You are on page 1of 4

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013

Optimized technique to minimize packet loss for network suffering from Blackhole attack
Shailja Sabhrwal#1, Ambrish Gangal*2
# *

Computer Science, lovely professional University, Phagwara,India Computer Science, lovely professional University, Phagwara,India shared wireless medium open network architecture, , demanding resource constraints, and, highly dynamic network topology which makes MANET more vulnerable to attacks .Attacks can be security attacks, passive attacks, Active attacks, MAC layer attacks, Network layer attacks , Transport layer attack, Application layer attacks. MAC layer attacks include Jamming attack. Network layer attacks include Wormhole attack, Blackhole attack, Byzantine attack routing attacks (,Routing Table Overflow , Routing Table Poisoning etc)Resource consumption attacks(sleep deprivation attack) , IP Spoofing attack, State Pollution attack, Sybil attack, Fabrication, Modification etc.Transport layer attack includes attacks like Session Hijacking attack, SYN Flooding attack Application layer attacks can be Repudiation attack. In this paper, I have considered a network attack problem in MANET. To protect communication in the network its basic functionality of delivering bits of data from one node to another. I have worked on reducing the packet loss and delay caused by Blackhole attack. Routing protocols play an very important role in the creating and maintaining the connections between the nodes. II.ROUTING PROTOCOLS IN MANET Routing protocols which are used include DSDV (Destination-sequenced Distance Vector),DSR(Dynamic source routing),AODV(Ad-hoc on demand Distance vector Routing).Wireless mobile ad-hoc networks are characterized as networks without any physical connections. In these networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Hence a dynamic routing protocol is needed for these networks to function properly. Routing protocols are classified as:Proactive Protocol (Table-driven), Reactive Protocol (Ondemand),Hybrid Protocol (e.g. ZRP).Proactive protocols:these protocols continuously evaluate route, route is determined with negligible delay, uses significant wireless resources E.g.:-Destination-sequenced distance vector Routing. Reactive protocols: - these protocols evaluates route on demand, delay is significant and avoid wastage of resources.eg:-dynamic source routing (DSR).

Abstract MANET being a self configuring and self changing network becomes unpredictable in nature poses number of challenges like network attacks including Blackholes, wormholes, and gray holes along with problems like routing efficiency, distribution of load, energy consumption and security issues .Attacks like Blackholes causes the delays in communication by their existence. MANET becomes more vulnerable to network attacks because of lack of centralized trusted authority. In MANET adhoc network all the routing information is managed by node itself. Routing protocols includes AODV, DSR, DSDV etc...Proposed solution is a enhancement in premicious mode in secured AODV protocol for detection of malicious node referred to as Blackholenode in MANET.. Detection of these Blackholes and its recovery will provide security to MANET and communication will become more successful over network because delays will be optimized. Keywords MANET, RREQ, RREP, Blackhole, AODV I.INTRODUCTION

Mobile ad hoc network (MANET) is a network formed by collection of mobile hosts without any requirement existing infrastructure or base station which provide centralized access. It is group of mobile nodes which do not need any infrastructure and communicate over a wireless channel. They are best for temporary network in case of temporary communication which do not have an need of pre installed infrastructure .intermediate nodes are required for communication because it has limited range of transmission i.e. why such networks are known as multihop adhoc networks. Nodes need not only to fulfill the functionality of being hosts but each node also acts as router for forwarding the packets. A MANET is a decentralized. In decentralized wireless system which consists of free nodes. It is sometimes called mobile mesh network. It is a self configurable wireless network. These wireless communication devices are transmitter and receivers. These smart antennas can be of any kind and nodes can be fixed or mobile. These node referred to as which are free to move in every direction so these nodes can be a mobile phone, laptop, personal computer and etc. These all the nodes are to be located in cars, airplanes or with people having small electronic devices and etc MANET has gained popularity because of its self configuring and self maintaining nature. Application area of MANET ranges from defense, emergency during disaster recovery by military or in organizations due to their easy deployment. challenges include

