a survey on blackhole attack in manet · in this paper, several solutions for manet against black...
TRANSCRIPT
A SURVEY ON BLACKHOLE ATTACK IN MANET
Jitendrakumar G Shewaramani*, Vishal A Kanjariya
Lecturer, Department of Computer Engineering, B & B Institute of Technology, V V N, Gujarat, India
ABSTRACT:
A Mobile Adhoc network (MANET) is an infrastructure less network comprising of mobile
devices, which have capability of dynamically arranging themselves to form a temporary
network. Because of mobility of nodes, restricted resources and decentralized administration
they become susceptible to various attacks. Nodes participating in MANET have very limited
transmission range and so each node in MANET acts as a Router for forwarding packets to
other nodes. Hence, secure routing in MANET is the most common research interest. In this
paper, we will survey several Denial of Service (DoS) attacks which are serious threats for
MANETs namely Blackhole Attack, Wormhole Attack and Grayhole Attack.
KEYWORDS: MANET, Security, DoS Attack, Blackhole Attack
INTRODUCTION
MANET is a wireless network comprising of mobile nodes and capable of establishing
network anywhere, any time. Here, mobile nodes randomly enter and leave the network as
they have very limited transmission range. Thus each node acts as a router to establish routes
between distinct nodes participating in the network. As it is infrastructure less, rapidly
changing & quickly deployable network, thus its line of defense is pretty unclear.
From many constrains, in this paper we focus on the secure routing aspect. Here, we have
surveyed many DoS attacks as well as proposed solutions to overcome such attacks proposed
by various researchers. In Section II, we introduce routing protocols of MANET. Section III
focuses on security concerns as well as various attacks possible in MANET. Section IV
portrays one of the DoS attacks i.e. Blackhole attack with solutions for detection and or
prevention of attack. Last section is about conclusions and future improvements.
Compared to wired network, in MANET every mobile node is working as a router. Because of
that, routing overhead is less. Routing protocol used must be such that it should use less
bandwidth and has minimal overhead. Below table shows the types of routing protocols.
Table-1 Routing Protocol
Type Characteristics
Proactive
(Table Driven)
Routes are found in advance
Periodically route are updated and
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 1
distributed
Reactive
(On-demand)
On demand, routes are discovered.
No need for distributing routing
information to other nodes
Hybrid Combination of both Proactive and
Reactive protocols
In proactive, already the routes to each and every other node are maintained in the routing
table. So without any delay, communication process can start. But problem arise when number
of nodes are in large number, as it will increase the size of the routing table. In reactive, time is
consumed in route discovery as it does not have readily available route to any node.
SECURITY CONCERNS
Due to decentralized administration, dynamic topology, wireless nodes, restricted power and
bandwidth constraints; MANETs are more easily exposed to security attacks. In below table,
we show types of attacks possible in MANET.
Table-2 Routing Attacks
Type of
Attack
Characteristics
Active
Attack
Attacker may be internal or external
Attacker can disturb Network operation by modifying or deleting data,
fabricating messages or a node.
Passive
Attack
Information can be obtained without disturbing the normal network
operation
Detection is difficult
In our paper, we will focus on the DoS attack which comes in the category of active attack.
DOS ATTACKS
In DoS attacks, malicious nodes generate false messages regarding route to destination node.
Sender sends the packets to the malicious node which actually drops the packets as it does not
have route to destination. This disrupts the normal network operation by consuming the
network resources. Here, we will discuss Blackhole attack along with existing solutions to
detect and overcome it.
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 2
A. BLACKHOLE ATTACK
Blackhole attack is a type of DoS attacks where the malicious node sends the message of
having the shortest valid route to the destination. A bogus route is established from source to
malicious node and all the packets send to malicious node will be discarded and thus utilizes
the network traffic. [10]
Figure-1Blackhole Attack
1) Blackhole Attack Operation:
In figure 1, malicious node B is node that will reply with RREP packet in response to the
RREQ packet broadcasted by Source node S for finding the path towards destination node D.
S will establish route to B and packets will be send to B instead of actual D. All packets
received by B will be dropped.
2) Detection and Prevention of Blackhole Attack:
Several approaches have been proposed to overcome Blackhole attack. Table IV gives details
of some of methods for overcoming blackhole attacks along with their limitations.
Table-3 Blackhole Detection/Prevention Techniques
Approach Technique Pros Cons
Prevention of
Cooperative Black
Hole Attack in
Wireless Ad Hoc
Networks [4]
DRI and Cross
Checking
A higher throughput
performance almost
50%than AODV
5-8% more
communication
overhead of route
request
Secure Routing
with the AODV
Protocol [6]
Cryptographic
mechanism based
solution.
Encryption using
symmetric key
Higher throughput and
PDR compared to
AODV
Higher routing
overhead due to point
to point encryption/
decryption
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 3
DPRAODV: A
Dynamic Learning
System Against
Black hole Attack
in AODV based
MANET [12]
Sequence number
compared with
Threshold value
and ALARM
packet to neighbor
nodes for isolating
black hole node
The PDR is improved
by 80-85% than
AODV when under
black-hole attack
May mistakenly block
some non-malicious
node due to its high
Seq_no also little bit
higher routing
overhead and end-to-
end delay
Implementation of
Routing Security
Aspects in AODV
[16]
Only DN allowed
to RREP, ALARM
packet for isolation
of black hole node
PDR of SAODV is
more immune that
AODV
Takes 1% more time
to pass on data packets
compared to AODV
Securing AODV:
The A-SAODV
Secure Routing
Prototype [13]
Digital Signature
and adaptive reply
decision
Some enhancements in
SAODV to improve
the performance
Increased overhead
and complexity
Securing Routing
Table Update in
AODV Routing
Protocol [8]
Uses Enhanced
Route discovery
AODV (ERDA) to
control the update
of the routing table.
