Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
1. Performance Analysis of AODVPerformance Analysis of AODV
Protocol on Black holeProtocol on Black hole
AttacksAttacks
Presented by:-
Ashok Panwar
Technical Officer in ECIL
1
2. ContentContent
Introduction.
What is AODV Protocol?
Why We Use AODV Protocol.
Security On AODV Protocol.
Attacks On AODV Protocol.
What is DDOS Attacks?
What is Black Hole Attack?
Caused of Black Hole Attack.
Conclusion
Presented by :- Ashok Panwar
Technical Officer in ECIL 2
3. IntroductionIntroduction
Wireless ad-hoc networks are composed of
autonomous nodes that are self- managed without
any infrastructure. In this way, ad-hoc networks
have a dynamic topology such that nodes can
easily join or leave the network at any time. Ad-
hoc networks are suitable for areas where it is not
possible to set up a fixed infrastructure. Since the
nodes communicate with each other without an
infrastructure, they provide the connectivity by
forwarding packets over themselves. To support
this connectivity, nodes use some routing
protocols such as AODV, DSR and DSDV.
Presented by :- Ashok Panwar
Technical Officer in ECIL 3
4. What is AODV Protocol?What is AODV Protocol?
Ad-hoc On-Demand Distance Vector
(AODV) is an on demand routing protocol.
which is used to find a route between the
source and destination node as needed.
It uses control messages such as Route
Request (RREQ),and Route Reply (RREP)
for establishing a path from the source to the
destination.
Presented by :- Ashok Panwar
Technical Officer in ECIL 4
5. Why We Use AODV Protocol?Why We Use AODV Protocol?
We select AODV protocol because, AODV
is capable of both unicast and multicast
routing. It is a reactive routing protocol.
AODV avoids the counting to infinity
problem of other distance-vector protocols.
AODV protocol is a flat routing protocol it
does not need any central administrative
system to handle the routing process.
Presented by :- Ashok Panwar
Technical Officer in ECIL 5
6. Security Design Issues in AODVSecurity Design Issues in AODV
AODV do not have any centrally
administered secure routers
Attackers from inside or outside can easily exploit the
network.
Passive eavesdropping, data tampering, active
interfering, leakage of secret information, DoS etc.
Shared Wireless Medium.
Dynamic Topology.
Presented by :- Ashok Panwar
Technical Officer in ECIL 6
7. Attacks On AODV ProtocolAttacks On AODV Protocol
Known attacks on AODV are:
DDOS attack
Traffic redirection by modification
Replay attacks
Loop formation by spoofing
False route error.
Presented by :- Ashok Panwar
Technical Officer in ECIL 7
8. What Is DDOS Attacks?What Is DDOS Attacks?
Distributed Denial of Service (DDoS)
attacks involve breaking in to hundreds or
thousands of machines, so for this reason,
this attack called Distributed. This kind of
attack, consume more bandwidth and uses
more sources in network. One of the most
important attacks of DDoS attacks category
is Black hole attack.
Presented by :- Ashok Panwar
Technical Officer in ECIL 8
9. What Is Black Hole Attack?What Is Black Hole Attack?
A black hole attack is a severe attack that
can be easily employed against routing in
mobile ad hoc networks. A black hole is a
malicious node that falsely replies for any
route requests without having active route to
specified destination and drops all the
receiving packets. If these malicious nodes
work together as a group then the damage
will be very serious.
Presented by :- Ashok Panwar
Technical Officer in ECIL 9
10. Caused Of Black Hole AttackCaused Of Black Hole Attack
Black hole attacks in AODV protocol
routing level can be classified into two
categories:
o RREQ Blackhole attack and
o RREP Blackhole attack.
Black hole attack caused by RREQ:
When a node requires a route to a
destination, it initiates a route discovery
process within the network. It broadcasts a
route request (RREQ) packet to its
neighbors. (Figure 1)
Presented by :- Ashok Panwar
Technical Officer in ECIL 10
11. Caused Of Black Hole AttackCaused Of Black Hole Attack
(Cont..)(Cont..)
Fig1: Propagation of RREQ
Presented by :- Ashok Panwar
Technical Officer in ECIL 11
12. Caused Of Black Hole AttackCaused Of Black Hole Attack
(Cont..)(Cont..)
Black hole attack caused by RREP:
Once the RREQ reaches the destination or an
intermediate node with a fresh enough route, the
destination or intermediate node responds by
unicasting a route reply (RREP) packet (Figure 2)
back to the neighbor from which it first received
the RREQ.
Presented by :- Ashok Panwar
Technical Officer in ECIL 12
13. Caused Of Black Hole AttackCaused Of Black Hole Attack
(Cont..)(Cont..)
Fig2: The path of a route reply
Presented by :- Ashok Panwar
Technical Officer in ECIL 13
14. ConclusionConclusion
The performance of routing protocols
AODV depends heavily on much kind of
attacks. One of these attacks is Black hole
attack. This attack has high effect on AODV
protocol. I want to show the performance of
AODV protocol when it is effected by the
black hole attack. I use network simulator-
2(NS-2) to show the performance of AODV
protocol during black hole attack.
Presented by :- Ashok Panwar
Technical Officer in ECIL 14