SECURITY ISSUE ON AODV ROUTING PROTOCOL SUFFERING FROM BLACKHOLE ATTACK Mrs. Kritika Taneja, Asst. Professor, Manav Rachna International University, Faridabad Abstract- An adhoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad ADHOC On demand Distance Vector) Routing suffering Blackhole attack, which can simulate blackhole attack to MANET by one of nodes as a malicious one in network. BAODV can be regarded as AODV, which is used in MANET blackhole attack. Keywords:- MANET, AODV, Black hole attack, BAODV and SAODV I. INTRODUCTION Adhoc network is a wireless network without having any fixed infrastructure.aodv is perhaps the most well-known routing protocol for a MANET. It is a reactive protocol : nodes in the network exchange routing information only when a communication must take[1] place and keep this information up-to-date only as long as the communication lasts. This paper studies black hole attack occurs in route discovery phase. If the source node needs to send application layer data to the destination node in MANET USING AODV, when there is not a route to the destination node in the routing table of the source node, it will launch a route discovery process. We have describe the three steps[10]. Firstly, the source node sends a routing request packet RREQ to its next hop. Secondly, when the destination node or intermediate nodes which have a routing to the destination node receive the RREQ, they will send routing response packet RREP to the source node. Thirdly, when it receives the RREP, the source node sends application layer data to the destination node along the corresponding opposite direction route of the fastest RREP. Dr.S.S.TYAGI, Head of the Department, Computer Science, Manav Rachna International University, Faridabad Another kind of routing message,called route error (RERR), allow nodes to notify errors, for example, because a previous neighbour has moved and is no longer reachable[9].if the route is not active all routing information expires after a timeout and is removed from the routing table. In MANET using AODV, AODV S routing discovery process allows the middle node send RREP to the source node, in order to reply the RREQ received.when a malicious node in network receives RREQ, it can forget a RREP, claim it has a latest and shortest route to destination node. If this malicious RREP reaches the source node before the correct RREP, which are sent by the real destination node or an intermediate nodes who have a real route to destination node, the source node will mistake that it finds a route to reach the destination node, and sends application layer data to the destination node along the corresponding opposite direction route of the malicious RREP. The source node will think the data has been sent to the destination node, in fact, these data, so that the malicious node carries so-called black hole attack to MANET using AODV. II. AODV SUFFERING BLACK HOLE ATTACK- BAODV In order to simulate AODV suffering black hole attack, this paper first proposes and implements a routing protocol BAODV Routing suffering black hole attack. Its basic working principle is similar to AODV. But they have some differences.using the mechanism that AODV S [2] routing discovery process allows the middle node to send RREP to the source node to reply the received, when it receives a RREQ, a malicious node in network can send a forget RREP to the source node as soon as possible, in order to claim it has a latest and shortest route to the destination node. 168
AODV needs to send application layer data to the destination node D, and there is not a route to D in its own routing table, S firstly broadcasts a routing request packet RREQ to its next hop node to find a route to the destination In figure 1, when a source node S in MANET using III. SECURE ROUTING PROTOCOL WITH BLAKHOLE ATTACK SAODV AS BAODV, in route discovery phase, when the source node S in MANET receives a RREP, S will deposit the RREP in its routing table, and immediately sends a verification packet [6] SRREQ to the destination node D along the opposite direction route of RREP received. The content of each SRREQ contains a random number (record as X) generated by the source node S. When receives two SRREQ or more from different routing paths, the destination node D[8] firstly deposits them to local routing table, and compares the content of SRREQ whether contains a same random number, then deals with the following steps:- Fig: - 1(a) the routing discovery process of BAODV node D. We assumes that routing table of node B, G,K all have a route to the destination node D, and E is the only malicious node in network, when the RREQ sent by S reaches B, G AND K AND E,they will send a routing response packet RREP [3] to the source node S. Malicious node E will not check its own routing table,and directly send a forged RREP to S, so the malicious RREP reaches the source node fastest.at this time the source node S will mistake that it finds a route to reach the destination node D, and sends application layer data to D along the corresponding opposite direction route of the malicious RREP and S will think that the data has been sent to D, in fact, these data has been discarded by the malicious node. So BAODV has simulated AODV suffering black hole attack. Fig: - 1(b) The source node S sends verification packet SRREQ to the destination D. Fig:-1(c) The destination node D sends verification confirm packet SRREP to the source node S. 1. If the receives two SRREQ or more,whose content contains a same random (x), along the different routing paths, the destination node D respectively sends verification confirm packet SRREP to the source node S immediately along corresponding opposite direction path of SRREQ, in fig 1( c), the content of each SRREP contains a random number, along a new different path, D will send a SRREP containing random number, along corresponding opposite direction path. 2. If the content of SRREQ contains different random number, S needs to continue to wait, until at least two SRREQ content contains a[4] same random number and then deals with according to step 1.when the source node S receives two SRREP or more, which contains a random number, along different paths.if the contents contain a same random, it proved to find two or more credible and efficient routing. The source node S sends 169
