Enhanced AODV to Counter Black hole Attacks in MANET Deepthi V S* Mrs. Bharathi M Department of CSE, SJCIT, VTU [email protected] Department of CSE, SJCIT, VTU [email protected] Abstract- Wireless networks are gaining popularity to its peak today, as the users want wireless operates without the use of external infrastructure. But the proliferation of such MANET based connectivity irrespective of their geographic position. MANETs are best suited for emergency situations as they facilitate fully distributed, self-maintainable dynamic topology networks that applications are limited as its features impart high applicability, yet they manifest unreliability. Another cause of unreliability is the mutual intrinsic trust during communication. One such attack exploiting this trustworthiness is called the Black Hole attack wherein the Black Hole in the network promises routing of the data packet to the destination while in actuality it drops them hence decreasing reliability. Black hole attack is one of the security threats in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. The aim of this paper is to detect and prevent the effects of Black hole attack in MANET using Reactive routing protocol like Ad-Hoc on Demand Distance Vector (AODV) and analyse MANETs under single and collaborative Black Hole attack and prevent it by diverting traffic from the Black Hole. The proposed method is based on sending confirmation packets that are verified by the destination to check for Black Hole presence in the proposed AODV routing protocol and encrypt the data before sending it to destination. The proposed AODV algorithm was then simulated in static node environment and it was observed that its data delivery ratio is significantly better than the conventional AODV. Keywords— Black Hole, AODV, MANETs, Security, Reliability, Routing I. INTRODUCTION This A MANET is a self-configuring, distributed, dynamic network in which the nodes are mobile and communication is not via fixed access points. Since they act as open medium any node in space can be a part. MANETs have a huge applicability potential as they have the potential to be anywhere anytime. [1] Although the features of MANETs attract huge applicability, they also manifest vulnerability. This vulnerability to attacks imposes unreliability, a condition that cannot be compromised especially in emergency situations. There are a variety of attacks that the MANETs are exposed to. These attacks can be classified as active and passive attacks. In active attacks the adversary breaks into the system and is able to insert and capture transmissions thus modifying or corrupting the data whereas in passive attacks the adversary merely listens to the traffic and extracts information from the transmissions. The increasing rate and extent of black hole attacks raise concerns for a defensive mechanism that has the properties of being preventive as well as curative. Therefore this project is an attempt to defend against “Black hole” attack that compromises reliability of the networks by dropping all data packets routed towards them. Black hole attack is one of the security threats in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. Previously the works done on security issues i.e. attack (Black Hole attack) involved in MANET were based on different routing protocol. Black Hole attack is studied under the AODV routing protocol and its effects are elaborated by stating how this attack disrupt the performance of MANET. Very little attention has been given to the fact to study the impact of Black Hole attack in MANET using Reactive protocol like AODV and the proposed enhanced AODV, to compare the vulnerability of both these protocols against the attack. II. MANETS- LITERATURE SURVEY Mobile Ad-Hoc Network is the rapid growing technology from the past 20 years. The gain in their popularity is because of the ease of deployment, infrastructure less and their dynamic nature. MANETs created a new set of demands to be implemented and to provide efficient better end-to-end communication. MANETs works on TCP/IP structure to provide the means of communication between communicating work stations. Work stations are mobile and they have limited resources, therefore the traditional TCP/IP model needs to be refurbished or modified, in order to compensate the MANETs mobility to provide efficient functionality. Therefore the key research area for the researchers is routing in any network. Routing protocols in MANETs are a challenging and attractive tasks, researchers are giving tremendous amount of attention to this key area. Classification of MANETs Routing Protocols: Routing protocols in MANETs are classified into three different categories according to their functionality 1. Reactive protocols 2. Proactive protocols 3. Hybrid protocols The hierarchy of these protocols is shown below in the Figure 1. named for the same reason as zone routing protocol. Each zone can have different size and each node may be within multiple overlapping zones. The size of zone is given by radius of length P, where P is number of hops to the perimeter of the zone [8]. III. AODV ROUTING PROTOCOL AND BLACK HOLE ATTACK Fig. 1 MANET routing protocols 1) Reactive Protocols: Reactive protocols also known as on demand driven reactive protocols. The fact they are known as reactive protocols is, they do not initiate route discovery by themselves, until they are requested, when