Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

Similar documents
Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Detection of Vampire Attack in Wireless Adhoc

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Performance measurement of MANET routing protocols under Blackhole security attack

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Improving ZRP Protocol against Blackhole Attack

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

A Review on Black Hole Attack in MANET

ABSTRACT I. INTRODUCTION

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Performance Analysis of Aodv Protocol under Black Hole Attack

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

CAODV Free Blackhole Attack in Ad Hoc Networks

Survey on Delay Based Jellyfish Attack

Defending MANET against Blackhole Attackusing Modified AODV

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering

Keywords: Black hole attack, Mobile Ad-hoc Network, AODV, ZRP, Routing Protocols, Proactive, Reactive. I. INTRODUCTION

Blackhole detection and prevention in manet

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Security in DOA routing protocol for Mobile Adhoc Networks

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Packet Estimation with CBDS Approach to secure MANET

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, Jul-Aug 2014

A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets

Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.

Survey on Blackhole attack on AODV based MANET

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Comparison of Routing Protocols for Remote Login in MANETs

Power aware Multi-path Routing Protocol for MANETS

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Security Improvement of Mobile Ad Hoc Networks using Clustering Approach

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

International Journal of Advance Engineering and Research Development

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

Secure Routing with Detection Black Hole in MANET: A Study

Webpage: Volume 4, Issue VI, June 2016 ISSN

Performance Evaluation of Various Routing Protocols in MANET

A Novel approach to prevent collaborative attacks in MANETS using Cooperative Bait detection Scheme (CBDS)

Implementation: Detection of Blackhole Mechanism on MANET

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

IJMIE Volume 2, Issue 6 ISSN:

Intrusion Detection System for Rushing Attack in MANETs

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Mitigation of Jellyfish Attack in AODV

Mitigating Scheme for Black Hole Attack in AODV Routing Protocol

A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2

A Novel Technique to Control Congestion in MANET using Knowledge Base Learning

EFFECT OF BLACKHOLE INTRUSION IN WIRELESS NETWORKS Mr. Vishal S. Badgujar 1, Prof. Sudhir N. Dhage 2

Mobile Ad-hoc Networks (MANET)

Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model

International Journal of Advance Engineering and Research Development

PERFORMANCE STUDY OF IMPROVED AODV AGIANST BLACK HOLE ATTACK IN WIRELESS ENVIRONMENT

A Survey - Energy Efficient Routing Protocols in MANET

Australian Journal of Basic and Applied Sciences. Detecting Collaborative Blackhole Attack in MANET Using Sequence Number Mitigation Mechanism

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

A Review Paper on Secure Routing Technique for MANETs

A survey on quality of services of DSDV, AODV and DSR routing protocols in Ad hoc Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

ISOLATION OF BLACKHOLE ATTACK IN MANET USING MAODV PROTOCOL WITH CA ALGORITHM J. Gautam, S. Sindhuja and D. Nagavalli

MANET ROUTING ATTACKS

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network

Security Issues In Mobile Ad hoc Network Routing Protocols

Removal of Selective Black Hole Attack in MANET by AODV Protocol

A SURVEY OF BAIT DETECTION SCHEMES IN MANET

Performance Analysis and Enhancement of Routing Protocol in Manet

A Survey on the Secure Routing Protocols in MANETs

International Journal of Advance Research in Computer Science and Management Studies

Review of Prevention and Detection Methods of Black Hole Attack in AODV- based on Mobile Ad Hoc Network

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

A survey on AODV routing protocol for AD-HOC Network

Transcription:

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation Mr. Nitin Kumar Asst. Professor, Dept. of ECE, JIET School of Engg. And Technology for Girls Jodhpur, Rajasthan, INDIA nitinkumarece@gmail.com, 99589895 Abstract Wireless sensor networks deployed in harsh and unsupervised environments are prone to large number of attacks ranging from physical tampering, performance degradation, passive eavesdropping to complete network failure. These attacks can be individual or cooperative in nature. Also the target of attack can be a discreet node or distributed set of nodes. Denial of service attack (Dos) is the most common attack in a WSN having several variants like hello flood, Sybil and black hole. Black hole is an active attack which severely deteriorates a WSN from inside with the intent of exhausting the available power by forcing multiple retransmissions. In this paper, I am discussing some black hole attack prevention techniques and also using a modified version of Adhoc On Demand Distance Vector (AODV) protocol to analyze the effect of black hole attack and later the effect of prevention algorithm. Keywords WSN, Modified AODV, black hole attack, Dos, NS-2, end to end delay, RREQ INTRODUCTION A wireless sensor network is a collection of large number of wireless mobile nodes. Each of these nodes has a monitoring or sensing unit, a transducer, a microcomputer with limited memory, a transceiver and a power source [5]. They have the ability to communicate with each other without using conventional network infrastructure and generally lack a central administration. The lack of central control and limited computing power with limited battery resource results in vulnerability of high order. Various kinds of attacks can occur on a WSN based on intent of the attacker and the point of attack [8] [9] [13] [14]. CHARACTERISTICS AND METHODOLGY OF A Black Hole attack [8] [10] is a kind of denial of service attack where a malicious node gives false information of having shortest route to the destination in order to attract all the data packets and drop them instead of forwarding [11] [13] [14]. In black hole attack a hostile node uses its modified routing protocol in order to advertise itself for having the shortest path to the destination node [2] [7] [9] [12]. This malicious node advertises its availability of fresh routes irrespective of checking its routing table [1]. Thus the RREP from the malicious node will always reach the sender first as compared to other normal nodes which check there routing table entries for availability of fresh routes before replying to the sender of the RREQ packet.this results in setup of a forged route between the sender and the attacker nodes [1] [2] [3] [6]. After acquiring the data packets it s up to the attacker node whether to drop all the packets or forward it to other unknown address, packet dropping being more prominent choice [3] [4] [15]. PROPOSED SIMULATION MODEL The following simulation model was used for simulating black hole attack on a WSN and then applying a modified AODV variant to minimize the effect of attack in terms of various network parameters - Simulator NS2 (version 2.35) Simulation Time 0 (s) 479 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 Number of Nodes Simulation Range 0 0 m Routing Protocol AODV Attack Type Black-hole Traffic CBR 6 Traffic patterns for to nodes Pause Time 10 (m/s) Max Speed (m/s) Attack was progressed by random selection of black hole node which updates the routing table by fake hop count wand with higher number representing fresher route to the destination. Attack detection was performed by comparison of sequence number of RREP packet received in reply of RREQ from the source. Six different traffic scenarios and six different network topologies were made for simulation purpose. simulations for normal WSN working, for black hole attack and its prevention were carried out yielding results which were further carefully analyzed to produce comparative results in terms of network parameters. Fig. 1 Topology Scenario for nodes Fig 2 Simulation in progress 480 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 RESULTS AND ANALYSIS The performance of the WSN under Black hole attack and under the effect of modified AODV for attack prevention was analyzed on the basis of five parameters: End to end delay, throughput, packet delivery ratio, system overhead and packet drop ratio. Average End-to-End Delay The performance of WSN under normal working with unmodified AODV shows the smallest delays in the network. Under black hole attack the average End-to-End delay rises due to network congestion and route disruption. By using the new modified AODV protocol the performance of the network can be increased by reducing the delay in real time. Although the effect is less visible as the number of nodes increases. 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 Fig. 3 Average end to end delay analysis 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 Fig. 4 Average end to end delay analysis 481 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 Throughput The throughput of a normal WSN with unmodified AODV is maximum as shown in the figure below. With introduction of black hole attack the throughput is reduced as compared to previous condition. To improve the network efficiency the modified AODV protocol is used which results in increase in throughput on every node as is clear from the figure below. 1 135 1 125 1 115 110 105 Fig. 5 Throughput analysis 1 135 1 125 1 115 110 105 Fig. 6 Throughput analysis Packet delivery ratio Maximum number of packets is delivered in case of normal working of WSN with unmodified AODV. As black hole attack is introduced, the packet delivery ratio decreases due to more package loss. The modified AODV increase the net packet delivery efficiency. 482 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 95 90 85 80 75 Fig. 7 packet delivery ratio analysis 95 90 85 80 75 Fig. 8 packet delivery ratio analysis Packet drop ratio The unmodified AODV results in lowest number of drops in the system as shown in the simulation result below. Introduction of black hole attack in the system results in more packet drop by rerouting the traffic through the malicious nodes. The modified AODV protocol compares the routing tables on sender and malicious and isolates the route to the malicious nodes resulting in fewer packet drops. 483 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 25 15 10 BLACKHOLE ATACK 5 Fig. 9 Packet drop analysis 25 15 10 BLACKHOLE ATACK 5 Fig. 10 Packet drop analysis CONCLUSION AND FUTURE SCOPE Black hole attack results in system degradation by resulting in higher delay times, higher packet drop ratio, low throughput and low packet delivery ratio. The prevention method analyzed in this paper shows promise in terms of increase in performance and minimizing the adverse affects of black hole attack. The technique used by is based on comparison on RREP sequence number of packet received by the sender from its neighbors broadcasting the availability of fresher or shorter routes. One limitation of this method is that it can only detect and prevent single black hole attack in a network and lacks the ability to detect cooperative black hole attacks caused by a group of malicious nodes. In future applications the intrusion prevention and recovery can be made more efficient by applying a distributed approach which can tackle more than one malicious node simultaneously. REFERENCES: [1] Yash Pal Singh, Dr. P.K Singh and Jay Prakash A Survey on Detection and Prevention of Black Hole Attack in AODVbased MANETs Journal Of Information, Knowledge And Research In Computer Engineering. 484 www.ijergs.org