application layer data to destination node D [7] along the fastest route, at the same time S broadcast a warning message to the whole Network to isolate the middle nodes who send RREP in the front of the two fastest credible routing. MANET is 7.7308594%, so SAODV can effectively prevent the black hole attack in network, and have little effect on the packet loss rate of network, and have little effect on the packet loss rate of network and sometimes even have better results than AODV. IV. SIMULATION ENVIRONMENT WITH AODV, BAODV & SAODV The network performance of three routing protocols AODV, BAODV AND SAODV are evaluated with CBR communication traffic scenes, in 50 nodes 100 randomly generated Simulation. Fig. 2(b) The comparison of average network packet loss rates of MANET using different routing protocols. Fig 2:-The comparison of network packet loss rates of MANET using CBR network traffic scene. Scenarios. The network parameters chosen are network packet loss [5], throughput and routing protocol efficiency Fig:-3 The comparison of network throughputs of MANET using CBR network traffic scene. Table.2 (a) The comparison of network packet loss rates of MANET using CBR network traffic scene. In fig 2(b) the CBR network traffic scene, the average network packet loss rate of MANET using AODV is 8.1321968% but when AODV suffers Blackhole attack, namely BAODV, the average network packet loss rate of MANET increases to 57.739974%. When MANET uses SAODV, although there also is blackhole attack in the network, the average n/w packet loss rate of In the CBR network traffic scene, the average network throughput of MANET using AODV is 0.475839Mb/s, but when AODV suffers black hole attack, namely BAODV, the average network throughput of MANET drops to 0.218904Mb/s. 170
When MANET uses SAODV, although there also is black hole attack in the network, the average network throughput of MANET is 0.478566Mb/s. Therefore, SAODV can increase security of MANET and even increase the network throughput. In figure 7 the comparison of average routing efficiencies of different routing protocols is displayed. Fig.:- 4. The comparison of different routing protocol efficiencies in MANET using CBR network traffic scene. In the CBR network traffic scene, the average routing efficiency, although there also is black hole attack in the network, the average routing efficiency of SAODV is 39.03302%, so when SAODV can effectively prevent the black hole attack in network, and also maintain a high routing efficiency. According to the comparison and analysis above, the following conclusion can be drawn: SAODV is a secure and efficient routing protocol in MANET. Its security is better than AODV s, routing efficiency is not worse than AODV s. V. CONCLUSION AND FUTURE WORK Fig.:-5 The comparison of average network throughputs of MANET using different routing protocols. Secure AODV can increase Mobile ad-hoc network security, it brings some burden to the network.such as the source node needs to storage received RREP and SRREP in each routing discovery phase, and to do relevant calculation. The destination node also needs to storage received SRREQ in each routing discovery phase, and to do relevant calculation. The future research should better balance in the safety and efficiency, to achieve a more secure routing protocol, whose efficiency is better, and at the same time, the network performance of MANET can also be improved. REFERENCES Table.6 The comparison of different routing protocol efficiencies in MANET using CBR network traffic scene. [1]. Charles E. Perkins and Pravin Bhagwat, Highly dynamic Destination-Sequenced Distance- Vector routing (DSDV) for mobile computers. In Proceedings of the SIGCOMM 94 Conference on 171
Communications Architectures, Protocols and Applications, August 1994. [2] P. M. Merlin and A. Segall. A failsafe distributed routing protocol. IEEE llansadions on Communications, COM-27(9):, September 1979. [3] A.Shamir. How to share a secret. Communications of the ACM,(11):, Nov.1979. [4] J. M. McQuillan, 1. Richer, and E. C. Rosen. The new routing algorithm for the ARPANET. IEEE Transactions on Communications, COM- 28(5):, May 1980 [5] John Jubin and Janet D. Tornow. The DARPA Packet Radio Network Protocols. Proceedings of the IEEE, 75(1):January 1987 [6] C. Hedrick. Routing Information Protocol. RFC 1058, June 1988. [7] J. J. Garcia Luna-Aceves. A unified approach to loop-free routing using distance vectors or link states. In ACM SIGCOMM,, 1989. [8]. Charles E. Perkins and Pravin Bhagwat, Highly dynamic Destination-Sequenced Distance- Vector routing (DSDV) for mobile computers. In Proceedings of the SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications,August 1994. [9] Shree Murthy and J. J. Garcia-Luna- Aceves. An Efficient Routing Protocol for Wireless Networks. Mobile Networks and Applications, 1(2):, 1996 [10] B. Schneier, Applied Cryptography,Wiley, 1996. 172