a source node request to find a route. These protocols setup routes when demanded [3, 4]. When a node wants to communicate with another node in the network, and the source node does not have a route to the node it wants to communicate with, reactive routing protocols will establish a route for the source to destination node. Normally reactive protocols Don’t find route until demanded When tries to find the destination “on demand”, it uses flooding technique to propagate the query. Do not consume bandwidth for sending information. They consume bandwidth only, when the node start transmitting the data to the destination node. 2) Proactive Protocols: Proactive routing protocols work as the other way around as compared to reactive routing protocols. These protocols constantly maintain the updated topology of the network. Every node in the network knows about the other node in advance, in other words the whole network is known to all the nodes making that network. All the routing information is usually kept in tables [6]. Whenever there is a change in the network topology, these tables are updated according to the change. The nodes exchange topology information with each other; they can have route information any time when they needed [6]. 3) Hybrid Protocols: Hybrid protocols exploit the strengths of both reactive and proactive protocols, and combine them together to get better results. The network is divided into zones, and use different protocols in two different zones i.e. one protocol is used within zone, and the other protocol is used between them. Zone Routing Protocol (ZRP) is the example of Hybrid Routing Protocol. ZRP uses proactive mechanism for route establishment within the nodes neighbourhood, and for communication amongst the neighbourhood it takes the advantage of reactive protocols. These local neighbourhoods are known as zones, and the protocol is A. AODV: AODV[2] stands for Ad-Hoc on Demand distance Vector Routing algorithm. It is an algorithm that initiates the route discovery only on demand, that is, a route is discovered whenever a route is needed for communication. It uses the following control packets in the process of route discovery: 1. RREQ: Route Request Source node that needs to communicate with another node in the network transmits RREQ message. AODV floods RREQ message, using expanding ring technique. There is a time to live (TTL) value in every RREQ message, the value of TTL states the number of hops the RREQ should be transmitted. 2. RREP: Route Reply A node having a requested identity or any intermediate node that has a route to the requested node generates a route reply RREP message back to the originator node. 3. RRER: Route Error Every node in the network keeps monitoring the link status to its neighbour’s nodes during active routes. When the node detects a link crack in an active route, (RERR) message is generated by the node in order to notify other nodes that the link is down. B. Black Hole Attack Black Holes are malicious nodes that exploit the following features of AODV: 1) AODV does not perform authentication of a new node during it’s entry in a MANET. 2) It does not verify the route promised by any node. Black Hole node’s motive is to divert all the data traffic in the network toward itself. In order to do so, Black Holes send RREP’s to the source node with the least hop count or highest sequence numbers. Since Black Holes do not search their routing tables before generating a reply, they usually are the quickest. Thus, the RREP packet so received from the black hole is usually the first and appears to bear the latest network configuration, causing the source to route towards the Black Hole. The Black Hole node finally drops these data packets. Black Hole attacks can be independent, that is, performed by a single node or can be collaborative as shown in Fig 2. In collaborative attack, when multiple Black Hole nodes are acting in coordination with each other, B1 sends the RREP and specifies the route through B2 as shown in Fig.3 When B2 is asked by the source for the verification of a route to the destination through it, it responds in conformity while in actuality it does not have the route. The packets are then routed by the source, just to be dropped by the node B1 or B2. 5. Fig. 2 Black Hole Attack. S(source) receives RREP from B(black hole) and starts sending data which is dropped by B and never reaches D(destination). Fig. 3: Collaborative Black Hole Attack. S(source) receives RREP from B1(black hole) along with the next hop(B2) information and sends a confirmation packet to B2(black hole) which replies in affirmation and hence S begins sending data which gets dropped by B2. IV. RELATED WORK A number of solutions to handle the black hole attack have been proposed. 1. Name: Routing security in wireless Adhoc networks Proposed by: Deng et al. Idea- Verifying the existence of a path from the next hop node (to the rrep sending node) Disadvantages: The method was suitable for single black hole detection only. 2. Name: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Proposed by: Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard Idea-The ’THROUGH’ and ’FROM’ bit in the DRI table to detect the collaborative Black Hole Chains. Disadvantages: Their approach uses redundant bit transmissions of ’THROUGH’ bits. 3. Name: ”Black hole Attack in Mobile Ad Hoc Networks” Proposed by: Al-Shurman et al. Idea- Utilized the network redundancies to find out the safe route (that is the one which is not black hole struck). Disadvantages: Suffered from a huge time delay, unnecessary when the path is not black hole struck. 