* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Advances in Natural and Applied Sciences
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Distributed operating system wikipedia , lookup
Backpressure routing wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/ANAS Performance Evaluation of Aodv Routing Protocol Under Black Hole Attack 1 Dr. K. Selvakumar, 2N.Malarvizhi and 3V. Senthil Murugan 1 Associate Professor, Dept. of CSE, Faculty of Engineering & Technology, Annamalai University, Tamil Nadu. India. PG student, Dept. of CSE, Faculty of Engineering & Technology , Annamalai University, Tamil Nadu. India. 3 Research Scholar, Dept. of CSE, Faculty of Engineering & Technology, Annamalai University, Tamil Nadu. India. 2 ARTICLE INFO Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 January 2015 Available online 25 February 2015 Keywords: Routing protocols AODV RREQ RREP RERR Black hole Attack Malicious Node ABSTRACT In MANET, black hole is an attack in which a node shows malicious behavior by claiming false RREP message to the source node and correspondingly malicious node drops all the receiving packets. The main objective of the work is to analyze the performance of AODV against various black hole nodes. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this work, simulation study of network is done under black hole attack. It is difficult to detect black hole attack because nodes can drop packets partially and behaves like a normal honest node. This work presents the impact of black hole problem in MANET and its enhancement to detect the black hole using the Reply Arrival Time Based Approach. This attack is implemented over the MANET and simulated using NS2. Performance is evaluated from the parameters such as Packet Delivery Ratio and End-To-End Delay. © 2015 AENSI Publisher All rights reserved. To Cite This Article: Dr. K. Selvakumar, N.Malarvizhi and V. Senthil Murugan., Performance Evaluation of Aodv Routing Protocol Under Black Hole Attack. Adv. in Nat. Appl. Sci., 9(6): 150-155, 2015 INTRODUCTION MANET is an independent system of mobile routers attached by wireless links. Nodes are free to enter and leave from the networks at any place and any time. With this node mobility, network topologies constantly change (Sun, B., 2003). These changes cause frequent route breaks and force sources to re-establish or maintain connections to their distant Communication partners (Ayyasamy and K. Venkatachalapathy, 2014). MANETs have some special characteristic features such as unreliable wireless links used for communication between hosts, constantly changing network topologies, limited bandwidth, battery power, low computation power etc (Sachin Dnyandeoz Ubarhande, 2012). There are many routing protocols are used in mobile ad hoc networks (MANET) to update the routing information (Deng, H., 2002). They are broadly classified into Proactive routing protocol (or table driven), Reactive routing protocol (on demand) and hybrid routing protocols (Vishnu, K. and Amos J. Paul, 2010). The proactive routing protocols are established the routers in advance. Reactive routing protocol creates routes only on demand and do not try to maintain an overview over the network (Vani, A. and D. Sreenivasa Rao, 2008). In MANET, nodes use some routing protocols such as AODV (Ad-hoc On-Demand Distance Vector), DSR (Dynamic Source Routing).each node also acts as a router to discover a path and forward packets from source to destination node in the network (Akansha saini and HARISH Kumar, 2002). From the view of security aspects of wireless ad-hoc networks due to lack of an infrastructure, they are exposed to a lot of attacks(Vishnu, K. and Amos J. Paul, 2010). One of these attacks is the Black Hole attack. Related Work: Deng H., Li W. and Agrawal, D.P (Deng, H., 2002) The author discusses a protocol that requires the intermediate nodes to send RREP message along with the next hop information. When the source node gets this information, it sends a RREQ to the next hop to verify that the target node (i.e. the node that just sent back the RREP packet) indeed has a route to the intermediate node and to the destination. When the next hop receives a Further Request, it sends a Further Reply which includes the check result to the source node. After receiving Corresponding Author: Dr. K. Selvakumar, Associate Professor, Dept. of CSE, Faculty of Engineering & Technology, Annamalai University, Tamil Nadu. India. 151 Dr. K. Selvakumar et al, 2015 Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 RREP, the source node will again send RREQ to the node specified as next hop in the received RREP. However, this increases the routing overhead and end-to-end delay. Alem, Y.F, Zhao Cheng Xuan (2010) This work proposed a solution based on Intrusion Detection using Anomaly Detection (IDAD). It prevents both attacks by single and multiple black hole nodes. IDAD assumes every activity of a user can be monitored and anomaly activities of an intruder can be identified from normal activities. To find a black hole node IDAD needs to be provided with a pre-collected set of anomaly activities, called audit data. Once audit data collected and it is given to the IDAD system, which is able to compare every activity with audit data. If any activity of a node is out of the activity listed in the audit data, the IDAD system isolates the particular node from the network. B. Sun; Y. Guan; J. Chen; U.W. Pooch (2003) A neighborhood-based method to detect the intruder and a routing recovery protocol to set up a correct path to the true destination are devised. They first introduced the neighbor set of a node, which is all of the nodes that are within the radio transmission range of a node. One disadvantage of this scheme is that there must be a public key infrastructure or the detection is still vulnerable. A. Patcha and A. Mishra (2003) in this work, proposed a collaborative method for black hole attack prevention. A watchdog method is introduced to incorporate a collaborative architecture to tackle collusion amongst nodes. In this algorithm, nodes in the network are classified into trusted, watchdog, and ordinary nodes. Every watchdog that is elected should observe its normal node neighbors and decide whether they can be treated as trusted or malicious. Vishnu K, Amos J Paul.