Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Similar documents
Security Measures for Black Hole Attack in MANET: An Approach

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Performance Analysis of Aodv Protocol under Black Hole Attack

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Routing Security in Wireless Ad Hoc Networks

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

AODV-PA: AODV with Path Accumulation

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

International Journal of Advance Engineering and Research Development

Defending MANET against Blackhole Attackusing Modified AODV

Avoiding Blackhole Attacks Using CBDA Approach in MANETS

A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

CAODV Free Blackhole Attack in Ad Hoc Networks

Wireless Network Security Spring 2013

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Maharishi Markandeshwar University

Webpage: Volume 4, Issue VI, June 2016 ISSN

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Routing Protocols in Mobile Ad-Hoc Network

Routing protocols in Mobile Ad Hoc Network

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Comparing the Impact of Black Hole and Gray Hole Attacks in Mobile Adhoc Networks

Decoy Black-Hole Attack

A Review on Black Hole Attack in MANET

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Dynamic Source Routing in ad hoc wireless networks

PERFORMANCE STUDY OF IMPROVED AODV AGIANST BLACK HOLE ATTACK IN WIRELESS ENVIRONMENT

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks

A Survey of Attacks in Mobile Ad Hoc Network

Wireless Network Security Spring 2015

Figure 1: Ad-Hoc routing protocols.

Implementation: Detection of Blackhole Mechanism on MANET

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Performance Analysis of Three Routing Protocols for Varying MANET Size

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

2013, IJARCSSE All Rights Reserved Page 85

A Secure Cooperative Bait Detection Approach for Detecting and Preventing Black Hole Attacks In MANETS Using CBDS Shireen Sultana 1, Swati Patil 2

Estimate the Routing Protocols for Internet of Things

Packet Estimation with CBDS Approach to secure MANET

Keywords Ad hoc Network, AODV, Black hole attack, MANET, Security, Malicious Node

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

IJMIE Volume 2, Issue 6 ISSN:

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Abstract 1.1. OVERVIEW

Analysis of Blackhole attacks on AODV Routing Protocol in MANET

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

LECTURE 9. Ad hoc Networks and Routing

[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Implementation of a Trust Model over OLSR in a Wireless ad hoc Testbed

Wireless Network Security Spring 2016

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

On Demand secure routing protocol resilient to Byzantine failures

Performance Evaluation of MANET through NS2 Simulation

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Improved Trust based Cooperative Bait detection system form MANET

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

Impact of Hello Interval on Performance of AODV Protocol

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Transcription:

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John ixon and Kendall Nygard epartment of Computer Science, IACC 8 North akota State University, Fargo, N 80 Tel: (0) -88, Fax: (0) -8 Email address: Huirong.fu@ndsu.nodak.edu Abstract Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In this paper, we address the problem of coordinated attack by multiple black holes acting in group. We present a technique to identify multiple black holes cooperating with each other and a solution to discover a safe route avoiding cooperative black hole attack. Keywords: ad hoc networks, black hole, security, routing, AOV. Introduction Ad hoc networks have a large number of potential applications. Military uses such as connecting soldiers or other military units to each other on the battlefield or creating sensory arrays with thousands of sensors are two typical examples. Ad hoc networks provide a possibility of creating a network in situations where creating the infrastructure would be impossible or prohibitively expensive. Unlike a network with fixed infrastructure, mobile nodes in ad hoc networks do not communicate via access points (fixed structures). Each mobile node acts as a host when requesting/providing information from/to other nodes in the network, and acts as router when discovering and maintaining routes for other nodes in the network. There are currently three main routing protocols for ad hoc networks [], estination- Sequenced istance Vector routing (SV) [], ynamic Source Routing (SR) [9], and AOV []. SV is a table driven routing protocol. In SV, each mobile node in the network maintains a routing table with entries for every possible destination node, and the number of hops to reach them. The routing table is periodically updated for every change in the network to maintain consistency. This involves frequent route update broadcasts. SV is inefficient because as the network grows the overhead grows as O(n ) []. SR is an on-demand routing protocol and it maintains a route cache, which leads to memory overhead. SR has a higher overhead as each packet carries the complete route, and does not support multicast. AOV is a source initiated on-demand routing protocol. Every mobile node maintains a routing table that maintains the next hop node information for a route to the destination node. When a source node wishes to route a packet to a destination node, it uses the specified route if a fresh enough route to the destination node is available in its routing table. If not, it starts a route discovery process by broadcasting the Route Request (RREQ) message to its neighbors, which is further

