SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Mitigating Impact of Blackhole Attack in MANET
Shashi Gurung1
and Dr. Krishan Kumar Saluja2
1
CTIEMT/ Department of Computer science and Engineering, Jalandhar, India
gurungshashi68@gmail.com
2
SBSCET/ Department of Computer science and Engineering, Ferozepur, India
k.salujasbs@gmail.com
Abstract— Mobile Ad Hoc Network (MANET) is one kind of new wireless network
structures which is also known as infrastructure less network. Unlike devices in traditional
wireless LAN solution, all nodes are movable and the topology of the network is changing
dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile
Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks
due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic
network topology, open medium, autonomous terminal and management. As a result,
attackers can take advantage of flaws in routing protocols to carry out various attacks. The
black hole attack is one of such security issue in MANET. It could disturb the routing
protocol and bring about huge damage to the network’s topology. In this attack, a malicious
node gives false information of having shortest route to the destination node so as to get all
data packets and drops it. In this paper, we propose an algorithm which mitigates the
impact of black hole attack in AODV routing.
Index Terms— AODV, Blackhole attack, Anti Near Blackhole-AODV (ANB-AODV), Anti
Far Blackhole-AODV (AFB-AODV)
I. INTRODUCTION
Mobile Ad Hoc Network (MANET) is a collection of infrastructure less nodes that cooperates with each
other to make temporary network. It consists of a collection of wireless mobile nodes that have capability to
communicate with each other without the use of network infrastructure or any centralized administration.
Also security is important to provide protected communication between nodes in a potentially hostile
environment. Although security has long been an active research topic in wireless networks, the unique
characteristics of MANETs present a new set of challenges to security design. These challenges include
shared wireless medium, highly dynamic network topology, open network architecture and stringent resource
constraints. Consequently, the existing security solutions for wired networks do not directly apply to the
MANET domain. Routing protocol in MANET is divided into two main categories, one is proactive and
other is reactive. In proactive routing protocols, routing information of nodes is exchanged, periodically, such
as DSDV. In on-demand routing protocols, route is established and nodes exchange routing information
when needed such as AODV [1]. Furthermore, some ad-hoc routing protocols are a combination of above
categories which are called as hybrid routing protocols.
II. OVERVIEW OF AODV
The Ad Hoc On-Demand Distance Vector (AODV) is routing protocol for mobile adhoc network and is an
DOI: 02.ITC.2014.5.560
© Association of Computer Electronics and Electrical Engineers, 2014
Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC
230
adaptation of the DSDV protocol used in wired network for dynamic link conditions [1][2][3].The AODV is
based on-demand approach for finding route i.e. a route is established only when it is required by a source
node for sending data packets and hence it is also known as reactive protocol. In order to identify the most
recent path for communication, it uses high destination sequence numbers. Every node in an Ad-hoc network
keeps a routing table, in which there is information about the path or route to a particular destination.
Whenever a node wants to send data packet, it first checks its routing table to check whether a route to the
destination is already exist. If so, it uses that path to send the packets to the destination. If a path is not
available or the previously entered path is inactivated, then the node starts a route discovery process. In route
discovery process before the actual transmission of data packets, RREQ (Route REQuest) packet is
broadcasted by the source node. Every node in the network that receives the RREQ packet first checks
whether it is the destination for that packet and if so, it sends back an RREP (Route REPly) packet via
reverse path. If it is not the destination, then it checks with its routing table to determine whether it has fresh
route to the destination. If not, it broadcast RREQ packet to all its neighbours. If its routing table does contain
an entry to the destination, then the comparison is done between destination sequence numbers in its routing
table with the destination sequence number contained in the RREQ packet. This Destination Sequence
number is the sequence number of the last sent packet from the destination to the source. If the destination
sequence number present in the routing table is lesser than or equal to the one contained in the RREP packet,
then the node update its routing table. If the destination sequence number in the routing table is higher than
the destination sequence number contained in the RREP packet, it means that the route is a fresh route and
packets can be sent via this route. This intermediate node then sends a RREP packet to the node through
which it received the RREQ packet. The RREP packet is sent back to the source node through the reverse
route. The source node then updates its routing table and sends its packet through this route. During the
communication, if any node identifies a link breakage it sends a RERR (Route ERRor) packet to all other
nodes that uses this link for their communication to other nodes. Since there is no security mechanism in
AODV protocol, malicious nodes can perform many attacks in network by not following according to AODV
rules. A malicious node can carry out many attacks against AODV like blackhole, wormhole, sinkhole, sybil
attack etc.
III. BLACKHOLE ATTACK
A Black Hole attack [4] is a denial of service type of attack where a malicious node gives false information
of having shortest route to the destination in order to get all the data packets and drop it. In blackhole attack,
once malicious node receives request (RREQ) packet, it sends back reply (RREP) packet which contain very
high destination sequence due to which the source node consider it as a fresh route and start sending data
packet via the path from which reply packet came. In the following Fig. 1, imagine a malicious node M.
When node S broadcasts a RREQ packet in order to communicate with destination node, then other
neighbour node receives it. Node M, being a malicious node, does not check up with its routing table for the
requested route to node D. Hence, it immediately sends back a RREP packet, claiming of having shortest
path to the destination. Node S receives the RREP from M immediately and assumes that the route through
M is the shortest route as well as fresh route and thereby starts sending data packets to the destination
through this path. When the node S sends data packet to M, it absorbs all the data and drop the packets thus
behaving like a Black hole.
RREQ (Request Packet)
REPP (Reply Packet)
Figure 1. Black hole Attack in AODV
S D
M
231
IV. RELATED WORK