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1202

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
Hybrid protocols: - Nodes maintain route information for all the nodes within routing zone example ZRP. It Consists of route discovery/accumulation and discovers multiple routes to destination involves fewer hops. A. AODV Ad hoc on-demand distance vector (AODV) routing protocol [1][2], uses on-demand approach to find its routes that is, only when source requires route it is established for transmission of data packets. It works on destination sequence number for recognizing very recent path. In AODV, the source node and all the intermediate nodes stores next-hop information corresponding to each flow for data packet transmission. In an on-demand routing protocol, the RREQ packet is flooded in network by source node when a route is not available for the desired destination. By flooding RREQ packets we may obtain multiple number of routes to different destinations with a single RREQ. AODV routing protocol uses a destination sequence number to determine most upto dated path for the destination. Destination sequence number tries to indicate the newness of the route which is accepted by source. When RREQ is received by intermediate node it RREQ, it either forward it or prepare RREP if it is having a valid route to the destination. All intermediate nodes which have valid route till destination, or itself is destination node , sends RREP to the source. RREP is a unicast reply message sent back along the recently saved path to the source node or it again broadcast the RREQ message otherwise. This process continues till a RREP message by the destination node or an intermediate node which has a fresh route to the destination node is received by source node. As the RREP is sent back to the source, all intermediate nodes sets forward route entry in their respective tables. The route maintenance process utilizes notifications of link-layer, which are intercepted by nodes neighbouring the one which caused the error. These nodes produces the error message and then forward route error (RERR) messages to its all neighbours that are using routes which contain the broken link. While the reception of a RERR message a node initiate the route discovery for replacing the disastrous paths. AODV being a collaborative protocol [10] allowing nodes to distribute the information which they are holding about other nodes. RREQ messages is not necessarily required to reach the destination node during the process of route discovery. If an intermediate node already knows a route towards the destination, it do not forward the RREQ more further and generate the RREP message. This enables more quicker replies and limits the flooding of RREQs when it is not required. Route discovery adverse that can MANET. In this falsely advertises is much vulnerable in AODV, which an exploit to perform a black hole attack on attack, any malicious node in the network good path which can either be shortest path II. BLACKHOLE ATTACK IN MANET Black hole attack is network layer attack in which vicious node sends a forged route reply (RREP) packet to source node that initiates the route discovery and pretending itself to b the destination node. By comparing the destination sequence number contained in RREP packets when a source node received multiple RREP, it judges the greatest one as the most recent routing information and selects the route contained in that RREP packet. In case the sequence numbers are equal it selects the route with the smallest hop count. If the attacker spoofed the identity to be the destination node and sends RREP with destination sequence number higher than the real destination node to the source node, the data traffic will flow toward the attacker. Therefore, source and destination nodes became unable to communicate with each other. The fact that ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks, adding more to it - open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense are loopholes for Black hole attacks. Black hole attack could disturb routing protocol and bring about enormous damage to the networks topology. The routing protocol must have the ability to manage the frequent topology changes caused by the mobility of nodes and these need to be efficient as compared on basis of efficiency in terms of bandwidth and power as well as on basis of load Transmission Therefore Blackhole attack can be defined as any unwanted transmission in the network structure that lead to eroded transmission from source to destination by handling of bytes by unauthorized node. Purpose of Blackhole attack on network:- To stop the delivery of packet forwarded by source node. To change the parameters in routing message. Blackholes results in delays or communication loss. A. Types of Blackhole attacks in MANET:Single Blackhole attack: - single Blackhole attack stands for a Blackhole attack in which there exists one source node and one destination node and in between both the node there lies a malicious node which hampers the communication over a network. Collaborative Blackhole attack:- multiple malicious nodes groups them together to make them hidden from detection approaches. These are also known as cooperative Blackholes. III. AODV SUFFERS BLACKHOLE ATTACK A black hole [1][3], is a network attack in which the intension of the malicious node is to create hindrance in the path finding or more stable path to the destination node during the finding process of path. The malicious node can do this in order to hamper the process of path-finding or to intercept the data packets which are being sent to the destination node in the network and as a whole disturbing the communication.