propagated until it reaches an intermediate node with a fresh enough route to the destination node specified in the RREQ, or the destination node itself. Each intermediate node receiving the RREQ, makes an entry in its routing table for the node that forwarded the RREQ message, and the source node. The destination node or the intermediate node with a fresh enough route to the destination node, unicasts the Route Response (RREP) message to the neighboring node from which it received the RREQ. An intermediate node makes an entry for the neighboring node from which it received the RREP, then forwards the RREP in the reverse direction. Upon receiving the RREP, the source node updates its routing table with an entry for the destination node, and the node from which it received the RREP. The source node starts routing the data packet to the destination node through the neighboring node that first responded with an RREP. Some researchers [-8, 0-] discuss the vulnerabilities in Ad hoc routing protocols and the attacks that can be mounted. The AOV protocol is vulnerable to the well-known black hole attack. A black hole is a node that always responds positively with a RREP message to every RREQ, even though it does not really have a valid route to the destination node. Since a black hole does not have to check its routing table, it is the first to respond to the RREQ in most cases. When the data packets routed by the source node reach the black hole node, it drops the packets rather than forwarding them to the destination node. eng, Li, and Agrawal [] assume the black hole nodes do not work as a group and propose a solution to identify a single black hole. However, the proposed method cannot be applied to identifying a cooperative black hole attack involving multiple nodes. In this paper, we develop a methodology to identify multiple blackhole nodes cooperating as a group. The technique works with slightly modified AOV protocol and makes use of the ata Routing Information (RI) table in addition to the cached and current routing tables. The rest of the paper is organized as follows. In Section, we introduce the cooperative black hole attack. Next, in Section, we present a new methodology to prevent a cooperative black hole attack. Finally, in Section, we conclude and discuss future work.. Cooperative Black Hole Attack Problem. Black Hole A black hole has two properties. First, the node exploits the ad hoc routing protocol, such as AOV, to advertise itself as having a valid route to a destination node, even though the route is spurious, with the intention of intercepting packets. Second, the node consumes the intercepted packets. We define the following conventions for protocol representation.

Node : Mobile Unit ashed Arrow: RREQ/RREP Propagation i j Solid Arrow (Single head) : Node i has a route to node j and has routed data packets through node j (j is a reliable node for node i) i j Solid Arrow (ouble head) : Nodes i and j have route to each other and have routed data packets (i and j are reliable to each other) i j Solid Line : There is a route between two nodes. Cooperative Black Hole Attack According to the original AOV protocol, when source node S wants to communicate with the destination node, the source node S broadcasts the route request (RREQ) packet. The neighboring active nodes update their routing table with an entry for the source node S, and check if it is the destination node or has a fresh enough route to the destination node. If not, the intermediate node updates the RREQ (increasing the hop count) and floods the network with the RREQ to the destination node until it reaches node or any other intermediate node which has a fresh enough route to, as depicted by example in Figure. The destination node or the intermediate node with a fresh enough route to, initiates a route response (RREP) in the reverse direction, as depicted in Figure. Node S starts sending data packets to the neighboring node which responded first, and discards the other responses. This works fine when the network has no malicious nodes. B S B B S B Figure : Network flooding of RREQ Figure : Propagation of RREP messages Researchers have proposed solutions to identify and eliminate a single black hole node []. However, the case of multiple black hole nodes acting in coordination has not been addressed. For example, when multiple black hole nodes are acting in coordination with each other, the first black hole node B refers to one of its teammates B as the next hop, as depicted in Figure. According to [], the source node S sends a Further Request (FRq) to B through a different route (S---B) other than via B. Node S asks B if it has a route to node B and a route to destination node. Because B is cooperating with B, its Further Reply (FRp) will be yes to both the questions. Now per the solution proposed in [], node S starts passing the data packets assuming that the route S-B-B is secure. However, in reality, the packets are consumed by node B and the security of the network is compromised.

