black hole in manet

30
BLACK HOLE IN MANET SUBMITTED TO:-- SUBMITTED BY:-- Dr. SAPNA GAMBHIR INDRAJEET KUMAR CSE DEPTT. MNW/887/2K11

Upload: sonya-banks

Post on 31-Dec-2015

90 views

Category:

Documents


2 download

DESCRIPTION

BLACK HOLE IN MANET. SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11. Content. Introduction to network Types Wireless network Mobile ad-hoc network (MANET) Security issues Attacks in MANET Detection & Resolving Query session Reference. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: BLACK HOLE IN MANET

BLACK HOLE IN MANET

SUBMITTED TO:-- SUBMITTED BY:--Dr. SAPNA GAMBHIR INDRAJEET KUMARCSE DEPTT. MNW/887/2K11

Page 2: BLACK HOLE IN MANET

ContentIntroduction to networkTypesWireless networkMobile ad-hoc network (MANET)Security issuesAttacks in MANETDetection & Resolving Query sessionReference

Page 3: BLACK HOLE IN MANET

Introduction

NETWORKING

Area based

Medium based

LAN WAN MAN

WIREDWIRELESS

Page 4: BLACK HOLE IN MANET

Wireless NetworksNeed: Access computing and communication services, on

the move

Infrastructure-based Networks◦ traditional cellular systems (base station infrastructure)

Wireless LANs◦ Infrared (IrDA) or radio links (Wavelan)◦ very flexible within the reception area; ad-hoc networks

possible◦ low bandwidth compared to wired networks (1-10 Mbit/s)

Ad hoc Networks◦ useful when infrastructure not available, impractical, or

expensive◦ military applications, rescue, home networking

Page 5: BLACK HOLE IN MANET

Many ApplicationsPersonal area networking

◦cell phone, laptop, ear phone, wrist watchMilitary environments

◦soldiers, tanks, planesCivilian environments

◦ taxi cab network◦meeting rooms◦sports stadiums◦boats, small aircraft

Emergency operations◦search-and-rescue◦policing and fire fighting

Page 6: BLACK HOLE IN MANET

Challenges in Mobile Environments· Limitations of the Wireless Network

· packet loss due to transmission errors· variable capacity links· frequent disconnections/partitions· limited communication bandwidth

· Limitations Imposed by Mobility· dynamically changing topologies/routes· lack of mobility awareness by system/applications

· Limitations of the Mobile Computer· short battery lifetime· limited capacities

Page 7: BLACK HOLE IN MANET

MANET (Mobile ADHOC N/W)

Introduction….Collection of mobile wireless

nodesLinks are made & broken in arbitrarily way.

No fixed infrastructureConstrained resourcesProblem… Design a routing algorithm that

are secure

Page 8: BLACK HOLE IN MANET

Routing ProtocolsProactive protocols

◦ Traditional distributed shortest-path protocols◦ Maintain routes between every host pair at all times◦ Based on periodic updates; High routing overhead◦ Example: DSDV (destination sequenced distance

vector)

Reactive protocols◦ Determine route if and when needed◦ Source initiates route discovery◦ Example: DSR (dynamic source routing),AODV.

Hybrid protocols◦ Adaptive; Combination of proactive and reactive◦ Example : ZRP (zone routing protocol)

Page 9: BLACK HOLE IN MANET

SECURITY ISSUES INMANET

Page 10: BLACK HOLE IN MANET

10

Security Requirements in MANET

AvailabilityData

Confidentiality Data IntegrityNon-repudiation

Attacks ◦External

attacks◦Internal attacks◦Passive attacks◦Active attacks

Threats

Page 11: BLACK HOLE IN MANET

Attack in Manet Active attack & passive attack

Page 12: BLACK HOLE IN MANET

Types of attack ( cont…)Gray hole attack:-- As soon as it receive

the packet from neighbor the attacker drop the packet.