(2010) in this proposed method is to list out the set of malicious nodes locally at each node whenever they act as a source node. As mentioned in the Assumption our protocol uses the concept of Core Maintenance of the Allocation Table ie, whenever a new node joins the network, it sends a broadcast message as a request for IP address. The backbone node on receiving this message randomly selects one of the free IP addresses. The new node on receiving the allotted IP address sends an acknowledgement to the BBN.The BBN on receiving the RIP answers to the source node with one of the unused IP addresses selected randomly out of the pool of unused IP addresses. The source node sends the RREQ for both the destination and the RIP simultaneously. However in case the SN gets an RREP for the RIP, then it means that, there is a black hole in that route. Hizbullah Khatt ak, Ni-zamuddin, Fahad Khurshid, Noor ul Amin proposed a solution that prevents black and gray-hole attacks by discarding the first and selecting the second shortest path for data packets transmission. First, it prevents gray-hole attacks by selecting the safe and secure route for data packets transmission. When source node receives RREP messages from different nodes connected with destination, it just discards the first RREP message coming from any intermediate node connected with destination for the avoidance of black /gray hole.This solution avoids black hole / gray hole attacks in such a way that by using the second shortest path for data packets transmission, it would be hard for black hole or gray hole node to monitor the entire network to know where to place itself in a network and mislead the source node that it has the second shortest route to the destination. 2.Methodology: In this section, the proposed system presents reply arrival time-based method used to detect the black hole nodes (malicious nodes, misbehaving nodes) in the mobile ad hoc network (MANET).The proposed system is divided into four modules. 2.1 AODV Routing Protocol. 2.2 Attack Description. 2.3 Detection of Black hole Attack. 2.4 Performance Evaluation. 2.1 Aodv Routing Protocol: The Ad-Hoc On-Demand Distance Vector routing protocol is a reactive routing protocol (Patcha, A. and A. Mishra, 2003). AODV routing protocol uses on-demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets. In Aodv, Route discovery process is initiated by the source node broadcasting a route request message (RREQ) to all its neighbor nodes (Ingo Gruber, 2004). The Route request (RREQ) packet contains the following field: Source IP address Source sequence number Broadcast id Destination IP address Destination sequence number Next Hop If the RREQ reaches the destination node or a node that has a route to the destination, the node sends a route reply message (RREP) to the source. If a node cannot satisfy the RREQ, it keeps track of the reverse path 152 Dr. K. Selvakumar et al, 2015 Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 setup as well as forward path setup that will accompany the transmission of the eventual RREP (Vishnu, K. and Amos J. Paul, 2010). The Route reply (RREP) packet contains the following field: Destination IP address Source IP address Broadcast id Expiration time for reverse path route entry Source node's sequence number. In case if a node realizes that the route is damaged or broken it transmits a route error (RERR) message to the source . The simulation of black hole attack in ad hoc wireless is carried out using AODV protocol. 2.2 Attack Description Black hole problem in MANETS is a serious security problem to be solved. In this problem, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. This malicious node then can choose whether to drop the packets to perform a denial-of-service attack or to use its place on the route as the first step in a man-in-the-middle attack. In the figure 3.2, consider a malicious node M. When node 1 broadcasts a RREQ packet; nodes 2, 4 and M receive it[V]. Node M, being a malicious node, does not check up with its routing table for the requested route to node 5. Hence, it immediately sends back a false RREP packet, claiming a shortest route to the 1 Receives the RREP from M ahead of the RREP from 2 and 4.Node 1 assumes that the route through M is the shortest route and sends data packets to the destination through it. When the node 1 sends data to M, it absorbs all the data and drops this data (Vishnu, K. and Amos J. Paul, 2010; Sun, B., 2003). As this data cannot reach to the destination, it is called as a Black hole attack. 2 1 M 4 X 5 6 Fig. 3.2: Black-hole attack. 