a survey on blackhole attack in manet · in this paper, several solutions for manet against black...

6
A SURVEY ON BLACKHOLE ATTACK IN MANET Jitendrakumar G Shewaramani*, Vishal A Kanjariya Lecturer, Department of Computer Engineering, B & B Institute of Technology, V V N, Gujarat, India ABSTRACT: A Mobile Adhoc network (MANET) is an infrastructure less network comprising of mobile devices, which have capability of dynamically arranging themselves to form a temporary network. Because of mobility of nodes, restricted resources and decentralized administration they become susceptible to various attacks. Nodes participating in MANET have very limited transmission range and so each node in MANET acts as a Router for forwarding packets to other nodes. Hence, secure routing in MANET is the most common research interest. In this paper, we will survey several Denial of Service (DoS) attacks which are serious threats for MANETs namely Blackhole Attack, Wormhole Attack and Grayhole Attack. KEYWORDS: MANET, Security, DoS Attack, Blackhole Attack INTRODUCTION MANET is a wireless network comprising of mobile nodes and capable of establishing network anywhere, any time. Here, mobile nodes randomly enter and leave the network as they have very limited transmission range. Thus each node acts as a router to establish routes between distinct nodes participating in the network. As it is infrastructure less, rapidly changing & quickly deployable network, thus its line of defense is pretty unclear. From many constrains, in this paper we focus on the secure routing aspect. Here, we have surveyed many DoS attacks as well as proposed solutions to overcome such attacks proposed by various researchers. In Section II, we introduce routing protocols of MANET. Section III focuses on security concerns as well as various attacks possible in MANET. Section IV portrays one of the DoS attacks i.e. Blackhole attack with solutions for detection and or prevention of attack. Last section is about conclusions and future improvements. Compared to wired network, in MANET every mobile node is working as a router. Because of that, routing overhead is less. Routing protocol used must be such that it should use less bandwidth and has minimal overhead. Below table shows the types of routing protocols. Table-1 Routing Protocol Type Characteristics Proactive (Table Driven) Routes are found in advance Periodically route are updated and International Journal of Scientific Research in Engineering- IJSRE Index: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27 IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 1

Upload: others

Post on 31-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

A SURVEY ON BLACKHOLE ATTACK IN MANET

Jitendrakumar G Shewaramani*, Vishal A Kanjariya

Lecturer, Department of Computer Engineering, B & B Institute of Technology, V V N, Gujarat, India

ABSTRACT:

A Mobile Adhoc network (MANET) is an infrastructure less network comprising of mobile

devices, which have capability of dynamically arranging themselves to form a temporary

network. Because of mobility of nodes, restricted resources and decentralized administration

they become susceptible to various attacks. Nodes participating in MANET have very limited

transmission range and so each node in MANET acts as a Router for forwarding packets to

other nodes. Hence, secure routing in MANET is the most common research interest. In this

paper, we will survey several Denial of Service (DoS) attacks which are serious threats for

MANETs namely Blackhole Attack, Wormhole Attack and Grayhole Attack.

KEYWORDS: MANET, Security, DoS Attack, Blackhole Attack

INTRODUCTION

MANET is a wireless network comprising of mobile nodes and capable of establishing

network anywhere, any time. Here, mobile nodes randomly enter and leave the network as

they have very limited transmission range. Thus each node acts as a router to establish routes

between distinct nodes participating in the network. As it is infrastructure less, rapidly

changing & quickly deployable network, thus its line of defense is pretty unclear.

From many constrains, in this paper we focus on the secure routing aspect. Here, we have

surveyed many DoS attacks as well as proposed solutions to overcome such attacks proposed

by various researchers. In Section II, we introduce routing protocols of MANET. Section III

focuses on security concerns as well as various attacks possible in MANET. Section IV

portrays one of the DoS attacks i.e. Blackhole attack with solutions for detection and or

prevention of attack. Last section is about conclusions and future improvements.

Compared to wired network, in MANET every mobile node is working as a router. Because of

that, routing overhead is less. Routing protocol used must be such that it should use less

bandwidth and has minimal overhead. Below table shows the types of routing protocols.

Table-1 Routing Protocol

Type Characteristics

Proactive

(Table Driven)

Routes are found in advance

Periodically route are updated and

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 1

Page 2: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

distributed

Reactive

(On-demand)

On demand, routes are discovered.