H. Deng, W. Li, and D.P. Agrawal [4] proposed a protocol that needs the intermediate nodes to send RREP
message along with next hop information. Once the source node gets this information, it sends a request
(RREQ) packet to following hop to verify that the target node (i.e. the node that simply sent back the RREP
packet) has a route to the intermediate node and to the destination. Once next hop receives an
Further Request, it sends a Further Reply which has the check result to the source node. Based on
information contained in reply packet the source node checks the validity of the route. In this protocol, the
RREP packet is modified to contain the knowledge regarding next hop. On receiving RREP, the source
node send RREQ to the node specified as next hop within the received RREP.B. Sun, Y. Guan, J. Chen and
U. Pooch [5] use AODV as their routing protocol and simulation is done in ns2 simulator. The detection
scheme used neighbourhood-based method to detect the black hole attack and then present a routing recovery
protocol to build the true path to the destination. Based on the information about neighbour set, a solution is
designed to deal with the black hole attack, which comprised of two parts. The first one is detection and
second is response. In detection part, there are two steps. In first step there is collection of information about
neighbour set and in second step it determines whether there exists a black hole attack. In Response
mechanism, source node sends to destination node a modify-Route-Entry (MRE) control packet to form a
correct path through modifying the route entries of the intermediate nodes from source to destination.S.
Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard presented an algorithm in [6] which
claims to prevent the cooperative black hole attacks in ad-hoc network. In this algorithm each node maintains
an additional Data Routing Information (DRI) table. Moreover, the solution takes more time to complete in
the case when the network in not under the attack. This algorithm is based on a trust relationship between the
nodes, and hence it cannot able to tackle gray hole attacks.M. Al-Shurman, S-M. Yoo and S. Park [7]
proposed two different approaches to solve the black hole attack. In the first solution the sender node must
verify the genuineness of the node that initiates the RREP packet by utilizing the redundancy of the network.
The main idea of this approach is to find more than one path for the destination. The disadvantage of this
technique is the time delay. In the second approach it needs to store the sequence number of last sent packet
and the sequence number of last received packet in the table and it is updated only when any packet is
transmitted or arrived. When node receives reply from another node it checks the sequence number of the last
sent and received packet. If there exists any mismatching then an alarm indicates the existence of a black
hole node. This solution has no overhead and is faster as well as more reliable. Tamilselvan and Dr.V.
Sankaranarayanan [8] proposed a solution to prevent blackhole attack in which the requesting node does not
send data packets immediately after receiving first reply from neighbouring node rather it waits for other
replies with next hop details from the other neighboring nodes for some duration of time value. After expiry
of time value, it then first checks in the Collect Route Reply Table for the presence of any repeated next-hop-
node. If there is any repeated next-hop-node in the reply paths, it assumes that the paths are safe or the
chance of malicious paths is reduced. H.Weerasinghe and H. Fu [9] proposed a solution in which the
intermediate node sends reply (RREP) packet which contains the knowledge or data about the next hop to
destination when it receives a request (RREQ) packet. After that the source node sends a further request
(FREQ) packet to next hop of replied node and asks regarding replied node and route to the destination.
Through this technique, it is able to determine the trustiness of the replied node only if the next hop is
reliable. However, this methodology is not able to prevent cooperative black hole attack on MANETs. L.
Tamilselvan and Dr. V.Sankaranarayanan [10] also proposed an enhanced AODV routing protocol, known as
PCBHA (Prevention of a Co-operative Black Hole Attack) for prevention of cooperative black hole attack. In
this technique, it provides every node with a default fidelity level, and once broadcasting of RREQ packet is
done, a source node waits for RREPs packet coming from the other neighbouring nodes, and then it chooses a
neighbouring node of a higher fidelity level that exceeds the threshold value for passing the data packets.
After receiving data packet, the destination node sends ACK message and upon receipt of an ACK response,
the source node may add 1 to the fidelity level of the neighbouring node. If no ACK response is
received, 1 is deducted from the fidelity level that indicates a potential malicious node on this route due to
which data packets are dropped before reaching the destination node. M. Medadian , A. Mebadi, E. Shahri
[11] have proposed an approach to mitigate the impact of black hole attack through the judgment process by
using honesty of nodes. The honesty of any node is derived from the opinions of neighbor nodes of a node in
a network. A node should show its honesty in order to transfer the data packets. If a node is the first receiver
of a RREP packet, it forwards packets to source and initiates judgment process on about replier. The
judgment process is dependent upon the opinion of network’s nodes regarding replier. These neighbors are
232
requested to send their opinion about a node. When a node gathers all opinions of neighbors, it makes
decision whether the replier is a malicious node or not based on number rules. N. Mistry, D.C. Jinwala and
M. Zaveri [12] proposed a solution for analyzing and improving the security of AODV routing protocol
against black hole Attack. The approach basically modifies the working mechanism of source node only by
using an additional function named as Pre_ReceiveReply. A table Cmg_RREP_Tab, a variable Mali_node
and a new timer MOS_WAIT_TIME are also added to the original standard AODV protocol. In the proposed
solution, the source node waits for MOS_WAIT_TIME after receiving the first RREP and it collects all the
replies within the Cmg_RREP_Tab table til MOS_WAIT_TIME. In this technique the value of
MOS_WAIT_TIME is considered to be half the value of RREP_WAIT_TIME. Now, the source node will
check the stored replies and will discard the reply having high destination sequence number. The node is
considered as malicious node which has sent this RREP packet with high destination sequence number..M.Y.
Su [13] proposed the mechanism to detect and separate malicious nodes, which selectively perform black
hole attacks by deploying IDSs in MANETs (mobile ad hoc networks). All IDS nodes perform an Anti-Black
hole Mechanism (ABM), in which it estimates the suspicious value of a node, according to the amount of
abnormal difference between RREQs and RREPs transmitted from the node. With the main condition that
