Download Advances in Natural and Applied Sciences

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wake-on-LAN wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer network wikipedia , lookup

Distributed operating system wikipedia , lookup

IEEE 1355 wikipedia , lookup

Backpressure routing wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Kademlia wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
AENSI Journals
Advances in Natural and Applied Sciences
ISSN:1995-0772 EISSN: 1998-1090
Journal home page: www.aensiweb.com/ANAS
Performance Evaluation of Aodv Routing Protocol Under Black Hole Attack
1
Dr. K. Selvakumar, 2N.Malarvizhi and 3V. Senthil Murugan
1
Associate Professor, Dept. of CSE, Faculty of Engineering & Technology, Annamalai University, Tamil Nadu. India.
PG student, Dept. of CSE, Faculty of Engineering & Technology , Annamalai University, Tamil Nadu. India.
3
Research Scholar, Dept. of CSE, Faculty of Engineering & Technology, Annamalai University, Tamil Nadu. India.
2
ARTICLE INFO
Article history:
Received 12 October 2014
Received in revised form 26 December
2014
Accepted 1 January 2015
Available online 25 February 2015
Keywords:
Routing protocols
AODV
RREQ
RREP
RERR
Black hole Attack
Malicious Node
ABSTRACT
In MANET, black hole is an attack in which a node shows malicious behavior by
claiming false RREP message to the source node and correspondingly malicious node
drops all the receiving packets. The main objective of the work is to analyze the
performance of AODV against various black hole nodes. Due to security vulnerabilities
of the routing protocols, wireless ad hoc networks may be unprotected against attacks
by the malicious nodes. One of these attacks is the Black Hole Attack against network
integrity absorbing all data packets in the network. Since the data packets do not reach
the destination node on account of this attack, data loss will occur. In this work,
simulation study of network is done under black hole attack. It is difficult to detect
black hole attack because nodes can drop packets partially and behaves like a normal
honest node. This work presents the impact of black hole problem in MANET and its
enhancement to detect the black hole using the Reply Arrival Time Based Approach.
This attack is implemented over the MANET and simulated using NS2. Performance is
evaluated from the parameters such as Packet Delivery Ratio and End-To-End Delay.
© 2015 AENSI Publisher All rights reserved.
To Cite This Article: Dr. K. Selvakumar, N.Malarvizhi and V. Senthil Murugan., Performance Evaluation of Aodv Routing Protocol Under
Black Hole Attack. Adv. in Nat. Appl. Sci., 9(6): 150-155, 2015
INTRODUCTION
MANET is an independent system of mobile routers attached by wireless links. Nodes are free to enter and
leave from the networks at any place and any time. With this node mobility, network topologies constantly
change (Sun, B., 2003). These changes cause frequent route breaks and force sources to re-establish or maintain
connections to their distant Communication partners (Ayyasamy and K. Venkatachalapathy, 2014).
MANETs have some special characteristic features such as unreliable wireless links used for
communication between hosts, constantly changing network topologies, limited bandwidth, battery power, low
computation power etc (Sachin Dnyandeoz Ubarhande, 2012).
There are many routing protocols are used in mobile ad hoc networks (MANET) to update the routing
information (Deng, H., 2002). They are broadly classified into Proactive routing protocol (or table driven),
Reactive routing protocol (on demand) and hybrid routing protocols (Vishnu, K. and Amos J. Paul, 2010). The
proactive routing protocols are established the routers in advance. Reactive routing protocol creates routes only
on demand and do not try to maintain an overview over the network (Vani, A. and D. Sreenivasa Rao, 2008).
In MANET, nodes use some routing protocols such as AODV (Ad-hoc On-Demand Distance Vector), DSR
(Dynamic Source Routing).each node also acts as a router to discover a path and forward packets from source to
destination node in the network (Akansha saini and HARISH Kumar, 2002). From the view of security aspects
of wireless ad-hoc networks due to lack of an infrastructure, they are exposed to a lot of attacks(Vishnu, K. and
Amos J. Paul, 2010). One of these attacks is the Black Hole attack.
Related Work:
Deng H., Li W. and Agrawal, D.P (Deng, H., 2002) The author discusses a protocol that requires the
intermediate nodes to send RREP message along with the next hop information. When the source node gets this
information, it sends a RREQ to the next hop to verify that the target node (i.e. the node that just sent back the
RREP packet) indeed has a route to the intermediate node and to the destination. When the next hop receives a
Further Request, it sends a Further Reply which includes the check result to the source node. After receiving
Corresponding Author: Dr. K. Selvakumar, Associate Professor, Dept. of CSE, Faculty of Engineering & Technology,
Annamalai University, Tamil Nadu. India.
151
Dr. K. Selvakumar et al, 2015