4. Name: Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks Proposed by: Aggarwal et al. Idea- A backbone network was used to identify black hole chains. Disadvantages: The back bone network was instructed by the source to do the black hole route discovery only when the destination is unable to receive the packets it transmitted- More delay Name: Two Tier Secure AODV against Black Hole Attack in MANETs Proposed by: M. Umaparvathy Idea- Two levels of security are provided. One level is during the route discovery process and the next is during the data transfer. Even if the detection of Black hole attack fails at the route discovers process, in the next level, it will be identified. Disadvantages: High level of Computation Overhead 6. Name: CAODV Free Blackhole Attack in Ad Hoc Networks Proposed by: Watchara Saetang, Sakuna Charoenpanyasak Idea- CAODV (Credit based AODV). A credit based mechanism is very efficient to detect the Black hole attack is AODV because the Black hole attack can be detected before it occur in the network. Disadvantages: Their approach uses redundant bit transmissions of ’THROUGH’ bits. 7. Name: An Efficient Algorithm for Detection of Black hole Attack in AODV based MANETs Proposed by: Neelam Khemariya , Ajay Khuntetha Idea- It not only detects the black hole nodes in case when the node is not idle but it can also detect the Black hole nodes in case when a node is idle. (Uses Threshold and Sequence numbers for detection of Black hole attack.) Disadvantages: Increased Network Overhead and Communication overhead V. THE PROPOSED ALGORITHM: BD-AODV PROTOCOL The AODV protocol has a provision of sending a gratuitous RREP packet to the destination node. Whenever an intermediate node has a route towards destination, in addition to sending the RREP to the source, it also unicasts a gratuitous RREP to the destination node. In our protocol the gratuitous RREP is conceptualized and simulated as the CONFIRM packet. Thus, a CONFIRM packet is unicasted/ routed by the RREPN1 to the destination. Note that it can be sent only if the RREPN1 has a route towards destination. It is only after the receipt of CONFIRM will the destination await for packets from the source. The source unicasts a CHCKCNFRM to the destination through RREPN2. Upon CHCKCNFRMs receipt the destination replies by unicasting a REPLYCONFIRM with a key to the source, only if it received a CONFIRM and a CHCKCNFRM. Since a black hole does not possess a route towards the destination, it fails to send the CONFIRM, thus reply to the CHCKCNFRM is never generated by the destination. This leads the source to conclude that the RREP sending node was the black hole one and route the data through RREPN2 node. The proposed algorithm will hereafter be called as the BD-AODV protocol i.e. Black hole Detecting AODV. It gets its name because it detects and divert the data transfer through other route where there is no black hole. The proposed BD-AODV method uses the same RREQ and RREP messages for route discovery process of classical AODV and apart from that it also uses the three important mechanisms. They three modules are: 1. Destination Finding Process 2. CHECK CONFIRM and REPLY CONFIRM process 3. File sending Process Fig 4. (b) Shows CHECKCONFIRM REPLYCONFIRM process and The flow charts of the above modules are shown below: (a) Fig 4. (c) Shows File Sending Process Fig 4. (a) Shows Destination finding process Working of BD-AODV: The Source node sends the RREQ message to all the nodes for finding the shortest path to Destination node. The RREPN1 node which is the end node connected to Destination sends the RREP message back to Source and sends CONFIRM message to Destination for checking of the Source id at the destination end. The Source node sends the CHECKCONFIRM message to the destination through RREPN2, the end node which is connected to destination in the next shortest path. The Destination node reply to Source by sending REPLYCONFIRM message with the secrete key which is to be used for sending the encrypted data through the RREPN2 path. The network module maintains the black hole table which lists the entire black hole nodes IDs. The Source node encrypts the data by using DES algorithm and the secret key received and checks for the black hole presence in the route discovered. If there is no black hole present in the list for the selected path, it sends the encrypted data and sends the data through the RREPN1 path. If new black hole is detected during the data transfer, it selects the RREPN2 path for sending the encrypted data and updates the black hole table. By this, the proposed method detects the black hole and also prevent packet dropping by diverting the route. Algorithm for execution of BD-AODV A) Terminologies Used: 1. S: Source Node 2. D: Destination Node 3. IN: Intermediate Node 4. RREPN1: The Node that Sends RREP to Source and CONFIRM to Destination 5.RREPN2: The Node that sends CHECKCONFIRM to Destination and REPLYCONFIRM to Source. 