Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Similar documents
[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

IJMIE Volume 2, Issue 6 ISSN:

Defending MANET against Blackhole Attackusing Modified AODV

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Routing Protocols in MANETs

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Evaluation of MANET through NS2 Simulation

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

2013, IJARCSSE All Rights Reserved Page 85

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Implementation: Detection of Blackhole Mechanism on MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2

Routing Protocols in MANET: Comparative Study

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

A Survey - Energy Efficient Routing Protocols in MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Routing Protocols in Mobile Ad-Hoc Network

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Performance measurement of MANET routing protocols under Blackhole security attack

Performance Analysis of Three Routing Protocols for Varying MANET Size

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Packet Estimation with CBDS Approach to secure MANET

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Review paper on Routing Protocol Comparison

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, Jul-Aug 2014

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

International Journal of Advance Engineering and Research Development

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Introduction to Mobile Ad hoc Networks (MANETs)

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Figure 1: Ad-Hoc routing protocols.

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Performance Evaluation of Routing Protocols for MAC Layer Models

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Performance Evaluation of AODV and DSR routing protocols in MANET

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

A Novel Review on Routing Protocols in MANETs

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

ECS-087: Mobile Computing

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

Keywords: Black hole attack, Mobile Ad-hoc Network, AODV, ZRP, Routing Protocols, Proactive, Reactive. I. INTRODUCTION

Webpage: Volume 4, Issue VI, June 2016 ISSN

Wireless Network Security Spring 2015

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Chapter 7 CONCLUSION

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

Estimate the Routing Protocols for Internet of Things

II. ROUTING CATEGORIES

Analysis of Routing Protocols in MANETs

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Performance Analysis and Enhancement of Routing Protocol in Manet

A Literature survey on Improving AODV protocol through cross layer design in MANET

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

A Review on Black Hole Attack in MANET

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Effects of Caching on the Performance of DSR Protocol

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Power aware Multi-path Routing Protocol for MANETS

Gurleen Kaur Walia 1, Charanjit Singh 2

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Security in Mobile Ad-hoc Networks. Wormhole Attacks

International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March ISSN

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Wireless Network Security Spring 2013

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Evaluation of Various Routing Protocols in MANET

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

An Efficient Approach against Rushing Attack in MANET

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Comprehensive Study and Review Various Routing Protocols in MANET

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Transcription:

Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication Truba College of Engineering, Indore India Abstract: MANET is an infrastructure less, dynamic, decentralised network. Any node can join the network and leave the network at any point of time. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. is a important ondemand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a Black Hole attacks in existing protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of the severe attacks of MANET. This paper discusses some of the techniques put forwarded by researchers to detect and prevent Black hole attack in MANET using protocol. Keywords: MANET,, adhoc, Black hole attack, Malicious Node. 1. INTRODUCTION Mobile Ad-hoc Network (MANET) is formed by some wireless nodes communicating each other without having any central coordinator to control their function. Such a network is helpful in creating communication between nodes that may not be in line-of-sight and outside wireless transmission range of each other. Similar wireless networks have important applications in a wide range of areas covering from health, environmental control to military systems. In MANET, as the nodes are utilizing open air medium to communicate, they face acute security problems compared to the wired medium. A black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. A malicious node absorbs all data packets in itself, similar to a hole which sucks in everything in. In this way, all packets in the network are dropped [1].. Figure 1.1: A simple ad-hoc network with three participating nodes. 2. ROUTING PROTOCOL Routing is the process of discovering a suitable route for sending packets from a source to a destination. Routing is to produce reliable and efficient routes between pair of nodes for data transmission. To transmit a packet from source to destination it may be necessary to hop several hops (multi-hop) before a packet reaches the destination. To facilitate the communication within network, routing protocol is needed. The routing protocol has two main functions, selection of routes for various source-destination pairs and the maintenance of routes for delivery of messages to their correct destination. The route to be followed by the packets is determined by the network layer. The algorithms used to calculate these routes are known as routing algorithms. Routing protocols can be classified as: Proactive Protocols Reactive Protocols Hybrid Protocols 2.1.Proactive Protocols: Proactive routing protocols also known as table driven routing protocols monitor the topology of the network at all times and continuously evaluate the routes within the network for all destinations. Routes are maintained for all nodes by periodically exchanging routing tables throughout the network, similar to wired networks. An advantage of this routing protocol is that when a packet needs to be 1317