International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 15 ISSN 91-27 [2] Nidhi Chhajed and Mayank Sharma Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN s): A Review International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, November 14. [3] Ms. Twincle G. Vyas and Mr. Dhaval J. Rana Survey on Black Hole Detection and Prevention in MANET International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, November 14. [4] Ms.B.R.Baviskar and Mr.V.N.Patil Black Hole Attacks Mitigation And Prevention In Wireless Sensor Network International Journal of Innovative Research in Advanced Engineering (IJIRAE), ISSN: 2349-2163 Volume 1 Issue 4 (May 14). [5] Jaspreet Kaur and Tavleen Kaur A Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in wireless Sensor Networks International Journal for Research in Applied Science and Engineering Technology (IJRASET). [6] Kimia Moradi and Majid Rahiminasab Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol Scholars Research Library. European Journal of Applied Engineering and Scientific Research, 12, 1 (4):7-215. [7] Ganesh R. Pathak, Suhas H. Patil and Jyoti S. Tryambake Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN International Journal of Computer Science and Business Informatics. [8] Shio Kumar Singh, M P Singh and D K Singh A Survey on Network Security and Attack Defense Mechanism for Wireless Sensor Networks International Journal of Computer Trends and Technology - May to June Issue 11. [9] J.Steffi Agino Priyanka, S.Tephillah and A.M.Balamurugan Attacks and Countermeasures In WSN IPASJ International Journal of Electronics & Communication (IIJEC). A Publisher for Research Motivatin. Volume 2, Issue 1, January 14. [10] Dr. G. Padmavathi and Mrs. D. Shanmugapriy A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 09. [11] Md. Safiqul Islam and Syed Ashiqur Rahman Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches International Journal of Advanced Science and Technology, Vol. 36, November, 11. [12] S. Kannan, T. Maragatham, S. Karthik and V.P. Arunachalam A study of Attacks, Attack detection and Prevention Methods in Proactive and Reactive Routing Protocols International Business Management 5 (3): 178-183, 11. ISSN: 1993-52. Medwell Journals, 11. [13] Wassim Znaidi and Marine Minier An Ontology for Attacks in Wireless Sensor Networks Jean-Philippe Babau. [14] Mohammad Saiful Islam Mamun, Ernest A.F.M. Sultanul Kabir Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 10. Sukla Banerjee, Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Network, WCECS 08, ISBN: 978-988-98671-0-2 485 www.ijergs.org