6. Packets used in Classical AODV a) RREQ- Route Request b) RREP- Route Reply c) RERR- Route Error 7. Packets apart from the ones used in AODV are: a) CONFIRM: Send by RREPN1 to Destination b) CHECKCONFIRM: Sent by Source to Destination on Replay of RREP through RREPN2 c) REPLYCONFIRM: Sent by Destination to Source on Reply of CHECKCONFIRM through RREPN2 8. Tables used: a) Black hole Table: Stores node address of black hole nodes name and ID b) Neighbour Table: Stores node name and corresponding neighbour names c) Node information table: Stores node name and its ID and Position B) Algorithm: 1. S sends RREQ 2. RREPN1 replies with RREP If RREPN1 not in Black hole then RREPN1 sends CONFIRM packet to D via the route for D 3.S receives RREP If RREPN1 in Black hole table then Discard RREP; End else if RREP from IN then Send CHECKCONFIRM Packet to D via Route advertized by RREPN1 End Else if RREP from RREPN2 then Send CHECKCONFIRM packet to D via RREPN2 End Else Route Data End 4.IN receives CONFIRM If IN is not a Black hole then Relay CONFIRM End Else Drop CONFIRM End 5. D receives CONFIRM and Unicast REPLYCONFIRM via RREPN2 with Key for encryption to Source 6.S receives REPLYCONFIRM and Encrypt data with Key If RREPN1 in Black hole Table and RREPN2 is not in Black hole Table then Route encrypted data through RREPN2 End Else if RREPN2 is in Black hole Table Route encrypted data through RREPN1 End Else Store RREP nodes in Black hole table; Retry RREQ END VI. SIMULATION AND ANALYSIS Under Windows environment, java simulator is created. The simulator creates the network model which consists of number of nodes. User is allowed to select the nodes and data file to transfer from source to destination. The Contrast analysis is carried on performance of BDAODV and AODV. The most commonly used quantitative indicators are used to judge the performance of the routing protocol: Data Delivery Ratio, and Average End to End delay versus number of black holes in both the protocols. 1. Average End to End Delay versus number of Black Holes(figure 5)-When there are more than 1 black holes in the route, the end to end delay rises because of an overhead of 3 packets. Fig 5. Average End to End delay Versus Number of Black holes 2. Data Delivery Ratio (DDR) versus Inter packet delay(figure 6)-Inter packet Delay is the time difference between 2 consecutive packets sent by the source from the application layer. Our protocol is able to detect Black Holes and thereafter successfully divert all the traffic from it, hence a DDR of 1.With AODV, however, all data is routed through the Black Hole and hence no data reaches the destination giving a DDR of 0. Fig 6. Data Delivery Ratio with Inter-packet delay VII. CONCLUSION AND FUTURE ENHANCEMENT Reliable Data Delivery is one of the important issue in MANETs. The Simulation results are analysed for the presence of black hole in both Classical AODV and Proposed BD-AODV. With the control packets called CONFIRM, CHCKCNFRM and REPLYCONFIRM, the presence of Black Hole is detected and hence successfully diverted all the traffic from it. The proposed protocol shows that a single run of the algorithm can detect the presence of single and collaborative Black Hole nodes. The Proposed protocol can achieve maximum reliability by detecting black hole and sending the encrypted data by diverting the route traffic. As a part of future endeavour, the aim is to study the processing time the Black Holes, to analyse their behaviour. Also we would work upon decreasing the number of packets transmitted per route in our algorithm. And also we study the behaviour of the Gray hole attack which drops only some packets and not all packets as that of Black hole attacks. ACKNOWLEDGMENT With great regards, gratitude and reverence to Associate Prof. Mrs. Bharathi M, and Prof. Dr. S N Chandrashekara, HOD, Dept. of CSE, SJCIT for providing all the support and guidance. I wove great respect and gratitude to all my family members and God for the blessings and encouragement showered on me. REFERENCES [1] I. Chlamtac, M. Conti, J. Liu, ”Mobile ad hoc networking: imperatives and challenges, Ad Hoc Networks”, pp. 13-64,2003. [2] C Perkins, E Belding-Royer and S Das, ”Ad hoc OnDemand Distance Vector (AODV) Routing”, Internet RFCs Volume: 1, Issue: 3561, Publisher: IETF, Pages: 138,2000. [3] Deng H., Li W. and Agrawal, D.P., ”Routing security in wireless ad hoc networks,” Communications Magazine, IEEE , vol.40, no.10, pp. 70- 75, October, 2002. [4] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks, Proceedings of 2003 International Conference on Wireless Networks (ICWN03), Las Vegas, Nevada, USA, pp. 570-575. [5]Al-Shurman, M., Yoo, S. and Park, S., ”Black hole Attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference, pp. 96-97, 2004. [6] Piyush Agrawal, R. K. Ghosh and Sajal K. Das, ”Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks”, proceedings of the 2nd international conference on Ubiquitous information management and communication, pp. 310-314, Suwon, Korea, 2008. [7] M. Umaparvathi, Dharmishtan K. Varughese, “Two Tier Secure AODV against Black Hole Attack in MANETs”, European Journal of Scientific Research ISSN 1450-216X Vol.72 No.3 (2012), pp. 369-382 [8] Watchara Saetang, Sakuna Charoenpanyasak ,”CAODV Free Blackhole Attack in Ad Hoc Networks”, International Conference on Computer Networks and Communication Systems (CNCS 2012)IPCSIT vol.35(2012) © (2012) IACSIT Press, Singapore. [9] Neelam Khemariya , Ajay Khuntetha ,” An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs “, International Journal of Computer Applications (0975 – 8887) Volume 66– No.18, March 2013
© Copyright 2025 Paperzz