intermediate nodes are forbidden to reply to RREQs, if an intermediate node that has never broadcasts a
RREQ for a specific route and is also not a destination, forwards a RREP for the route then its suspicious
value will be augmented by 1 in the nearby IDS’s SN (suspicious node) table. When the suspicious value of a
node exceeds a threshold value, a block message is broadcasted by the detected IDS to all nodes on the
network in order to cooperatively isolate the suspicious node. K. Liu and J. Deng [14] proposed a 2ACK
scheme to detect and mitigate the effect of such routing misbehaviour. The 2ACK technique is based on a
simple 2-hop acknowledgment packet that is sent back by the receiver of the next-hop link. When compared
with other techniques to overcome the problem, such as the overhearing technique, the 2ACK scheme
overcomes several problems including ambiguous collisions limited transmission powers and receiver
collisions.S. Gurung ,Dr. K. K. Saluja and A. Kumar[15] proposed an approach for detection of blackhole
attack in manet.The proposed method is based on conformation acknowledgment request (CARREQ) to
check whether the destination has received dummy packet or not. In this technique, Reply table and Blacklist
table are required for blackhole node detection. In this approach, the source node sends conformation
acknowledgment request (CARREQ) via other path to destination node and if the destination sends back
conformation acknowledgment reply (CARREP) then the intermediate node to which the source node
initially send the dummy packet is trusted node otherwise it is considered as a malicious node. The drawback
of this solution is time delay.In Table. I, the drawbacks of techniques have been highlighted [15][16].
TABLE I. DRAWBACKS OF TECHNIQUES
S.No. Methodology proposed By Attack Drawbacks
1 H. Deng , W. Li, and D.P. Agrawal [4] Single Blackhole
Cannot prevent cooperative blackhole
attack.
Routing Overhead.
2 B. Sun, Y. Guan, J. Chen and U. Pooch [5] Single Blackhole
Becomes useless when the attacker agrees
to forge the fake reply packets.
3
S. Ramaswamy, H. Furong, M. Sreekantaradhya, J.
Dixon and K. Nygard [6]
Cooperative Blackhole Cannot tackle grayhole attack.
4 M. Al-Shurman , S. Yoo and S.Park [7] Single Blackhole
Time Delay.
Attacker can listen to the channel and
update the tables for last sequence
number.
5 L. Tamilselvan and Dr.V. Sankaranarayanan [8] Single Blackhole
Time Delay.
Finding repeated next hop is additional
overhead.
6 H. Weerasinghe, H. Fu [9] Cooperative Blackhole
5-8% more communication overhead of
route request.
7 L. Tamilselvan and Dr.V. Sankaranarayanan [10] Cooperative Blackhole Time Delay.
8 M. Medadian , A. Mebadi, E. Shahri [11] Cooperative Blackhole
Opinion of neighbour may not be always
correct.
9 N. Mistry , D.C. Jinwala and M. Zaveri [12] Single Blackhole
Time Delay.
Failed to detect cooperative blackhole
attack.
10 M.Y. Su [13] Multiple Blackhole Time Delay.
11 S. Gurung ,Dr. K. K. Saluja and A. Kumar[15] Single Blackhole Time Delay
233
V. PROPOSED METHODOLOGY
In this section, we propose a solution to mitigate the impact of black hole attack in the network. Following is
the diagram showing blackhole attack.
Figure 2. M and D path Figure 3. No M and D path
RREQ (Request Packet)
REPP (Reply Packet)
A. Matrix Representation
TABLE II. TRUTH TABLE OF BLACKHOLE NODE
Figure No. Shortest route to Destination Malicious Node Packet Drop
2 T T T
3 F T T
From the above Table. II, it is shown that if there is path between malicious node and destination as given in
Fig. 2, which is of shortest path then the malicious node will drop the packet and if there is no path between
them as depicted in Fig. 3 and it gives false statement of having shortest path to destination even then also it
will drop the data packets.
B. ANB-AODV: Anti Near Blackhole-AODV
In order to mitigate the impact of blackhole attack in manet, AODV protocol has been slightly changed. In
this approach, when sender broadcast the RREQ packet, it will wait for reply. The source node will get first
reply from malicious node provided the malicious node is near to source node as shown in Fig. 4 and acquire
the data packet and it will not forward the packet to the destination. In proposed methodology i.e. ANB-
AODV (Anti Near Blackhole-AODV), the source node will accept the first reply coming from malicious
node and start sending data packets. But after some time when the second reply comes from original
destination, it will accept the second reply and start sending via this alternative path as shown in Fig. 5.
Algorithm for ANB-AODV
1. If Reply table is NULL
2. Set count: =0
3. Insert Destination node
4. Else
5. Set count:=count+1
6. Update Route Table
Figure 4. Accepting First Reply Figure 5. Accepting second reply
234
C. AFB-AODV: Anti Far Blackhole-AODV
In order to mitigate the impact of blackhole attack in MANET, AODV protocol has been slightly changed. In
this approach, when sender broadcast the RREQ packet, it will wait for reply. The source node will get first
reply from destination original node provided the destination node is near to source node and malicious node
is far away from source node as shown in Fig. 6. In proposed methodology i.e. AFB-AODV (Anti Far
Blackhole-AODV), the source node will accept the first reply coming from original destination node and start
sending data packets. But after some time when the second reply comes from malicious node, it will reject
the second reply as shown in Fig. 7.
Algorithm for AFB-AODV
1. If Reply table is NULL
2. Set count =0
3. Insert Destination node
4. Update Route Table
5. Else
6. Set count:=count+1 and Drop Reply
Figure 6. Accepting First Reply Figure 7. Rejecting second reply
VI. SIMULATION ENVIRONMENT AND RESULT
A simulation model was developed using NS-2 (version 2.34) where the evaluation was done by analyzing
the performance of network under without blackhole attack and with blackhole attack. Two scenarios are
taken one is static in which no node is mobile and other one is mobility in which Random Waypoint mobility
model is used.
A. Static Scenario
1. ANB-AODV
In this scenario, no node is movable that is these nodes are static and AODV routing protocol is used. When
there is no malicious node then source node gets reply from destination node and starts transferring data
packet thereby having packet delivery rato percentage upto 100 %. But when malicious node is present in the
network it gives first reply to source node when source node broadcast the route request. Thus the source
node will accept the first reply coming from malicious node thereby starts transferring data packets to this
node due to which there is decrease in packet delivery ratio in AODV routing protocol. When ANB-AODV
routing protocol is used it will reject the first reply coming from blackhole node and accept the second reply
coming from original destination node thereby increasing the packet delivery ratio as shown in Fig. 8.
Figure 8. PDR %age in presence of Blackhole Attack
235
2. AFB-AODV
When there is no malicious node then source node gets reply from destination node and starts transferring