2.3 Detection Of Blackhole Attack: The detection scheme uses on a reply arrival time-based method to recognize the black hole attack, and a routing recovery protocol to build the correct path. In detection mechanism source predicts the destination location and calculates the expected reply time. The expected reply time increased with increases of number distance between the source and destination. If attacker is present in the network, immediately source is received the route reply from the attacker. After receiving RREP, source compares the RREP time with the expected RREP time. 2.4 Performance Evaluation Performance Metrics: Packet Delivery Ratio: PDR is the proportion to the total amount of packets reached the receiver and amount of packet sent by source. If the amount of malicious node increases, PDR decreases. The higher mobility of nodes causes PDR to decrease. PDR(%) = End-to-End Delay: End-to-End delay is the time taken for a packet to reach the destination from the source node. Delay (ms) = 153 Dr. K. Selvakumar et al, 2015 Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 Results: In this simulation, a detection scheme is proposed which uses on a reply arrival time-based method to recognize the black hole attack, and a routing recovery protocol to build the correct path. In detection mechanism source predicts the destination location and calculates the expected reply time. The expected reply time increased with increases of number distance between the source and destination. If attacker is present in the network, immediately source is received the route reply from the attacker. After receiving RREP, source compares the RREP time with the expected RREP time. AODV Routing Without Attack: Here node 5 is the source node and node 16 is the destination node. Black hole Attack: Source node 5 broadcast request packet to the network. Reply arrived from the destination node 16 via the shortest path. Source node 5 transfers the data over the path in which reply arrived to the destination node 16. The attacker node5 send false route reply that it contains shortest route to destination node16. Attacker node5 does not forward the packet to the destination node 16. . 154 Dr. K. Selvakumar et al, 2015 Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 4 .Discussion: Number of Nodes Vs PDR: In this graph, x-axis represents the no. of nodes and y-axis represents the packet delivery ratio (%). Red line plot denotes the packet delivery ratio when one black hole node is present in the network. Green line plot denotes the packet delivery ratio when zero black hole node is present in the network. The above graph is generated for the simulation area and the number of nodes is 20. Number of Nodes Vs Delay: In this graph, x-axis represents the no. of nodes and y-axis represents the Delay (%). Red line plot denotes the delay when one black hole node is present in the network. Green line plot denotes the delay when zero black hole node is present in the network. Due to the attacker, the delay will be low. The above graph is generated for the simulation area and the number of nodes is 20. 5. Conclusion: The proposed detection mechanism can perform a routing recovery protocol to build the correct path. This work contributes a reply arrival time-based method to detect the black hole attacks. It also provides the mechanism for secure MANET from Black hole attacks. Through simulation, it further confirms that with the increase in the number of black hole nodes, the performance of the network degrades and also the effect of black hole attack is more severe with the variation in simulation time. Performance evaluation is done based on the results of the simulation done using ns2. From the results it is proved that the black hole attack can have a very severe effect on the network. REFERENCES Akansha saini and HARISH Kumar, 2002. Effect of black hole attack on AODV routing protocol in MANET. UIET, Punjab University Chandigarh, 66-80. Alem, Y., F. Zhao Cheng Xuan, 2010. Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection. 2nd International Conference on Future Computer and Communication (ICFCC), 3(3): 21-2. Ayyasamy and K. Venkatachalapathy, 2014. Context Aware Adaptive Fuzzy based QoS Routing Scheme for Streaming Services over MANETs.Wireless Networks(Springer), 20(6). Deng, H., W. Li, D.P. Agrawal, 2002. Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10): 70- 75. Defrawy, K. El and G. Tsudik, 2007. Alarm: Anonymous location-aided routing in suspicious MANETs. 304–313. 155 Dr. K. Selvakumar et al, 2015 Advances in Natural and Applied Sciences, 9(6) Special 2015, Pages: 150-155 Hizbullah Khatt Ak., Ni-zamuddin, Fahad Khurshid and Noor ul Amin, 2013. Preventing Black and Gray Hole Attacks in AODV using Optimal Path Routing and Hash. IEEE. Ingo Gruber, Oliver Knauf and Hui Li, 2004. Performance of Ad Hoc Routing Protocols in Urban Environments, 50-65. Patcha, A. and A. Mishra, 2003. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. Radio and Wireless Conference, 75-78. Perkins, C., E. and E.M. Royer, 1999.Ad-hoc on Demand Distance Vector Routing. Proc. workshop mobile computing system and applications, 90-100. Sun, B., Guan, Y.J. Chen and U.W. Pooch, 2003. Detecting Black-hole Attack in Mobile Ad Hoc Networks. 5th European Personal Mobile Communications Conference, 490-495. Sachin Dnyandeoz Ubarhande, 2012. Performance Evolution of AODV and DSR Routing Protocols in MANET Using NS2. International Journal of Scientific & Engineering Research, 3(5): 10-25. Teerawat Issariyakul, and Ekram Hossain, 2009. Introduction to Network Simulator NS2.Springer. The network simulator NS-2, [Online]. Available: http://www.isi.edu/nsnam/ns/. Vishnu, K. and Amos J. Paul, 2010. Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC Networks. International Journal of Computer Applications, 1(22). Vani, A. and D. Sreenivasa Rao, 2008. Removal of Black hole Attack in Ad Hoc Wireless Networks to provide confidentiality security service. JNTU Hyderabad, Andhra Pradesh, India, 40-50.