No need for distributing routing

information to other nodes

Hybrid Combination of both Proactive and

Reactive protocols

In proactive, already the routes to each and every other node are maintained in the routing

table. So without any delay, communication process can start. But problem arise when number

of nodes are in large number, as it will increase the size of the routing table. In reactive, time is

consumed in route discovery as it does not have readily available route to any node.

SECURITY CONCERNS

Due to decentralized administration, dynamic topology, wireless nodes, restricted power and

bandwidth constraints; MANETs are more easily exposed to security attacks. In below table,

we show types of attacks possible in MANET.

Table-2 Routing Attacks

Type of

Attack

Characteristics

Active

Attack

Attacker may be internal or external

Attacker can disturb Network operation by modifying or deleting data,

fabricating messages or a node.

Passive

Attack

Information can be obtained without disturbing the normal network

operation

Detection is difficult

In our paper, we will focus on the DoS attack which comes in the category of active attack.

DOS ATTACKS

In DoS attacks, malicious nodes generate false messages regarding route to destination node.

Sender sends the packets to the malicious node which actually drops the packets as it does not

have route to destination. This disrupts the normal network operation by consuming the

network resources. Here, we will discuss Blackhole attack along with existing solutions to

detect and overcome it.

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 2

Page 3: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

A. BLACKHOLE ATTACK

Blackhole attack is a type of DoS attacks where the malicious node sends the message of

having the shortest valid route to the destination. A bogus route is established from source to

malicious node and all the packets send to malicious node will be discarded and thus utilizes

the network traffic. [10]

Figure-1Blackhole Attack

1) Blackhole Attack Operation:

In figure 1, malicious node B is node that will reply with RREP packet in response to the

RREQ packet broadcasted by Source node S for finding the path towards destination node D.

S will establish route to B and packets will be send to B instead of actual D. All packets

received by B will be dropped.

2) Detection and Prevention of Blackhole Attack:

Several approaches have been proposed to overcome Blackhole attack. Table IV gives details

of some of methods for overcoming blackhole attacks along with their limitations.

Table-3 Blackhole Detection/Prevention Techniques

Approach Technique Pros Cons

Prevention of

Cooperative Black

Hole Attack in

Wireless Ad Hoc

Networks [4]

DRI and Cross

Checking

A higher throughput

performance almost

50%than AODV

5-8% more

communication

overhead of route

request

Secure Routing

with the AODV

Protocol [6]

Cryptographic

mechanism based

solution.

Encryption using

symmetric key

Higher throughput and

PDR compared to

AODV

Higher routing

overhead due to point

to point encryption/

decryption

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 3

Page 4: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

DPRAODV: A

Dynamic Learning

System Against

Black hole Attack

in AODV based

MANET [12]

Sequence number

compared with

Threshold value

and ALARM

packet to neighbor

nodes for isolating

black hole node

The PDR is improved

by 80-85% than

AODV when under

black-hole attack

May mistakenly block

some non-malicious

node due to its high

Seq_no also little bit

higher routing

overhead and end-to-

end delay

Implementation of

Routing Security

Aspects in AODV

[16]

Only DN allowed

to RREP, ALARM

packet for isolation

of black hole node

PDR of SAODV is

more immune that

AODV

Takes 1% more time

to pass on data packets

compared to AODV

Securing AODV:

The A-SAODV

Secure Routing

Prototype [13]

Digital Signature

and adaptive reply

decision

Some enhancements in

SAODV to improve

the performance

Increased overhead

and complexity

Securing Routing

Table Update in

AODV Routing

Protocol [8]

Uses Enhanced

Route discovery

AODV (ERDA) to

control the update

of the routing table.

Isolates the attacker at

initial stage, PDR

increases up to 77%

Minimal overhead,

Delay in attacker

detection

Secure AODV

protocol to mitigate

Black hole attack in

Mobile Ad hoc

Networks [7]

Uses the ratio of the

number of RREQ to

number of RREP

forwarded by node

in the network to

detect a black hole

attack

PDR increases by

78.6%

Well-connected nodes

may falsely

understood as

malicious node, Time

consuming technique

CONCLUSION AND FUTURE WORK

A Black Hole attack is one of the most severe security problems in MANET. Here, a

malicious node imitates to be a destination node by sending fake RREP to a Source Node that

initiates route discovery, and consequently deprives data traffic from the SN. In this paper,

several solutions for MANET against Black are presented.