data packet thereby having packet delivery ratio percentage upto 100 %. But when malicious node is present
in the network, the source node gets second reply from malicious node after getting first reply from original
destination node. Thus the source node will accept the second reply coming from original destination node
thereby starts transferring data packets to this node due to which there is decrease in packet delivery ratio in
AODV routing protocol. When AFB-AODV routing protocol is used it will reject the second reply coming
from blackhole node and accept the first reply coming from original destination node thereby increasing the
packet delivery ratio as shown in Fig. 9.
Figure 9. PDR %age in presence of Blackhole Attack
B. Mobility Scenario
In this scenario all nodes are movable. Fig. 10 is showing network without blackhole attack. The mobility
model used in the network is Random Waypoint Mobility model. In mobility case, in each scenario the nodes
are randomly positioned and moves with different speed as depicted Fig. 11.
Figure 10. Network without Blackhole Attack
Figure 11. Network with Blackhole Attack
236
Figure 12. Average Throughput in presence of Blackhole Attack
From Fig. 12, it is clear that when there is no attack in network, the average throughput is high but when
there is blackhole attack in the network this throughput goes down because of packet drop by blackhole node.
The average throughput is very low in case of two blackhole node in the network as compared to one
blackhole node which shows that increasing blackhole node results in decreasing the average throughput of
the network. When ANB-AODV or AFB-AODV is used there is increase in the average throughput which
improves the performance of network.
Figure 13. PDR %age in presence of Blackhole Attack
From Fig. 13, it is clear that when there is no attack in network, the packet delivery ratio is high but when
there is blackhole attack in the network this packet delivery ratio goes down low due to packet dropping by
malicious node. The packet delivery ratio is very low in case of two blackhole node in the network as
compared to one blackhole node which shows that increasing blackhole node results in decreasing the packet
delivery ratio of the network. When ANB-AODV and AFB-AODV protocol is used, there is increase in the
packet delivery ratio thereby improving the performance of network.
Figure 14. Packet Loss %age in presence of Blackhole
From Fig. 14, it is clear that when there is no attack in network, the packet loss is low but when there is
blackhole attack in the network this packet loss goes up because of packet dropping by malicious node. The
237
packet loss ratio is very high in case of two blackhole node in the network as compared to one blackhole
node which shows that increasing blackhole node results in increasing the packet loss of the network. When
ANB-AODV and AFB-AODV protocol is used then there is decrease in the packet loss thus improving the
performance of network.
VII. CONCLUSIONS
Security is important in wireless Mobile Adhoc networks as they are prone to various network threats and
vulnerable to various kinds of attacks like sinkhole, wormhole, rushing attack, Black Hole attack and so on.
The performance of the proposed approach under Black Hole attack has been compared with AODV under
Black Hole attack. The simulation results show that the proposed approach is effective in improving the
performance of the network. As a future work, we intend to propose new algorithm for the detection and
prevention of blackhole attack.
ACKNOWLEDGMENT
I would like to take the opportunity to thank people who guided and supported me during research work.
Without their contributions, this work would not have been possible. I have a great pleasure in expressing my
deep sense of gratitude and indebtedness to Dr. Krishan Kumar Saluja, my supervisor for their continuous
guidance and invaluable suggestions at all the time during the research work and special thanks to Shweta
Gupta, my wife for helping, motivating and encouraging me during research work.
REFERENCES
[1] C. E. Perkins and E.M. Royer, "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and
Applications, 1999. Proceedings, WMCSA '99, Second IEEE Workshop, pp.90-100, 25-26 Feb 1999.
[2] C. E. Perkin, E.M.B .Royer and S. Das , “Ad hoc on-demand distance vector (AODV) routing,” IETF Internet
Draft, MANET working group, Jan.2004.
[3] D.S. Patil and A.M. Ghorpade, “Cope with black hole attacks in AODV protocol in MANET by end to end route
discovery”, IOSR Journal of Electronics & Communication Engineering (IOSR-JECE),vol.7, pp. 21-26, 2013.
[4] H. Deng, W. Li, and D.P. Agrawal, "Routing security in wireless ad hoc networks," Communications Magazine,
IEEE, Vol.40, No.10, pp. 70- 75, October 2002.
[5] B. Sun, Y. Guan, J. Chen and U. Pooch,” Detecting Black-hole Attack in Mobile Ad Hoc Networks”. Paper
presented at The 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, and 22-25
April 2003.
[6] S. Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard ,” Prevention of Cooperative Black Hole
Attack in Wireless Ad Hoc Networks”. Paper presented at the International Conference on Wireless Networks, Las
Vegas, Nevada, USA, 23-26 June 2003.
[7] M. Al-Shurman, S. Yoo and S.Park, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional
Conference, 2004 (ACM-SE’42), Huntsville, Alabama, pp. 96-97, 2-3 April 2004.
[8] L. Tamilselvan and Dr. V.Sankaranarayanan, “Prevention of Black hole Attacks in MANET”, The 2nd
International
Conference on Wireless Broadband and Ultra Wideband Communications, IEEE, 2007.
[9] H. Weerasinghe and H. Fu,”Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation
Implementation and Evaluation”. Paper presented at the Future Generation Communication and Networking, Jeju-
Island, Korea, 6-8 December 2007.
[10] L. Tamilselvan and Dr. V. Sankaranarayanan,“Prevention of Co-operative Black Hole Attack in MANET”, Journal
of Networks, Vol 3, No 5, pp. 13-20, May 2008.
[11] M. Medadian, A. Mebadi, E. Shahri, "Combat with Black Hole attack in AODV routing protocol", Communications
(MICC), 2009 IEEE 9th Malaysia International Conference, pp.530-535, 15-17 Dec.2009.
[12] N. Mistry, D.C. Jinwala and M. Zaveri, “Improving AODV Protocol against Blackhole Attacks”, Proceedings of
The International Multi Conference of Engineers and Computer Scientists 2010, Vol 2, IMECS 2010.
[13] M.Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection
systems”, Computer Communications, 34(1), pp.107-117, 2011.
[14] K. Liu and J. Deng, “An Acknowledgment Based Approach for the Detection of Routing Misbahavior in
MANETS”, IEEE Transaction in Mobile Computing, Vol. 6, Vol. 5, pp.536-550, May 2007.
[15] S. Gurung ,Dr. K. K. Saluja and A. Kumar, “Detection of blackhole attack in Mobile Adhoc Network”, UACEE
International Journal of Advances in Computer Networks and its Security – IJCNS, Vol. 3, pp. 44-48,9 Sept 2013.
[16] S. Gurung ,Dr. K. K. Saluja and A. Kumar ,”Survey of Black Hole Attack Detection in Mobile ADHOC Networks “
, Proceedings of SARC-IRAJ International Joint Conference, pp. 97-101 ,7 July 2013.

