BLACK HOLE IN MANET

BLACK HOLE IN MANET
SUBMITTED TO:-Dr. SAPNA GAMBHIR
CSE DEPTT.
SUBMITTED BY:-INDRAJEET KUMAR
MNW/887/2K11
Content
Introduction to network
 Types
 Wireless network
 Mobile ad-hoc network (MANET)
 Security issues
 Attacks in MANET
 Detection & Resolving
 Query session
 Reference

Introduction
NETWORKING
Area based
LAN
WAN
MAN
Medium based
WIRED
WIRELESS
Wireless Networks

Need: Access computing and communication services, on the
move

Infrastructure-based Networks
◦ traditional cellular systems (base station infrastructure)

Wireless LANs
◦ Infrared (IrDA) or radio links (Wavelan)
◦ very flexible within the reception area; ad-hoc networks possible
◦ low bandwidth compared to wired networks (1-10 Mbit/s)

Ad hoc Networks
◦ useful when infrastructure not available, impractical, or expensive
◦ military applications, rescue, home networking
Many Applications

Personal area networking

Military environments

Civilian environments

Emergency operations
◦ cell phone, laptop, ear phone, wrist watch
◦ soldiers, tanks, planes
◦
◦
◦
◦
taxi cab network
meeting rooms
sports stadiums
boats, small aircraft
◦ search-and-rescue
◦ policing and fire fighting
Challenges in Mobile Environments

Limitations of the Wireless Network





packet loss due to transmission errors
variable capacity links
frequent disconnections/partitions
limited communication bandwidth
Limitations Imposed by Mobility
 dynamically changing topologies/routes
 lack of mobility awareness by system/applications

Limitations of the Mobile Computer
 short battery lifetime
 limited capacities
MANET (Mobile ADHOC N/W)
Introduction….
Collection of mobile wireless nodes
 Links are made & broken in arbitrarily
way.
 No fixed infrastructure
 Constrained resources
Problem…
Design a routing algorithm that are secure

Routing Protocols

Proactive protocols
◦
◦
◦
◦
Traditional distributed shortest-path protocols
Maintain routes between every host pair at all times
Based on periodic updates; High routing overhead
Example: DSDV (destination sequenced distance vector)

Reactive protocols

Hybrid protocols
◦ Determine route if and when needed
◦ Source initiates route discovery
◦ Example: DSR (dynamic source routing),AODV.
◦ Adaptive; Combination of proactive and reactive
◦ Example : ZRP (zone routing protocol)
SECURITY ISSUES IN
MANET
Security Requirements
in MANET
Threats
Availability
 Attacks
 Data Confidentiality
◦ External attacks
 Data Integrity
◦ Internal attacks
 Non-repudiation
◦ Passive attacks
◦ Active attacks

10
Attack in Manet

Active attack & passive attack
Types of attack ( cont…)

Gray hole attack:-- As soon as it receive the
packet from neighbor the attacker drop the packet.



Type of active attack.
In some other gray hole attacks the attacker node
behaves maliciously for the time until the
packets are dropped and then switch to their
normal behavior . Due this behavior it’s very
difficult for the network to figure out such kind of
attack.
Gray hole attack is also termed as node
misbehaving attack.
Types of attack (cont…)

Warm hole attack:-- Wormhole attack is a
severe attack in which two attackers placed themselves
strategically in the network. The attackers then keep on
hearing the network, record the wireless data.
BLACK HOLE ATTACK
A kind of denial of service where a
malicious node can attract all packets
by falsely claiming a fresh route to the
destination and then absorb them
without forwarding them to the
destination.
 Co operative Black hole means the
malicious nodes act in a group

Route Requests in AODV
Y
Broadcast transmission
Z
S
E
F
B
C
M
J
A
L
G
H
K
I
Represents transmission of RREQ
D
N
Route Request and Route Reply

Route Request (RREQ) includes the last known sequence number
for the destination

An intermediate node may also send a Route Reply (RREP)
provided that it knows a more recent path than the one previously
known to sender
Intermediate nodes that forward the RREP, also record the next
hop to destination



A routing table entry maintaining a reverse path is purged after a
timeout interval
A routing table entry maintaining a forward path is purged if not
used for a active_route_timeout interval
Link Failure

A neighbor of node X is considered active for a routing table entry
if the neighbor sent a packet within active_route_timeout interval
which was forwarded using that entry

Neighboring nodes periodically exchange hello message

When the next hop link in a routing table entry breaks, all active
neighbors are informed

Link failures are propagated by means of Route Error (RERR)
messages, which also update destination sequence numbers
The black hole problem in current AODV
protocol
AODV is an important on-demand routing
protocol that creates routes only when desired
by the source node.
 When a node requires a route to a destination,
it initiates a route discovery process within the
network. It broadcasts a route request (RREQ)
packet to its neighbors. (Figure 2)

The black hole problem in current AODV
protocol (cont.)
The black hole problem in current AODV
protocol (cont.)

Once the RREQ reaches the destination or an
intermediate node with a fresh enough route,
the destination or intermediate node responds
by unicasting a route reply (RREP) packet
(Figure 3) back to the neighbor from which it
first received the RREQ.
The black hole problem in current AODV
protocol (cont.)
The black hole problem in current AODV
protocol (cont.)
Any intermediate node may respond to the
RREQ message if it has a fresh enough route.
 The malicious node easily disrupts the correct
functioning of the routing protocol and make at
least part of the network crash.

The black hole problem in current AODV
protocol (cont.)
Cooperative black hole attack
Solution…

Slightly modified AODV protocol by
introducing Data Routing Information
(DRI) Table (reliability table).
Another approach…

Fidelity level:-----

Collecting responses.

Choosing a response to forward data.
Updating the fidelity level.
Receiving acknowledgement and broadcasting fidelity packets


Conclusion and future work (cont.)

In this seminar we have studied the
routing security issues of MANETs,
described the cooperative black hole
attack that can be mounted against a
MANET and proposed a feasible solution
for it in the AODV protocol.
References…
Bo Sun,Yong Guan,Jian Chen,Udo , “Detecting
Black-hole Attack in Mobile Ad Hoc Network” ,
The institute of Electrical Engineers, Printed and
published by IEEE, 2003.
 Hongmei Deng, Wei Li, and Dharma P. Agrawal,
“Routing security in Wireless Ad-hoc
Network”,IEEE Communications Magazine, Issue
40, pp 70–75,2002
 Latha Tamilselvan, Dr. V Sankaranarayanan
“Prevention of Co-operative Black Hole Attack in
MANET” JOURNAL OF NETWORKS, VOL. 3, NO. 5,

MAY 2008