Type of active attack.In some other gray hole attacks the attacker

node behaves maliciously for the time until the packets are dropped and then switch to their normal behavior . Due this behavior it’s very difficult for the network to figure out such kind of attack.

Gray hole attack is also termed as node misbehaving attack.

Page 13: BLACK HOLE IN MANET

Types of attack (cont…)Warm hole attack:-- Wormhole

attack is a severe attack in which two attackers placed themselves strategically in the network. The attackers then keep on hearing the network, record the wireless data.

Page 14: BLACK HOLE IN MANET

BLACK HOLE ATTACK

A kind of denial of service where a malicious node can attract all packets by falsely claiming a fresh route to the destination and then absorb them without forwarding them to the destination.

Co operative Black hole means the malicious nodes act in a group

Page 15: BLACK HOLE IN MANET

Route Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

Z

YBroadcast transmission

M

N

L

Page 16: BLACK HOLE IN MANET

Route Request and Route Reply Route Request (RREQ) includes the last known

sequence number for the destination

An intermediate node may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender

Intermediate nodes that forward the RREP, also record the next hop to destination

A routing table entry maintaining a reverse path is purged after a timeout interval

A routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval

Page 17: BLACK HOLE IN MANET

Link Failure A neighbor of node X is considered active for a

routing table entry if the neighbor sent a packet within active_route_timeout interval which was forwarded using that entry

Neighboring nodes periodically exchange hello message

When the next hop link in a routing table entry breaks, all active neighbors are informed

Link failures are propagated by means of Route Error (RERR) messages, which also update destination sequence numbers

Page 18: BLACK HOLE IN MANET

The black hole problem in current AODV protocol

AODV is an important on-demand routing protocol that creates routes only when desired by the source node.

When a node requires a route to a destination, it initiates a route discovery process within the network. It broadcasts a route request (RREQ) packet to its neighbors. (Figure 2)

Page 19: BLACK HOLE IN MANET

The black hole problem in current AODV protocol (cont.)

Page 20: BLACK HOLE IN MANET

The black hole problem in current AODV protocol (cont.)

Once the RREQ reaches the destination or an intermediate node with a fresh enough route, the destination or intermediate node responds by unicasting a route reply (RREP) packet (Figure 3) back to the neighbor from which it first received the RREQ.

Page 21: BLACK HOLE IN MANET

The black hole problem in current AODV protocol (cont.)

Page 22: BLACK HOLE IN MANET

The black hole problem in current AODV protocol (cont.)

Any intermediate node may respond to the RREQ message if it has a fresh enough route.

The malicious node easily disrupts the correct functioning of the routing protocol and make at least part of the network crash.

Page 23: BLACK HOLE IN MANET

The black hole problem in current AODV protocol (cont.)

Page 24: BLACK HOLE IN MANET

Cooperative black hole attack

Page 25: BLACK HOLE IN MANET

Solution…Slightly modified AODV protocol

by introducing Data Routing Information (DRI) Table (reliability table).

Page 26: BLACK HOLE IN MANET

Another approach…Fidelity level:----- Collecting responses.

Choosing a response to forward data. Updating the fidelity level. Receiving acknowledgement and broadcasting fidelity

packets

Page 27: BLACK HOLE IN MANET

Conclusion and future work (cont.)In this seminar we have studied

the routing security issues of MANETs, described the cooperative black hole attack that can be mounted against a MANET and proposed a feasible solution for it in the AODV protocol.

Page 28: BLACK HOLE IN MANET

References…Bo Sun,Yong Guan,Jian Chen,Udo , “Detecting

Black-hole Attack in Mobile Ad Hoc Network” , The institute of Electrical Engineers, Printed and published by IEEE, 2003.

Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing security in Wireless Ad-hoc Network”,IEEE Communications Magazine, Issue 40, pp 70–75,2002

Latha Tamilselvan, Dr. V Sankaranarayanan “Prevention of Co-operative Black Hole Attack in MANET” JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008

Page 29: BLACK HOLE IN MANET
Page 30: BLACK HOLE IN MANET