Contenu connexe

Tendances

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Editor IJARCET
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 

Tendances (20)

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
He3413241328
He3413241328He3413241328
He3413241328
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 

En vedette

En vedette (10)

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
 
84 11-21
84 11-2184 11-21
84 11-21
 
Career sharing fsl
Career sharing fslCareer sharing fsl
Career sharing fsl
 
74 136-143
74 136-14374 136-143
74 136-143
 
82 348-355
82 348-35582 348-355
82 348-355
 
80 152-157
80 152-15780 152-157
80 152-157
 
72 129-135
72 129-13572 129-135
72 129-135
 
71 338-347
71 338-34771 338-347
71 338-347
 
65 113-121
65 113-12165 113-121
65 113-121
 
69 122-128
69 122-12869 122-128
69 122-128
 

Similaire à 560 229-237

A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolIOSR Journals
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSIAEME Publication
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSIAEME Publication
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolZac Darcy
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 

Similaire à 560 229-237 (20)

A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
C0331215
C0331215C0331215
C0331215
 
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
E41022938
E41022938E41022938
E41022938
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 

Plus de idescitation (20)

62 328-337
62 328-33762 328-337
62 328-337
 
46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 
106 419-424
106 419-424106 419-424
106 419-424
 
114 425-433
114 425-433114 425-433
114 425-433
 
501 183-191
501 183-191501 183-191
501 183-191
 
503 434-438
503 434-438503 434-438
503 434-438
 
525 192-198
525 192-198525 192-198
525 192-198
 
528 439-449
528 439-449528 439-449
528 439-449
 
529 199-206
529 199-206529 199-206
529 199-206
 
538 207-219
538 207-219538 207-219
538 207-219
 

Dernier

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Dernier (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