. Solution In this section, we propose a methodology for identifying multiple black hole nodes cooperating as a group with slightly modified AOV protocol by introducing ata Routing Information (RI) Table and Cross Checking.. ata Routing Information Table B S B B S B 0 00 Figure : Solution to avoid cooperative black hole attack Figure : Solution to identify multiple black hole nodes in one-time check The solution to identify multiple black hole nodes acting in cooperation involves two bits of additional information from the nodes responding to the RREQ of source node S. Each node maintains an additional ata Routing Information (RI) table. In the RI table, stands for true and 0 for false. The first bit From stands for information on routing data packet from the node (in the Node field) while the second bit Through stands for information on routing data packet through the node (in the Node field). In reference to the example of Figure, a sample of the database maintained by node is shown in Table. The entry 0 for node implies that node has routed data packets from, but has not routed any data packets through (before node moved away from ). The entry for node implies that, node has successfully routed data packets from and through node. The entry 0 0 for node B implies that, node has NOT routed any data packets from or through B. Node # ata Routing Information From Through 0 B 0 0 Table. Additional table of data routed from, and routed to nodes maintained by node.. Cross Checking

In our techniques we rely on reliable nodes (nodes through which the source node has routed data) to transfer data packets. The modified AOV protocol, and the algorithm for our proposed methodology are illustrated in Figure. In the protocol, the source node (SN) broadcasts a RREQ message to discover a secure route to the destination node. The Intermediate Node (IN) generating the RREP has to provide its Next Hop Node (NHN), and its RI entry for the NHN. Upon receiving RREP message from IN, the source node will check its own RI table to see whether IN is a reliable node. If source node has used IN before to route data, then IN is a reliable node and source node starts routing data through IN. Otherwise, IN is unreliable and the source node sends FRq message to NHN to check the identity of the IN, and asks NHN: ) if IN has routed data packets through NHN, ) who is the current NHN s next hop to destination, and ) has the current NHN routed data through its own next hop. The NHN in turn responds with FRp message including ) RI entry for IN, ) the next hop node of current NHN, and ) the RI entry for the current NHN s next hop. Based on the FRp message from NHN, source node checks whether NHN is a reliable node or not. If source node has routed data through NHN before, NHN is reliable; otherwise, unreliable. If NHN is reliable, source node will check whether IN is a black hole or not. If the second bit (ie. IN has routed data through NHN) of the RI entry from the IN is equal to, and the first bit (ie. NHN has routed data from IN) of the RI entry from the NHN is equal to 0, IN is a black hole. If IN is not a black-hole and NHN is a reliable node, the route is secure, and source node will update its RI entry for IN with 0, and starts routing data via IN. If IN is a black-hole, the source node identifies all the nodes along the reverse path from IN to the node that generated the RREP as black hole nodes. Source node ignores any other RREP from the black holes and broadcasts the list of cooperative black holes. If NHN is an unreliable node, source node treats current NHN as IN and sends FRq to the updated IN s next hop node and goes on in a loop from steps through in the algorithm. Source Node (SN) Intermediate Node (IN) Next Hop Node (NHN) estination Node (N) Algorithm to prevent cooperative black hole attack in MANETs RREQ Notations : RREP (Next Hop + RI of NHN) If IN is unreliable, FRq (I of IN ) SN: Source Node IN: Intermediate Node N: estination Node NHN: Next Hop Node FRq: Further Request FRp: Further Reply Reliable Node: The node through which the SN has routed data RI: ata Routing Information I: Identity of the node FRp (Next Hop of current + RI of its NHN + RI of IN) If IN is not a Black Hole AN NHN is unreliable, Current NHN = IN Repeat the steps through in the algorithm Else Continue ata Packets ata Packets ata Packets SN broadcasts RREQ SN receives RREP IF (RREP is from N or a reliable node) { Route data packets (Secure Route) } ELSE { o { 8 Send FRq and I of IN to NHN 9 Receive FRp, NHN of current NHN, RI entry for 0 NHN's next hop, RI entry for current IN IF (NHN is a reliable node) { Check IN for black hole using RI entry IF (IN is not a black hole) Route data packets (Secure Route) ELSE { Insecure Route IN is a black hole 8 All the nodes along the reverse path from IN to the node 9 that generated RREP are black holes 0 } } ELSE Current IN = NHN } While (IN is NOT a reliable node) } Figure : Modified AOV protocol and algorithm to prevent cooperative black hole attack

