results separately for
each metric.
The goodput (expressed in kbps) is the amount of
useful data received in the time unit, excluding rout-
ing information and duplicates. As we can expect,
the goodput is worse in the Creation Scenario than
in the Listening Scenario (even with a 42% reduction
in goodput for DSDV), while DSR e ZRP have simi-
lar performance under the two attack scenarios, with
a goodput reduced by about 12.5%. Reactive proto-
cols have better goodput values than proactive proto-
cols in the Creation Scenario: the routing informa-
tion in reactive protocols becomes quickly obsolete,
and nodes get new information as soon as they is-
sue new requests, while in proactive protocols nodes
trust their routing tables until the next information ex-
change. The performance of the ZRP protocol is not
bad, probably thanks to its hybrid nature.
The delay (expressed in milliseconds) is the time
between the sending of a message and its complete
reception by its recipient. We see that the average de-
lay is generally larger in the Creation Scenario than in
the Listening case. However, the growth is apprecia-
ble in AODV and DSR (nearly 30%), but negligible
for the other three protocols. It addition, we note that
proactive protocols have an average delay lower than
reactive protocols (penalized by the Route Discovery
mechanism), with performances of DSDV a little bet-
ter than FSR and ZRP.
The percentage of intercepted packets is the ra-
tio of all intercepted packets received by malicious
nodes, and the number of packets not tagged as fake.
This metric represents the probability that the attacker
gets routing information. It is strongly influenced by
the routing protocol, in particular by the mechanism
used by a node to share its own routing tables. Proac-
tive protocols send their routing tables at regular in-
tervals, and continuosly provide the attacker with up-
to-date infos on the network status. That’s the rea-
son for the bad performance of DSDV. FSR and ZRP
seem have a similar behavior in the number of packets
sent to the attacker,with FSR slightly better than ZRP,
probably because the amount of shared data in FSR is
inversely proportional to the distance of the recipient.
The percentage of fake packets is the ratio of all
fake packets received by friendly nodes, and the num-
ber of packets received by friendly nodes (excluding
packets received by malicious nodes). This metric
represent the probability that a friendly node receives
spoofed or corrupted packets. ZRP seems to have the
best perfomances: a malicious node, that does not
want to be detected and decides to show a routing be-
havior like a friendly node, will be limited in sending
fake packets by the hop radius of ZRP.
8 CONCLUSIONS
We have developed a simulator for MANETs, based
on NS2, and have evaluated its performances in a hos-
tile enviroment through two scenarios that included
attackers with different capabilities.
The results show that DSR performs badly in sce-
narios with large traffic, with DSDV being the second
worst. DSDV exhibits a large percentage of fake and
intercepted) packets, while FSR and ZRP have the
best security performance. For the reference scenar-
ios considered here, the hybrid protocol ZRP seems to
be a good choice, though different values of the radius
can led to very different results.
REFERENCES
Abdelhafez, M., Riley, G., Cole, R. G., and Phamdo, N.
(2007). Modeling and Simulations of TCP MANET
Worms. In Proceedings of the 21st International
Workshop on Principles of Advanced and Distributed
Simulation, PADS ’07, pages 123–130.
Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y.-C., and
Jetcheva, J. G. (1998). A performance comparison of
multi-hop wireless ad hoc network routing protocols.
In MOBICOM, pages 85–97.
Camp, T., Boleng, J., and Davies, V. (2002). A survey of
mobility models for ad hoc network research. Wireless
Communications and Mobile Computing, 2(5):483–
502.
Cole, R., Phamdo, N., Rajab, M., and Terzis, A. (2005).
Requirements on worm mitigation technologies in
SIMULTECH 2011 - 1st International Conference on Simulation and Modeling Methodologies, Technologies and
Applications
416