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1203

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
process or to intercept all data packets that are being sent to destination node. In such attack the malicious node listen to a route request packet in the network, and respond with reply of having an most shortest route or stable route to the destination node when it is not having. intermediate nodes. The route which is having less number of hop counts and greater sequence number is selected as the best route for data routing. Through every route destination sends range table .In this table destination sends the information to the source that which nodes are in the range of the destination. The malicious nodes send different information to the source and malicious node will be detected. When the malicious node and destination are in the range of each other this case is extension of the case 1 in this case destination also sends the DIR table to the source node DIR TABLE

NODE ID

FROM

THROUGH

Fig. 1 Blackhole attack

IV. PROPOSED SOLUTION A. Network Setup Set up the network with minimum number of 16 nodes. In the network declare one node as the malicious node B. Path establishment The path from the source to destination is established using AODV reactive routing protocol. AODV use RREP AND RREQ messages for the path establishment. Black hole node responds back with the minimum hop counts and higher sequence numbers. Cooperative nodes can help black hole node to perform black hole attack C. Black hole Attack Prevention In our technique we are assuming following two cases: Case1:-When the malicious node are not in the direct range of the destination node. When the source node flood the network with the route request packets to the destination multiple nodes reply to the source node with the RREQ packets and multiple route are available to the destination through

Every node maintain the table of its neighbour node DIR table DIR table. In NODE ID column node id is defined In FROM column value may be zero or one .Zero when no data is pass from the node and 1 when data pass from node In THROUGH column value will be 0 OR 1. O when no data will pass through that node and 1 when data pass through that node. In route established, every node has to presents its neighbour DIR table. Some node is having from and through entries Zero. But it is not sure that node which is having DIR table value 0 is a malicious node For the verification source broadcast the message, when nodes receives the message every node in the network go to the promiscuous node. At the same time source node sends the fake RREP message destination. The in the promiscuous mode verifies and inform the source that whether all the nodes in the route are passing the message or not. If any nodes will not pass the message to its next hop will be the malicious node. Case2:- Destination sends both the DIR table and range table to the source and on the basis both tables malicious node will be detected. IV. SIMULATION RESULTS For simulation we are using Network simulator2. NS2 [10] is a network simulation tool that simulates discrete events targeted at networking research. It provides substantial support for simulation of TCP, routing protocols over wired and wireless networks. Wireless and wired packet mode communication network. NS2 provides a comprehensive environment for designing network protocol, creating and visualizing scenarios under user specific condition and analysing their performance.

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1204

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
TABLE I SCENARIO SPECIFICATION SIMULATOR NO.OF NODES ROUTING PROTOCOL TRAFFIC TYPE NS2 12 AODV CBR

Figure 3 represents the impact of balckhole attack on throughput. Initially the throughput was not constant and was fluctuating but proposed solution provides higher and constant throughput.

V. CONCLUSION& FUTURE WORK In this paper, we have analysed and describe the solution to detect the single black hole in the network. We are using AODV routing protocol and made it more secure routing protocol. Security of our approach is better than AODVs security. In our approach, we are enhancing premicious mode by providing DIR table with ranges for detecting Blackhole. In future work can be carried out on cooperative Blackholes and using other routing protocols.

REFERENCES
[1] [2] C. Siva Ram Murthy and B.S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall (2004). A. Raja Mahmood and A.I. Khan, A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks,, pp. 1 -6 (2007). D. P. Agrawal and Q.-A. Zings, Introduction to Wireless and Mobile Systems, Brooks/Cole Publishing, Aug. 2002. I.F. Akyildiz; X. Wang (2005). A Survey on Wireless Mesh Networks [J]. IEEE Communications Magazine, 43 (9), 23-30 D.M. Shila; T. Anjali; Defending selective forwarding attacks in WMNs, IEEE International Conference on Electro/Information Technology, 2008, 96-101. A. Patcha; A. Mishra; Collaborative security architecture for black Hole attack prevention in mobile ad hoc networks[C]; Radio and Wireless Conference, 2003, 75-78. L.D. Zhou; Z.J. Haas, Securing Ad Hoc Networks[J], IEEE Network, 13(6), 1999. B. Lu and U. W. Pooch, Security in QoS Signaling Systems for Mobile Ad Hoc Networks, in Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob2005), IEEE International Conference on, vol. 3, October 2005, pp. 213220 Vol. 3. Sowmya K.S, Rakesh T. and Deepthi P Hudedagaddi, Detection and Prevention of Blackhole Attack in MANET UsingACO, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 Network simulator http://www.isi.edu/nsnam/n

[3] [4] [5] Fig. 2 Impact of black hole on network Packet loss and packet loss in proposed algorithm under black hole attack

[6]

Figure 2 represents the impact of black hole attack on packet loss. The packet loss in network is increased due to the impact of black hole but the proposed solution provides less packet loss with black hole attack.

[7] [8] [9]

[10]

[11]

Fig. 3 Impact of black hole on network throughput and network throughput in proposed algorithm under black hole attack

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1205

You might also like