forwarded, the route is already known and can be immediately used. Obtaining the required route information and establishing a session is not time-consuming. A disadvantage of this routing protocol is that it reacts to topology changes even when no traffic is affected by that change, resulting in the unnecessary usage of bandwidth even when no data is transferred. Also proactive schemes needs time to converge to a steady state which is a problem if the topology is changing frequently. Typical routing protocols in this category are optimized link state routing (OLSR) and destination-sequenced distance-vector (DSDV). fresh enough route to the destination node specified in the RREQ, or the destination node itself. is a reactive routing protocol designed for ad hoc wireless networks. In routes to connect two nodes are obtained only when it is required i.e. on demand. routing algorithm is specially suited for dynamic self-configured networks like MANET. provides loop free routes along with route management for broken links. Bandwidth requirement of mobile nodes in is comparatively less than other protocols as does not require periodic route advertisements [1]. 2.2.Reactive Protocols Reactive routing protocols also known as on demand routing protocols invoke a route determination procedure on demand only. Reactive protocols find a route only at the beginning of a connection when there is a demand for data transmission. This is done by initiating a route discovery within the network by flooding the entire network with route request (RREQ) packets. Once a route is established, it is maintained in the routing table until the destination is out of reach or the route expires. As the routing information is not updated periodically, the routing overhead is significantly reduced during topology changes. One disadvantage of these protocols is the latency occurred during route discovery. However, for highly mobile networks, these protocols show better performance for MANETs. Typical routing protocols in this category are ad hoc on-demand distance vector () and dynamic source routing (DSR). 2.3.Hybrid Protocols Hybrid routing protocols combines the merits of both proactive and reactive routing protocols. On-demand routing has relatively less routing overhead, but it suffers from routing delay. Table-driven routing ensures high quality in static topologies but cannot be extended to mobile networks. Combining the advantages of both, a few hybrid routing protocols have been designed, in which the routing is first initiated with some proactive routes and then serves the demand from other nodes through reactive flooding. The hybrid protocols exploit hierarchical network architectures. Typical routing protocols in this category are as follows: zone routing protocol (ZRP) and temporally ordered routing algorithm (TORA). 3. is a source initiated on-demand routing protocol. It is an on-demand and distance-vector routing protocol, meaning that a route is established by from a destination only on demand [7]. Every mobile node maintains a routing table that maintains the next hop node information for a route to the destination node. When a source node wishes to route a packet to a destination node, it uses the specified route if a fresh enough route to the destination node is available in its routing table. If not, it starts a route discovery process by broadcasting the Route Request (RREQ) message to its neighbors, which is further propagated until it reaches an intermediate node with a uses symmetric links between communicating nodes. which are communicating or intermediate nodes on active route only maintain routing information. which do lie on active path need not maintain routing information and does not exchange routing table periodically. Furthermore, routes are discovered and maintained between two nodes only when they need to communicate or if they are acting as the intermediate node supporting in communication. For route discovery uses broadcast mechanism. Instead of using source routing, routing strategy used in is to establish route entries dynamically at intermediate nodes. This kind of routing serves networks with large number of nodes by saving overhead required by source routes in each data packet. 4.Security Issues In Manet: Due to self-organize, rapidly deploy capability and many other features discussed earlier, MANET is preferable for different applications like battlefield communications, emergency disaster relief, public conferences and other security-sensitive computing environments. Security is a major concern in network design especially in hostile environments where ad hoc networks are readily used. This characteristic makes MANET more susceptible to security attacks from inside the network. 5. Black Hole Attack: A black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. A malicious node absorbs all data packets in itself, similar to a hole which sucks in everything in. In this way, all packets in the network are dropped. A malicious node dropping all the traffic in the network makes use of the vulnerabilities of the route discovery packets of the on demand protocols, such as. In route discovery process of protocol, intermediate nodes are responsible to find a fresh path to the destination, sending discovery packets to the neighbor nodes. Malicious nodes do not use this process and instead, they immediately respond to the source node with false information as though it has fresh enough path to the destination [1]. 1318