Isolates the attacker at
initial stage, PDR
increases up to 77%
Minimal overhead,
Delay in attacker
detection
Secure AODV
protocol to mitigate
Black hole attack in
Mobile Ad hoc
Networks [7]
Uses the ratio of the
number of RREQ to
number of RREP
forwarded by node
in the network to
detect a black hole
attack
PDR increases by
78.6%
Well-connected nodes
may falsely
understood as
malicious node, Time
consuming technique
CONCLUSION AND FUTURE WORK
A Black Hole attack is one of the most severe security problems in MANET. Here, a
malicious node imitates to be a destination node by sending fake RREP to a Source Node that
initiates route discovery, and consequently deprives data traffic from the SN. In this paper,
several solutions for MANET against Black are presented.
The existing solutions affect the MANET performance adversely in terms of throughput,
delay and overhead. Although these may not be avoided totally, there is a need for trade-offs
to achieve secure optimal performance. The detection of Black Holes in MANET is still
considered to be a challenging task. Future work is intended to find an efficient Black Hole
attack detection and elimination algorithm with trade-offs in delay and overheads that can be
adapted for ad hoc networks susceptible to Black Hole attacks.
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 4
REFERENCES
[1] M. Ilyas , “The Handbook of Adhoc Wireless Networks”, CRC Press, 2003.
[2] Brian P. Crow, Indra Widjaja, Jeon Geun Kim and Preskott T. Sakai, “IEEE 802.11
Wireless Local Area Network”, IEEE Communication Magazine, Vol. 35, No. 9, pp
116-126, September 1997
[3] C.K. Toh, “Ad hoc Mobile Wireless Network: Protocols and Systems”, Prentice Hall
Englewood Cliff, NJ 07632, 2002
[4] Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K., “Prevention of
Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. International
Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
[5] Burbank JL, Chimento PF, Haberman BK, Kasch WT (2009) Key Challenges of
Military Tactical Networking and the Elusive Promise of MANET Technology.IEEE
Communication Magazine 44(11):39–45. doi: 10.1109/COM-M.2006.248156
[6] Asad Amir Pirzada and Chris McDonald, “Secure Routing with the AODV Protocol”,
Asia-Pacific IEEE Conference on Communications, Perth, Western Australia, 3 - 5
October 2005.
[7] Rajesh Yerneni, Anil K. Sarje, “Secure AODV protocol to mitigate Black hole attack in
Mobile Ad hoc Networks”, IEEE 2012.
[8] K.A. Jalil, Z. Ahmad and J. A. Manan “Securing Routing Table Update in AODV
Routing Protocol”, IEEE Conference, Sept 25-28, 2011
[9] K.A. Jalil, Z. Ahmad and J. A. Manan “Securing Routing Table Update in AODV
Routing Protocol”, IEEE Conference, Sept 25-28, 2011
[10] Anu Bala, Munish Bansal and Jagpreet Singh, “Performance Analysis of MANET
under Blackhole Attack”, First International Conference on Networks &
Communications, 2009, pp. 141-145.
[11] Weerasinghe H, Fu H., “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc
Networks: Simulation Implementation and Evaluation”, Future Generation
Communication and Networking, Jeju-Island, Korea, 6-8 December 2007
[12] Raj PN, Swadas PB, “DPRAODV: A Dynamic Learning System Against Blackhole
Attack in AODV based MANET.” International Journal of Computer Science Issues,
Vol.2, 2009
[13] Davide Cerri, Alessandro Ghioni, “Securing AODV: The A-SAODV Secure Routing
Prototype”, Communications Magazine, IEEE, Vol.-46, Issue. 2, pp. 120-125, February
2008
[14] Chatchik Bisdkian, “An overview of Bluetooth Wireless technology”, IEEE
Communication Magazine, Vol. 39, No. 12, pp 86-94, December 2001
[15] C. Murthy and B. Manoj, “Adhoc Wireless Networks: Architectures and Protocols,”
Prentice Hall PTR, 2005
[16] Suman Deswal and Sukhbir Singh, “Implementation of Routing Security Aspects in
AODV”, IEEE 2010.
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 5
[17] Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing security in ad hoc wireless
networks, IEEE Comm Magazine, October 2002 vol. 40, pp 70-75
[18] Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”.
Master's thesis, Atılım University, September 2006
[19] Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah, “MANET
Routing Protocols and Wormhole Attack against AODV”
[20] Gao Xiaopeng and Chen Wei, “A Novel Grayhole Attack Detection Scheme for Mobile
Ad-hoc Networks”, 2007 IFIP International Conference on Network and Parallel
Computing – Workshops, 2007, pp. 209-214.
International Journal of Scientific Research in Engineering- IJSREIndex: 20170110:003. IDSRJI Indexing, Impact Factor: 3.27
IJSRE December, Vol-1 Issue-10 www.ijsre.in Page 6