560 229-237

  • 1. Mitigating Impact of Blackhole Attack in MANET Shashi Gurung1 and Dr. Krishan Kumar Saluja2 1 CTIEMT/ Department of Computer science and Engineering, Jalandhar, India gurungshashi68@gmail.com 2 SBSCET/ Department of Computer science and Engineering, Ferozepur, India k.salujasbs@gmail.com Abstract— Mobile Ad Hoc Network (MANET) is one kind of new wireless network structures which is also known as infrastructure less network. Unlike devices in traditional wireless LAN solution, all nodes are movable and the topology of the network is changing dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic network topology, open medium, autonomous terminal and management. As a result, attackers can take advantage of flaws in routing protocols to carry out various attacks. The black hole attack is one of such security issue in MANET. It could disturb the routing protocol and bring about huge damage to the network’s topology. In this attack, a malicious node gives false information of having shortest route to the destination node so as to get all data packets and drops it. In this paper, we propose an algorithm which mitigates the impact of black hole attack in AODV routing. Index Terms— AODV, Blackhole attack, Anti Near Blackhole-AODV (ANB-AODV), Anti Far Blackhole-AODV (AFB-AODV) I. INTRODUCTION Mobile Ad Hoc Network (MANET) is a collection of infrastructure less nodes that cooperates with each other to make temporary network. It consists of a collection of wireless mobile nodes that have capability to communicate with each other without the use of network infrastructure or any centralized administration. Also security is important to provide protected communication between nodes in a potentially hostile environment. Although security has long been an active research topic in wireless networks, the unique characteristics of MANETs present a new set of challenges to security design. These challenges include shared wireless medium, highly dynamic network topology, open network architecture and stringent resource constraints. Consequently, the existing security solutions for wired networks do not directly apply to the MANET domain. Routing protocol in MANET is divided into two main categories, one is proactive and other is reactive. In proactive routing protocols, routing information of nodes is exchanged, periodically, such as DSDV. In on-demand routing protocols, route is established and nodes exchange routing information when needed such as AODV [1]. Furthermore, some ad-hoc routing protocols are a combination of above categories which are called as hybrid routing protocols. II. OVERVIEW OF AODV The Ad Hoc On-Demand Distance Vector (AODV) is routing protocol for mobile adhoc network and is an DOI: 02.ITC.2014.5.560 © Association of Computer Electronics and Electrical Engineers, 2014 Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC
  • 2. 230 adaptation of the DSDV protocol used in wired network for dynamic link conditions [1][2][3].The AODV is based on-demand approach for finding route i.e. a route is established only when it is required by a source node for sending data packets and hence it is also known as reactive protocol. In order to identify the most recent path for communication, it uses high destination sequence numbers. Every node in an Ad-hoc network keeps a routing table, in which there is information about the path or route to a particular destination. Whenever a node wants to send data packet, it first checks its routing table to check whether a route to the destination is already exist. If so, it uses that path to send the packets to the destination. If a path is not available or the previously entered path is inactivated, then the node starts a route discovery process. In route discovery process before the actual transmission of data packets, RREQ (Route REQuest) packet is broadcasted by the source node. Every node in the network that receives the RREQ packet first checks whether it is the destination for that packet and if so, it sends back an RREP (Route REPly) packet via reverse path. If it is not the destination, then it checks with its routing table to determine whether it has fresh route to the destination. If not, it broadcast RREQ packet to all its neighbours. If its routing table does contain an entry to the destination, then the comparison is done between destination sequence numbers in its routing table with the destination sequence number contained in the RREQ packet. This Destination Sequence number is the sequence number of the last sent packet from the destination to the source. If the destination sequence number present in the routing table is lesser than or equal to the one contained in the RREP packet, then the node update its routing table. If the destination sequence number in the routing table is higher than the destination sequence number contained in the RREP packet, it means that the route is a fresh route and packets can be sent via this route. This intermediate node then sends a RREP packet to the node through which it received the RREQ packet. The RREP packet is sent back to the source node through the reverse route. The source node then updates its routing table and sends its packet through this route. During the communication, if any node identifies a link breakage it sends a RERR (Route ERRor) packet to all other nodes that uses this link for their communication to other nodes. Since there is no security mechanism in AODV protocol, malicious nodes can perform many attacks in network by not following according to AODV rules. A malicious node can carry out many attacks against AODV like blackhole, wormhole, sinkhole, sybil attack etc. III. BLACKHOLE ATTACK A Black Hole attack [4] is a denial of service type of attack where a malicious node gives false information of having shortest route to the destination in order to get all the data packets and drop it. In blackhole attack, once malicious node receives request (RREQ) packet, it sends back reply (RREP) packet which contain very high destination sequence due to which the source node consider it as a fresh route and start sending data packet via the path from which reply packet came. In the following Fig. 1, imagine a malicious node M. When node S broadcasts a RREQ packet in order to communicate with destination node, then other neighbour node receives it. Node M, being a malicious node, does not check up with its routing table for the requested route to node D. Hence, it immediately sends back a RREP packet, claiming of having shortest path to the destination. Node S receives the RREP from M immediately and assumes that the route through M is the shortest route as well as fresh route and thereby starts sending data packets to the destination through this path. When the node S sends data packet to M, it absorbs all the data and drop the packets thus behaving like a Black hole. RREQ (Request Packet) REPP (Reply Packet) Figure 1. Black hole Attack in AODV S D M
  • 3. 231 IV. RELATED WORK H. Deng, W. Li, and D.P. Agrawal [4] proposed a protocol that needs the intermediate nodes to send RREP message along with next hop information. Once the source node gets this information, it sends a request (RREQ) packet to following hop to verify that the target node (i.e. the node that simply sent back the RREP packet) has a route to the intermediate node and to the destination. Once next hop receives an Further Request, it sends a Further Reply which has the check result to the source node. Based on information contained in reply packet the source node checks the validity of the route. In this protocol, the RREP packet is modified to contain the knowledge regarding next hop. On receiving RREP, the source node send RREQ to the node specified as next hop within the received RREP.B. Sun, Y. Guan, J. Chen and U. Pooch [5] use AODV as their routing protocol and simulation is done in ns2 simulator. The detection scheme used neighbourhood-based method to detect the black hole attack and then present a routing recovery protocol to build the true path to the destination. Based on the information about neighbour set, a solution is designed to deal with the black hole attack, which comprised of two parts. The first one is detection and second is response. In detection part, there are two steps. In first step there is collection of information about neighbour set and in second step it determines whether there exists a black hole attack. In Response mechanism, source node sends to destination node a modify-Route-Entry (MRE) control packet to form a correct path through modifying the route entries of the intermediate nodes from source to destination.S. Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard presented an algorithm in [6] which claims to prevent the cooperative black hole attacks in ad-hoc network. In this algorithm each node maintains an additional Data Routing Information (DRI) table. Moreover, the solution takes more time to complete in the case when the network in not under the attack. This algorithm is based on a trust relationship between the nodes, and hence it cannot able to tackle gray hole attacks.M. Al-Shurman, S-M. Yoo and S. Park [7] proposed two different approaches to solve the black hole attack. In the first solution the sender node must verify the genuineness of the node that initiates the RREP packet by utilizing the redundancy of the network. The main idea of this approach is to find more than one path for the destination. The disadvantage of this technique is the time delay. In the second approach it needs to store the sequence number of last sent packet and the sequence number of last received packet in the table and it is updated only when any packet is transmitted or arrived. When node receives reply from another node it checks the sequence number of the last sent and received packet. If there exists any mismatching then an alarm indicates the existence of a black hole node. This solution has no overhead and is faster as well as more reliable. Tamilselvan and Dr.V. Sankaranarayanan [8] proposed a solution to prevent blackhole attack in which the requesting node does not send data packets immediately after receiving first reply from neighbouring node rather it waits for other replies with next hop details from the other neighboring nodes for some duration of time value. After expiry of time value, it then first checks in the Collect Route Reply Table for the presence of any repeated next-hop- node. If there is any repeated next-hop-node in the reply paths, it assumes that the paths are safe or the chance of malicious paths is reduced. H.Weerasinghe and H. Fu [9] proposed a solution in which the intermediate node sends reply (RREP) packet which contains the knowledge or data about the next hop to destination when it receives a request (RREQ) packet. After that the source node sends a further request (FREQ) packet to next hop of replied node and asks regarding replied node and route to the destination. Through this technique, it is able to determine the trustiness of the replied node only if the next hop is reliable. However, this methodology is not able to prevent cooperative black hole attack on MANETs. L. Tamilselvan and Dr. V.Sankaranarayanan [10] also proposed an enhanced AODV routing protocol, known as PCBHA (Prevention of a Co-operative Black Hole Attack) for prevention of cooperative black hole attack. In this technique, it provides every node with a default fidelity level, and once broadcasting of RREQ packet is done, a source node waits for RREPs packet coming from the other neighbouring nodes, and then it chooses a neighbouring node of a higher fidelity level that exceeds the threshold value for passing the data packets. After receiving data packet, the destination node sends ACK message and upon receipt of an ACK response, the source node may add 1 to the fidelity level of the neighbouring node. If no ACK response is received, 1 is deducted from the fidelity level that indicates a potential malicious node on this route due to which data packets are dropped before reaching the destination node. M. Medadian , A. Mebadi, E. Shahri [11] have proposed an approach to mitigate the impact of black hole attack through the judgment process by using honesty of nodes. The honesty of any node is derived from the opinions of neighbor nodes of a node in a network. A node should show its honesty in order to transfer the data packets. If a node is the first receiver of a RREP packet, it forwards packets to source and initiates judgment process on about replier. The judgment process is dependent upon the opinion of network’s nodes regarding replier. These neighbors are
  • 4. 232 requested to send their opinion about a node. When a node gathers all opinions of neighbors, it makes decision whether the replier is a malicious node or not based on number rules. N. Mistry, D.C. Jinwala and M. Zaveri [12] proposed a solution for analyzing and improving the security of AODV routing protocol against black hole Attack. The approach basically modifies the working mechanism of source node only by using an additional function named as Pre_ReceiveReply. A table Cmg_RREP_Tab, a variable Mali_node and a new timer MOS_WAIT_TIME are also added to the original standard AODV protocol. In the proposed solution, the source node waits for MOS_WAIT_TIME after receiving the first RREP and it collects all the replies within the Cmg_RREP_Tab table til MOS_WAIT_TIME. In this technique the value of MOS_WAIT_TIME is considered to be half the value of RREP_WAIT_TIME. Now, the source node will check the stored replies and will discard the reply having high destination sequence number. The node is considered as malicious node which has sent this RREP packet with high destination sequence number..M.Y. Su [13] proposed the mechanism to detect and separate malicious nodes, which selectively perform black hole attacks by deploying IDSs in MANETs (mobile ad hoc networks). All IDS nodes perform an Anti-Black hole Mechanism (ABM), in which it estimates the suspicious value of a node, according to the amount of abnormal difference between RREQs and RREPs transmitted from the node. With the main condition that intermediate nodes are forbidden to reply to RREQs, if an intermediate node that has never broadcasts a RREQ for a specific route and is also not a destination, forwards a RREP for the route then its suspicious value will be augmented by 1 in the nearby IDS’s SN (suspicious node) table. When the suspicious value of a node exceeds a threshold value, a block message is broadcasted by the detected IDS to all nodes on the network in order to cooperatively isolate the suspicious node. K. Liu and J. Deng [14] proposed a 2ACK scheme to detect and mitigate the effect of such routing misbehaviour. The 2ACK technique is based on a simple 2-hop acknowledgment packet that is sent back by the receiver of the next-hop link. When compared with other techniques to overcome the problem, such as the overhearing technique, the 2ACK scheme overcomes several problems including ambiguous collisions limited transmission powers and receiver collisions.S. Gurung ,Dr. K. K. Saluja and A. Kumar[15] proposed an approach for detection of blackhole attack in manet.The proposed method is based on conformation acknowledgment request (CARREQ) to check whether the destination has received dummy packet or not. In this technique, Reply table and Blacklist table are required for blackhole node detection. In this approach, the source node sends conformation acknowledgment request (CARREQ) via other path to destination node and if the destination sends back conformation acknowledgment reply (CARREP) then the intermediate node to which the source node initially send the dummy packet is trusted node otherwise it is considered as a malicious node. The drawback of this solution is time delay.In Table. I, the drawbacks of techniques have been highlighted [15][16]. TABLE I. DRAWBACKS OF TECHNIQUES S.No. Methodology proposed By Attack Drawbacks 1 H. Deng , W. Li, and D.P. Agrawal [4] Single Blackhole Cannot prevent cooperative blackhole attack. Routing Overhead. 2 B. Sun, Y. Guan, J. Chen and U. Pooch [5] Single Blackhole Becomes useless when the attacker agrees to forge the fake reply packets. 3 S. Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard [6] Cooperative Blackhole Cannot tackle grayhole attack. 4 M. Al-Shurman , S. Yoo and S.Park [7] Single Blackhole Time Delay. Attacker can listen to the channel and update the tables for last sequence number. 5 L. Tamilselvan and Dr.V. Sankaranarayanan [8] Single Blackhole Time Delay. Finding repeated next hop is additional overhead. 6 H. Weerasinghe, H. Fu [9] Cooperative Blackhole 5-8% more communication overhead of route request. 7 L. Tamilselvan and Dr.V. Sankaranarayanan [10] Cooperative Blackhole Time Delay. 8 M. Medadian , A. Mebadi, E. Shahri [11] Cooperative Blackhole Opinion of neighbour may not be always correct. 9 N. Mistry , D.C. Jinwala and M. Zaveri [12] Single Blackhole Time Delay. Failed to detect cooperative blackhole attack. 10 M.Y. Su [13] Multiple Blackhole Time Delay. 11 S. Gurung ,Dr. K. K. Saluja and A. Kumar[15] Single Blackhole Time Delay
  • 5. 233 V. PROPOSED METHODOLOGY In this section, we propose a solution to mitigate the impact of black hole attack in the network. Following is the diagram showing blackhole attack. Figure 2. M and D path Figure 3. No M and D path RREQ (Request Packet) REPP (Reply Packet) A. Matrix Representation TABLE II. TRUTH TABLE OF BLACKHOLE NODE Figure No. Shortest route to Destination Malicious Node Packet Drop 2 T T T 3 F T T From the above Table. II, it is shown that if there is path between malicious node and destination as given in Fig. 2, which is of shortest path then the malicious node will drop the packet and if there is no path between them as depicted in Fig. 3 and it gives false statement of having shortest path to destination even then also it will drop the data packets. B. ANB-AODV: Anti Near Blackhole-AODV In order to mitigate the impact of blackhole attack in manet, AODV protocol has been slightly changed. In this approach, when sender broadcast the RREQ packet, it will wait for reply. The source node will get first reply from malicious node provided the malicious node is near to source node as shown in Fig. 4 and acquire the data packet and it will not forward the packet to the destination. In proposed methodology i.e. ANB- AODV (Anti Near Blackhole-AODV), the source node will accept the first reply coming from malicious node and start sending data packets. But after some time when the second reply comes from original destination, it will accept the second reply and start sending via this alternative path as shown in Fig. 5. Algorithm for ANB-AODV 1. If Reply table is NULL 2. Set count: =0 3. Insert Destination node 4. Else 5. Set count:=count+1 6. Update Route Table Figure 4. Accepting First Reply Figure 5. Accepting second reply