The existing solutions affect the MANET performance adversely in terms of throughput,

delay and overhead. Although these may not be avoided totally, there is a need for trade-offs

to achieve secure optimal performance. The detection of Black Holes in MANET is still

considered to be a challenging task. Future work is intended to find an efficient Black Hole

attack detection and elimination algorithm with trade-offs in delay and overheads that can be

adapted for ad hoc networks susceptible to Black Hole attacks.

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 4

Page 5: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

REFERENCES

[1] M. Ilyas , “The Handbook of Adhoc Wireless Networks”, CRC Press, 2003.

[2] Brian P. Crow, Indra Widjaja, Jeon Geun Kim and Preskott T. Sakai, “IEEE 802.11

Wireless Local Area Network”, IEEE Communication Magazine, Vol. 35, No. 9, pp

116-126, September 1997

[3] C.K. Toh, “Ad hoc Mobile Wireless Network: Protocols and Systems”, Prentice Hall

Englewood Cliff, NJ 07632, 2002

[4] Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K., “Prevention of

Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. International

Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.

[5] Burbank JL, Chimento PF, Haberman BK, Kasch WT (2009) Key Challenges of

Military Tactical Networking and the Elusive Promise of MANET Technology.IEEE

Communication Magazine 44(11):39–45. doi: 10.1109/COM-M.2006.248156

[6] Asad Amir Pirzada and Chris McDonald, “Secure Routing with the AODV Protocol”,

Asia-Pacific IEEE Conference on Communications, Perth, Western Australia, 3 - 5

October 2005.

[7] Rajesh Yerneni, Anil K. Sarje, “Secure AODV protocol to mitigate Black hole attack in

Mobile Ad hoc Networks”, IEEE 2012.

[8] K.A. Jalil, Z. Ahmad and J. A. Manan “Securing Routing Table Update in AODV

Routing Protocol”, IEEE Conference, Sept 25-28, 2011

[9] K.A. Jalil, Z. Ahmad and J. A. Manan “Securing Routing Table Update in AODV

Routing Protocol”, IEEE Conference, Sept 25-28, 2011

[10] Anu Bala, Munish Bansal and Jagpreet Singh, “Performance Analysis of MANET

under Blackhole Attack”, First International Conference on Networks &

Communications, 2009, pp. 141-145.

[11] Weerasinghe H, Fu H., “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc

Networks: Simulation Implementation and Evaluation”, Future Generation

Communication and Networking, Jeju-Island, Korea, 6-8 December 2007

[12] Raj PN, Swadas PB, “DPRAODV: A Dynamic Learning System Against Blackhole

Attack in AODV based MANET.” International Journal of Computer Science Issues,

Vol.2, 2009

[13] Davide Cerri, Alessandro Ghioni, “Securing AODV: The A-SAODV Secure Routing

Prototype”, Communications Magazine, IEEE, Vol.-46, Issue. 2, pp. 120-125, February

2008

[14] Chatchik Bisdkian, “An overview of Bluetooth Wireless technology”, IEEE

Communication Magazine, Vol. 39, No. 12, pp 86-94, December 2001

[15] C. Murthy and B. Manoj, “Adhoc Wireless Networks: Architectures and Protocols,”

Prentice Hall PTR, 2005

[16] Suman Deswal and Sukhbir Singh, “Implementation of Routing Security Aspects in

AODV”, IEEE 2010.

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 5

Page 6: A SURVEY ON BLACKHOLE ATTACK IN MANET · In this paper, several solutions for MANET against Black are presented. The existing solutions affect the MANET performance adversely in terms

[17] Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing security in ad hoc wireless

networks, IEEE Comm Magazine, October 2002 vol. 40, pp 70-75

[18] Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”.

Master's thesis, Atılım University, September 2006

[19] Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah, “MANET

Routing Protocols and Wormhole Attack against AODV”

[20] Gao Xiaopeng and Chen Wei, “A Novel Grayhole Attack Detection Scheme for Mobile

Ad-hoc Networks”, 2007 IFIP International Conference on Network and Parallel

Computing – Workshops, 2007, pp. 209-214.

International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27

IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 6