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
RREP, the source node will again send RREQ to the node specified as next hop in the received RREP.
However, this increases the routing overhead and end-to-end delay.
Alem, Y.F, Zhao Cheng Xuan (2010) This work proposed a solution based on Intrusion Detection using
Anomaly Detection (IDAD). It prevents both attacks by single and multiple black hole nodes. IDAD assumes
every activity of a user can be monitored and anomaly activities of an intruder can be identified from normal
activities. To find a black hole node IDAD needs to be provided with a pre-collected set of anomaly activities,
called audit data. Once audit data collected and it is given to the IDAD system, which is able to compare every
activity with audit data. If any activity of a node is out of the activity listed in the audit data, the IDAD system
isolates the particular node from the network.
B. Sun; Y. Guan; J. Chen; U.W. Pooch (2003) A neighborhood-based method to detect the intruder and a
routing recovery protocol to set up a correct path to the true destination are devised. They first introduced the
neighbor set of a node, which is all of the nodes that are within the radio transmission range of a node. One
disadvantage of this scheme is that there must be a public key infrastructure or the detection is still vulnerable.
A. Patcha and A. Mishra (2003) in this work, proposed a collaborative method for black hole attack
prevention. A watchdog method is introduced to incorporate a collaborative architecture to tackle collusion
amongst nodes. In this algorithm, nodes in the network are classified into trusted, watchdog, and ordinary nodes.
Every watchdog that is elected should observe its normal node neighbors and decide whether they can be treated
as trusted or malicious.
Vishnu K, Amos J Paul.(2010) in this proposed method is to list out the set of malicious nodes locally at
each node whenever they act as a source node. As mentioned in the Assumption our protocol uses the concept of
Core Maintenance of the Allocation Table ie, whenever a new node joins the network, it sends a broadcast
message as a request for IP address. The backbone node on receiving this message randomly selects one of the
free IP addresses. The new node on receiving the allotted IP address sends an acknowledgement to the BBN.The
BBN on receiving the RIP answers to the source node with one of the unused IP addresses selected randomly
out of the pool of unused IP addresses. The source node sends the RREQ for both the destination and the RIP
simultaneously. However in case the SN gets an RREP for the RIP, then it means that, there is a black hole in
that route.
Hizbullah Khatt ak, Ni-zamuddin, Fahad Khurshid, Noor ul Amin proposed a solution that prevents black
and gray-hole attacks by discarding the first and selecting the second shortest path for data packets transmission.
First, it prevents gray-hole attacks by selecting the safe and secure route for data packets transmission. When
source node receives RREP messages from different nodes connected with destination, it just discards the first
RREP message coming from any intermediate node connected with destination for the avoidance of black /gray
hole.This solution avoids black hole / gray hole attacks in such a way that by using the second shortest path for
data packets transmission, it would be hard for black hole or gray hole node to monitor the entire network to
know where to place itself in a network and mislead the source node that it has the second shortest route to the
destination.
2.Methodology:
In this section, the proposed system presents reply arrival time-based method used to detect the black hole
nodes (malicious nodes, misbehaving nodes) in the mobile ad hoc network (MANET).The proposed system is
divided into four modules.
2.1 AODV Routing Protocol.
2.2 Attack Description.
2.3 Detection of Black hole Attack.
2.4 Performance Evaluation.
2.1 Aodv Routing Protocol:
The Ad-Hoc On-Demand Distance Vector routing protocol is a reactive routing protocol (Patcha, A. and A.
Mishra, 2003). AODV routing protocol uses on-demand approach for finding routes, that is, a route is
established only when it is required by a source node for transmitting data packets. In Aodv, Route discovery
process is initiated by the source node broadcasting a route request message (RREQ) to all its neighbor nodes
(Ingo Gruber, 2004). The Route request (RREQ) packet contains the following field:
 Source IP address
 Source sequence number
 Broadcast id
 Destination IP address
 Destination sequence number
 Next Hop
If the RREQ reaches the destination node or a node that has a route to the destination, the node sends a
route reply message (RREP) to the source. If a node cannot satisfy the RREQ, it keeps track of the reverse path
152
Dr. K. Selvakumar et al, 2015
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
setup as well as forward path setup that will accompany the transmission of the eventual RREP (Vishnu, K. and
Amos J. Paul, 2010). The Route reply (RREP) packet contains the following field:
 Destination IP address