As an example, let s consider the network in Figure. When node B responds to source node S with RREP message, it provides its next hop node B and RI for the next hop (i.e. if B has routed data packets through B). Here the black hole node lies about using the path by replying with the RI value equal to 0. Upon receiving RREP message from B, the source node S will check its own RI table to see whether B is a reliable node. Since S has never sent any data through B before, B is not a reliable node to S. Then S sends FRq to B via alternative path S---B and asks if B has routed any data from B, who is B s next hop, and if B has routed data packets through B s next hop. Since B is collaborating with B, it replies positively to all the three requests and gives node (randomly) as its next hop. When the source node contacts node via alternative path S--- to cross check the claims of node B, node responds negatively. Since node has neither a route to node B nor has received data packets from node B, the RI value corresponding to B is equal to 0 0 as shown in Figure. Based on this information, node S can infer that B is a black hole node. If node B was supposed to have routed data packets through node B, it should have validated the node before sending it. Now, since node B is invalidated through node, node B must cooperate with node B. Hence both nodes B and B are marked as black hole nodes and this information is propagated through the network leading to their listing as black holes, and revocation of their certificates. Further, S discards any further responses from B or B and looks for a valid alternative route to. The process of cross checking the intermediate nodes is a one time procedure which we believe is affordable to secure a network from multiple black hole nodes. The cost of cross checking the nodes can be minimized by letting nodes sharing their trusted nodes list (PI table) with each other.. Conclusion and Future Work In this paper we have studied the routing security issues of MANETs, described the cooperative black hole attack that can be mounted against a MANET and proposed a feasible solution for it in the AOV protocol. The proposed solution can be applied to.) Identify multiple black hole nodes cooperating with each other in a MANET; and.) iscover secure paths from source to destination by avoiding multiple black hole nodes acting in cooperation. As future work, we intend to develop simulations to analyze the performance of the proposed solution. We also plan to study the impact of GRAY hole nodes (nodes which switch from good nodes to black hole nodes) and techniques for their identification. References [] Elizabeth M. Royer, and Chai-Keong Toh, A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications, pp. -, April 999.

[] Charles E. Perkins, and Elizabeth M. Royer, Ad-hoc On-emand istance Vector (AOV) Routing, Internet raft, November 00. [] Hongmei eng, Wei Li, and harma P. Agrawal, Routing Security in Wireless Ad Hoc Network, IEEE Communications Magzine, vol. 0, no. 0, October 00. [] S. Marti et al., Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, th Int l. Conference Mobile Comp. Net., pp. -, August 000. [] Vesa Kärpijoki, Security in Ad hoc Networks, http://www.tcm.hut.fi/opinnot/tik- 0.0/000/papers/karpijoki.pdf. [] Srdjan Capkuny, Levente Butty an, and Jean-Pierre Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, Technical Report at EPFL, http://ic.epfl.ch/publications/documents/ic_tech_report_00.pdf. [] Lidong Zhou, and Zygmunt J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, vol., no., November/ecember 999. [8] Janne Lundberg, Routing Security in Ad Hoc Networks, http://citeseer.nj.nec.com/cache/papers/cs/90/http:zszzszwww.tml.hut.fizsz~jluzsznetseczsz netsec-lundberg.pdf/routing-security-in-ad.pdf [9] avid B. Johnson, and avid A. Maltz, ynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter, pages -8, Kluwer Academic Publishers, 99. [0] Y. Zhang, W. Lee, Intrusion etection in Wireless Ad Hoc Networks, th Int l. Conference Mobile Comp. Net., Mobicom 000, pp. -8, August 000. [] Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu and Lixia Zhang, Self-securing Ad Hoc Wireless Networks, http://www.cs.ucla.edu/~jkong/publications/iscc0.pdf. [] C. E. Perkins and P. Bhagwat, Highly ynamic estination-sequenced istance-vector Routing (SV) for Mobile Computers, Computer Communications Review, pp. -, October 99.