  • 6. 234 C. AFB-AODV: Anti Far Blackhole-AODV In order to mitigate the impact of blackhole attack in MANET, AODV protocol has been slightly changed. In this approach, when sender broadcast the RREQ packet, it will wait for reply. The source node will get first reply from destination original node provided the destination node is near to source node and malicious node is far away from source node as shown in Fig. 6. In proposed methodology i.e. AFB-AODV (Anti Far Blackhole-AODV), the source node will accept the first reply coming from original destination node and start sending data packets. But after some time when the second reply comes from malicious node, it will reject the second reply as shown in Fig. 7. Algorithm for AFB-AODV 1. If Reply table is NULL 2. Set count =0 3. Insert Destination node 4. Update Route Table 5. Else 6. Set count:=count+1 and Drop Reply Figure 6. Accepting First Reply Figure 7. Rejecting second reply VI. SIMULATION ENVIRONMENT AND RESULT A simulation model was developed using NS-2 (version 2.34) where the evaluation was done by analyzing the performance of network under without blackhole attack and with blackhole attack. Two scenarios are taken one is static in which no node is mobile and other one is mobility in which Random Waypoint mobility model is used. A. Static Scenario 1. ANB-AODV In this scenario, no node is movable that is these nodes are static and AODV routing protocol is used. When there is no malicious node then source node gets reply from destination node and starts transferring data packet thereby having packet delivery rato percentage upto 100 %. But when malicious node is present in the network it gives first reply to source node when source node broadcast the route request. Thus the source node will accept the first reply coming from malicious node thereby starts transferring data packets to this node due to which there is decrease in packet delivery ratio in AODV routing protocol. When ANB-AODV routing protocol is used it will reject the first reply coming from blackhole node and accept the second reply coming from original destination node thereby increasing the packet delivery ratio as shown in Fig. 8. Figure 8. PDR %age in presence of Blackhole Attack
  • 7. 235 2. AFB-AODV When there is no malicious node then source node gets reply from destination node and starts transferring data packet thereby having packet delivery ratio percentage upto 100 %. But when malicious node is present in the network, the source node gets second reply from malicious node after getting first reply from original destination node. Thus the source node will accept the second reply coming from original destination node thereby starts transferring data packets to this node due to which there is decrease in packet delivery ratio in AODV routing protocol. When AFB-AODV routing protocol is used it will reject the second reply coming from blackhole node and accept the first reply coming from original destination node thereby increasing the packet delivery ratio as shown in Fig. 9. Figure 9. PDR %age in presence of Blackhole Attack B. Mobility Scenario In this scenario all nodes are movable. Fig. 10 is showing network without blackhole attack. The mobility model used in the network is Random Waypoint Mobility model. In mobility case, in each scenario the nodes are randomly positioned and moves with different speed as depicted Fig. 11. Figure 10. Network without Blackhole Attack Figure 11. Network with Blackhole Attack
  • 8. 236 Figure 12. Average Throughput in presence of Blackhole Attack From Fig. 12, it is clear that when there is no attack in network, the average throughput is high but when there is blackhole attack in the network this throughput goes down because of packet drop by blackhole node. The average throughput is very low in case of two blackhole node in the network as compared to one blackhole node which shows that increasing blackhole node results in decreasing the average throughput of the network. When ANB-AODV or AFB-AODV is used there is increase in the average throughput which improves the performance of network. Figure 13. PDR %age in presence of Blackhole Attack From Fig. 13, it is clear that when there is no attack in network, the packet delivery ratio is high but when there is blackhole attack in the network this packet delivery ratio goes down low due to packet dropping by malicious node. The packet delivery ratio is very low in case of two blackhole node in the network as compared to one blackhole node which shows that increasing blackhole node results in decreasing the packet delivery ratio of the network. When ANB-AODV and AFB-AODV protocol is used, there is increase in the packet delivery ratio thereby improving the performance of network. Figure 14. Packet Loss %age in presence of Blackhole From Fig. 14, it is clear that when there is no attack in network, the packet loss is low but when there is blackhole attack in the network this packet loss goes up because of packet dropping by malicious node. The
  • 9. 237 packet loss ratio is very high in case of two blackhole node in the network as compared to one blackhole node which shows that increasing blackhole node results in increasing the packet loss of the network. When ANB-AODV and AFB-AODV protocol is used then there is decrease in the packet loss thus improving the performance of network. VII. CONCLUSIONS Security is important in wireless Mobile Adhoc networks as they are prone to various network threats and vulnerable to various kinds of attacks like sinkhole, wormhole, rushing attack, Black Hole attack and so on. The performance of the proposed approach under Black Hole attack has been compared with AODV under Black Hole attack. The simulation results show that the proposed approach is effective in improving the performance of the network. As a future work, we intend to propose new algorithm for the detection and prevention of blackhole attack. ACKNOWLEDGMENT I would like to take the opportunity to thank people who guided and supported me during research work. Without their contributions, this work would not have been possible. I have a great pleasure in expressing my deep sense of gratitude and indebtedness to Dr. Krishan Kumar Saluja, my supervisor for their continuous guidance and invaluable suggestions at all the time during the research work and special thanks to Shweta Gupta, my wife for helping, motivating and encouraging me during research work. REFERENCES [1] C. E. Perkins and E.M. Royer, "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and Applications, 1999. Proceedings, WMCSA '99, Second IEEE Workshop, pp.90-100, 25-26 Feb 1999. [2] C. E. Perkin, E.M.B .Royer and S. Das , “Ad hoc on-demand distance vector (AODV) routing,” IETF Internet Draft, MANET working group, Jan.2004. [3] D.S. Patil and A.M. Ghorpade, “Cope with black hole attacks in AODV protocol in MANET by end to end route discovery”, IOSR Journal of Electronics & Communication Engineering (IOSR-JECE),vol.7, pp. 21-26, 2013. [4] H. Deng, W. Li, and D.P. Agrawal, "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, Vol.40, No.10, pp. 70- 75, October 2002. [5] B. Sun, Y. Guan, J. Chen and U. Pooch,” Detecting Black-hole Attack in Mobile Ad Hoc Networks”. Paper presented at The 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, and 22-25 April 2003. [6] S. Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard ,” Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003. [7] M. Al-Shurman, S. Yoo and S.Park, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, 2004 (ACM-SE’42), Huntsville, Alabama, pp. 96-97, 2-3 April 2004. [8] L. Tamilselvan and Dr. V.Sankaranarayanan, “Prevention of Black hole Attacks in MANET”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, IEEE, 2007. [9] H. Weerasinghe and H. Fu,”Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”. Paper presented at the Future Generation Communication and Networking, Jeju- Island, Korea, 6-8 December 2007. [10] L. Tamilselvan and Dr. V. Sankaranarayanan,“Prevention of Co-operative Black Hole Attack in MANET”, Journal of Networks, Vol 3, No 5, pp. 13-20, May 2008. [11] M. Medadian, A. Mebadi, E. Shahri, "Combat with Black Hole attack in AODV routing protocol", Communications (MICC), 2009 IEEE 9th Malaysia International Conference, pp.530-535, 15-17 Dec.2009. [12] N. Mistry, D.C. Jinwala and M. Zaveri, “Improving AODV Protocol against Blackhole Attacks”, Proceedings of The International Multi Conference of Engineers and Computer Scientists 2010, Vol 2, IMECS 2010. [13] M.Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Computer Communications, 34(1), pp.107-117, 2011. [14] K. Liu and J. Deng, “An Acknowledgment Based Approach for the Detection of Routing Misbahavior in MANETS”, IEEE Transaction in Mobile Computing, Vol. 6, Vol. 5, pp.536-550, May 2007. [15] S. Gurung ,Dr. K. K. Saluja and A. Kumar, “Detection of blackhole attack in Mobile Adhoc Network”, UACEE International Journal of Advances in Computer Networks and its Security – IJCNS, Vol. 3, pp. 44-48,9 Sept 2013. [16] S. Gurung ,Dr. K. K. Saluja and A. Kumar ,”Survey of Black Hole Attack Detection in Mobile ADHOC Networks “ , Proceedings of SARC-IRAJ International Joint Conference, pp. 97-101 ,7 July 2013.