Source IP address

Broadcast id

Expiration time for reverse path route entry

Source node's sequence number.
In case if a node realizes that the route is damaged or broken it transmits a route error (RERR) message to
the source . The simulation of black hole attack in ad hoc wireless is carried out using AODV protocol.
2.2 Attack Description
Black hole problem in MANETS is a serious security problem to be solved. In this problem, a malicious
node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants
to intercept. This malicious node then can choose whether to drop the packets to perform a denial-of-service
attack or to use its place on the route as the first step in a man-in-the-middle attack.
In the figure 3.2, consider a malicious node M. When node 1 broadcasts a RREQ packet; nodes 2, 4 and M
receive it[V]. Node M, being a malicious node, does not check up with its routing table for the requested route
to node 5. Hence, it immediately sends back a false RREP packet, claiming a shortest route to the 1 Receives the
RREP from M ahead of the RREP from 2 and 4.Node 1 assumes that the route through M is the shortest route
and sends data packets to the destination through it. When the node 1 sends data to M, it absorbs all the data and
drops this data (Vishnu, K. and Amos J. Paul, 2010; Sun, B., 2003). As this data cannot reach to the destination,
it is called as a Black hole attack.
2
1
M
4
X
5
6
Fig. 3.2: Black-hole attack.
2.3 Detection Of Blackhole Attack:
The detection scheme uses on a reply arrival time-based method to recognize the black hole attack, and a
routing recovery protocol to build the correct path. In detection mechanism source predicts the destination
location and calculates the expected reply time. The expected reply time increased with increases of number
distance between the source and destination. If attacker is present in the network, immediately source is received
the route reply from the attacker. After receiving RREP, source compares the RREP time with the expected
RREP time.
2.4 Performance Evaluation
Performance Metrics:
Packet Delivery Ratio:
 PDR is the proportion to the total amount of packets reached the receiver and amount of packet sent by
source. If the amount of malicious node increases, PDR decreases. The higher mobility of nodes causes PDR to
decrease.
PDR(%) =
End-to-End Delay:
 End-to-End delay is the time taken for a packet to reach the destination from the source node.
Delay (ms) =
153
Dr. K. Selvakumar et al, 2015
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
Results:
In this simulation, a detection scheme is proposed which uses on a reply arrival time-based method to
recognize the black hole attack, and a routing recovery protocol to build the correct path. In detection
mechanism source predicts the destination location and calculates the expected reply time. The expected reply
time increased with increases of number distance between the source and destination. If attacker is present in the
network, immediately source is received the route reply from the attacker. After receiving RREP, source
compares the RREP time with the expected RREP time.
AODV Routing Without Attack:
Here node 5 is the source node and node 16 is the destination node.
Black hole Attack:
Source node 5 broadcast request packet to the network. Reply arrived from the destination node 16 via the
shortest path. Source node 5 transfers the data over the path in which reply arrived to the destination node 16.
The attacker node5 send false route reply that it contains shortest route to destination node16. Attacker
node5 does not forward the packet to the destination node 16.
.
154
Dr. K. Selvakumar et al, 2015
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
4 .Discussion:
Number of Nodes Vs PDR:
In this graph, x-axis represents the no. of nodes and y-axis represents the packet delivery ratio (%). Red line
plot denotes the packet delivery ratio when one black hole node is present in the network. Green line plot
denotes the packet delivery ratio when zero black hole node is present in the network. The above graph is
generated for the simulation area and the number of nodes is 20.
Number of Nodes Vs Delay:
In this graph, x-axis represents the no. of nodes and y-axis represents the Delay (%). Red line plot denotes
the delay when one black hole node is present in the network. Green line plot denotes the delay when zero black
hole node is present in the network. Due to the attacker, the delay will be low. The above graph is generated for
the simulation area and the number of nodes is 20.
5. Conclusion:
The proposed detection mechanism can perform a routing recovery protocol to build the correct path. This
work contributes a reply arrival time-based method to detect the black hole attacks. It also provides the
mechanism for secure MANET from Black hole attacks. Through simulation, it further confirms that with the
increase in the number of black hole nodes, the performance of the network degrades and also the effect of black
hole attack is more severe with the variation in simulation time. Performance evaluation is done based on the
results of the simulation done using ns2. From the results it is proved that the black hole attack can have a very
severe effect on the network.
REFERENCES
Akansha saini and HARISH Kumar, 2002. Effect of black hole attack on AODV routing protocol in
MANET. UIET, Punjab University Chandigarh, 66-80.
Alem, Y., F. Zhao Cheng Xuan, 2010. Preventing black hole attack in mobile ad-hoc networks using
Anomaly Detection. 2nd International Conference on Future Computer and Communication (ICFCC), 3(3): 21-2.
Ayyasamy and K. Venkatachalapathy, 2014. Context Aware Adaptive Fuzzy based QoS Routing Scheme
for Streaming Services over MANETs.Wireless Networks(Springer), 20(6).
Deng, H., W. Li, D.P. Agrawal, 2002. Routing security in wireless ad hoc networks. Communications
Magazine, IEEE, 40(10): 70- 75.
Defrawy, K. El and G. Tsudik, 2007. Alarm: Anonymous location-aided routing in suspicious MANETs.
304–313.
155
Dr. K. Selvakumar et al, 2015
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155
Hizbullah Khatt Ak., Ni-zamuddin, Fahad Khurshid and Noor ul Amin, 2013. Preventing Black and Gray
Hole Attacks in AODV using Optimal Path Routing and Hash. IEEE.
Ingo Gruber, Oliver Knauf and Hui Li, 2004. Performance of Ad Hoc Routing Protocols in Urban
Environments, 50-65.
Patcha, A. and A. Mishra, 2003. Collaborative security architecture for black hole attack prevention in
mobile ad hoc networks. Radio and Wireless Conference, 75-78.
Perkins, C., E. and E.M. Royer, 1999.Ad-hoc on Demand Distance Vector Routing. Proc. workshop mobile
computing system and applications, 90-100.
Sun, B., Guan, Y.J. Chen and U.W. Pooch, 2003. Detecting Black-hole Attack in Mobile Ad Hoc
Networks. 5th European Personal Mobile Communications Conference, 490-495.
Sachin Dnyandeoz Ubarhande, 2012. Performance Evolution of AODV and DSR Routing Protocols in
MANET Using NS2. International Journal of Scientific & Engineering Research, 3(5): 10-25.
Teerawat Issariyakul, and Ekram Hossain, 2009. Introduction to Network Simulator NS2.Springer.
The network simulator NS-2, [Online]. Available: http://www.isi.edu/nsnam/ns/.
Vishnu, K. and Amos J. Paul, 2010. Detection and Removal of Cooperative Black/Gray hole attack in
Mobile ADHOC Networks. International Journal of Computer Applications, 1(22).
Vani, A. and D. Sreenivasa Rao, 2008. Removal of Black hole Attack in Ad Hoc Wireless Networks to
provide confidentiality security service. JNTU Hyderabad, Andhra Pradesh, India, 40-50.