Figure 1.2: Black Hole Attack in MANET Intrusion Detection Technique- IDS can be classified as Network-based and Host-based. Network-based IDS can be installed on data concentration points of a network such as switches and routers. Where as Host-based IDS are installed on hosts that can supervise the activities of other hosts. The proposed technique (IDS-) uses Hostbased IDS scheme as a Network-based IDS scheme require central device to monitor traffic flow in MANETs. IDS- assumes every activities of a user or a system can be monitored and anomaly activities of an intruder can be identified from normal activities. Intrusion detection can also be classified into three broad categories: Anomaly detection Misuse (signature) detection, Specification-based detection. Proposed Strategy for Blackhole Detection and Prevention In the proposed work, every node executes an IDS mechanism, i.e. each node in the network has an IDS agent in-built in the form of module with routing protocol. IDS module estimates the suspicious value called count of a node according to the numbers of RREQ and RREP packets transmitted or forwarded from the node. When a suspicious value for a neighboring node exceeds a threshold, then that node is isolated from the network as other nodes do not forward packets through the suspected malicious node. The Proposed Algorithm In this section the proposed mechanism for defending against black hole attack is presented. The mechanism modifies the protocol by introducing three concepts, focuses on a few performance metrics discussed in next section. 6.1 Performance Metrics The following metrics are used in this work for comparing the performance of, under attacks and Modified routing protocols. 6.1.1.Packet Delivery Ratio (PDR) It is the ratio of the number of data packets received by the destination node to the number of data packets sent by the source node. It can be calculated in terms of percentage (%) [25]. Packet delivery ratio shows total number of data packets that reach destination successfully. The reason for packet drops may arise due to congestion, faulty hardware and queue overflow etc. Packet drop affects the network performance by consuming time and more bandwidth to resend a packet. Higher packet delivery ratio shows higher protocol performance. 6.1.2.End to end Delay It can be defined as the time a packet takes to travel from source to destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC, and propagation and transfer times. 6.1.3.Throughput Throughput is the amount of data transferred successfully on a communication network or network link over the period of time. Throughput is calculated in bytes/sec or bits/second (bps). These metrics are not completely independent. For example, lower packet delivery fraction means that the delay metric is evaluated with fewer samples. Path lengths play a vital role, the longer the path lengths, the higher the probability of a packet drop. Thus, with a lower delivery fraction, samples are usually biased in favour of smaller path lengths and therefore have less delay. 6.2.PERFORMANCE COMPARISON FOR SEVERAL NODES 6.2.1 Packet Delivery Ratio Comparison This subsection shows the packet delivery ratio of the three routing protocols, calculated for different number of nodes. The variation of packet delivery ratio with the number of nodes is shown in figure1.3. Packet Delivery Ratio (PDR) i. Broadcast RREP packet, ii. Data Routing Information, count iii. Reliability checking of a route 6.SIMULATION RESULTS AND DISCUSSION The simulation results of, wormhole and M routing protocols and their comparisons are shown in the following section 9.2 in the form of graphs. Also the simulation results of, blackhole and IDS routing protocols and their comparisons are shown in the section 7.3 in the form of graphs. The simulation analysis of three routing protocols primarily IDS 5 99.4% 1.13% 49.2% 10 98.54% 1.46% 62.9% 15 98.66% 0.89% 45.1% 20 87.85% 1.21% 38.87% 25 86.97% 0.85% 49.01% 1319

PDR Average end-to-end delay (in msec) 120.00% 100.00% 80.00% 60.00% 40.00% 20.00% 0.00% No. of Figure 1.3 PDR Comparisons for, Blackhole and IDS routing protocol shows higher PDR than the under blackhole attack and IDS- for any number of nodes. However, under blackhole attack IDS- shows performance improvement with increase in PDR whereas delivers only about 1% of the packets. 300 250 200 150 100 50 0 No. of Figure 1.4 : Average End-to-End Delay Comparisons for, Blackhole and IDS The average end-to-end delay of is higher as compared to blackhole and IDS- except for 15-nodes scenario. IDS- has superior performance than under blackhole attack as the average end-to-end delay for IDS- is less than delay for under attack for all cases except for 15- nodes scenario. 6.2.2 Average End-to-End Delay Comparison End-to-end delay for all the received packets is calculated and averaged. In this subsection, average end-to-end delay for the three routing protocols is calculated for different number of nodes. The variation of delay with the number of nodes is shown in figure 1.4. Delay IDS 6.2.3 Throughput Comparison The throughput is calculated at destination node during entire simulation period. In this subsection, throughput for the three routing protocols is calculated for different number of nodes. The variation of throughput with the number of nodes is shown in figure 1.4. Throughput IDS 5 62.67 ms 15.39 ms 6.88 ms 10 15.77 ms 14.25 ms 6.73 ms 15 12.55 ms 33.25 ms 23.33 ms 20 67.8 ms 53.51 ms 17.86 ms 25 252.78 ms 33.95 ms 26.27 ms 5 88.27 80.16 91.06 10 146.71 83.14 97.51 15 131.28 100.55 106.03 20 182.74 132.61 146.09 25 252.98 219.46 243.52 1320

Throughput in kbps 300 250 200 150 100 50 7.CONCLUSIONS This research work carried out the detailed study and analysis of routing protocols and security issues and attacks in MANET theoretically and through simulation.. To evaluate the performance of proposed techniques, simulation of blackhole attack along with the simulation of proposed techniques had been done. 8.REFERENCES [1]C. K. Toh, Ad Hoc Wireless Networks, 0 No. of Figure 1.4 : Throughput comparisons for, Blackhole and IDS From the comparison results it is clear that IDS- has better performance than, as throughput is always higher in all the topologies considered. From all the results it is clear that IDS- has superior performance over under attacks. Also the performance of IDS- improved with the increase in number of nodes and simulation time. [2]Panagiotis Papadimitratos and Zugmunt J. Haas, Secure routing for Mobile Ad Hoc Networks", In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS- 2002), 2002. [3]Y. C. Hu, A. Perrig and D. B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in Proceedings of the ACM Workshop on Wireless Security, pp 30 40, 2003. [4]L. Himral, V. Vig and N. Chand, Preventing Routing Protocol from Black Hole Attack, International Journal of Engineering Science and Technology (IJEST) Vol. 3, No. 5, 2011 1321