performance analysis of aodv protocol on blackhole attack

15
Performance Analysis of AODV Protocol on Black hole Attacks

Upload: mehedi

Post on 22-Apr-2015

4.314 views

Category:

Education


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Performance analysis of aodv protocol on blackhole attack

Performance Analysis of AODV Protocol on Black hole

Attacks

Page 2: Performance analysis of aodv protocol on blackhole attack

Prepared By

Md. Al-Amin-Al-Mehedi Sr.System Engineer

Contact: [email protected] +8801718161615

Page 3: Performance analysis of aodv protocol on blackhole attack

Content

Introduction. What is AODV Protocol? Why We Use AODV Protocol. Security On AODV Protocol. Attacks On AODV Protocol. What is DDOS Attacks? What is Black Hole Attack? Caused of Black Hole Attack. Conclusion

Page 4: Performance analysis of aodv protocol on blackhole attack

Introduction

Wireless ad-hoc networks are composed of autonomous nodes that are self- managed without any infrastructure. In this way, ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time. Ad-hoc networks are suitable for areas where it is not possible to set up a fixed infrastructure. Since the nodes communicate with each other without an infrastructure, they provide the connectivity by forwarding packets over themselves. To support this connectivity, nodes use some routing protocols such as AODV, DSR and DSDV.

Page 5: Performance analysis of aodv protocol on blackhole attack

What is AODV Protocol?

Ad-hoc On-Demand Distance Vector (AODV) is an on demand routing protocol. which is used to find a route between the source and destination node as needed.

It uses control messages such as Route Request (RREQ),and Route Reply (RREP) for establishing a path from the source to the destination.

Page 6: Performance analysis of aodv protocol on blackhole attack

Why We Use AODV Protocol?

We select AODV protocol because, AODV is capable of both unicast and multicast routing. It is a reactive routing protocol. AODV avoids the counting to infinity problem of other distance-vector protocols. AODV protocol is a flat routing protocol it does not need any central administrative system to handle the routing process.

Page 7: Performance analysis of aodv protocol on blackhole attack

Security Design Issues in AODV

AODV do not have any centrally administered secure routers

Attackers from inside or outside can easily exploit the network.

Passive eavesdropping, data tampering, active interfering, leakage of secret information, DoS etc.

Shared Wireless Medium. Dynamic Topology.

Page 8: Performance analysis of aodv protocol on blackhole attack

Attacks On AODV Protocol

Known attacks on AODV are:

DDOS attackTraffic redirection by modificationReplay attacks Loop formation by spoofingFalse route error.

Page 9: Performance analysis of aodv protocol on blackhole attack

What Is DDOS Attacks?

Distributed Denial of Service (DDoS) attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. This kind of attack, consume more bandwidth and uses more sources in network. One of the most important attacks of DDoS attacks category is Black hole attack.

Page 10: Performance analysis of aodv protocol on blackhole attack

What Is Black Hole Attack?

A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious.

Page 11: Performance analysis of aodv protocol on blackhole attack

Caused Of Black Hole Attack

Black hole attacks in AODV protocol routing level can be classified into two categories:

o RREQ Blackhole attack and o RREP Blackhole attack.

Black hole attack caused by RREQ:

When a node requires a route to a destination, it initiates a route discovery process within the network. It broadcasts a route request (RREQ) packet to its neighbors. (Figure 1)

Page 12: Performance analysis of aodv protocol on blackhole attack

Caused Of Black Hole Attack (Cont..)

Fig1: Propagation of RREQ

Page 13: Performance analysis of aodv protocol on blackhole attack

Caused Of Black Hole Attack (Cont..)

Black hole attack caused by RREP:

Once the RREQ reaches the destination or an intermediate node with a fresh enough route, the destination or intermediate node responds by unicasting a route reply (RREP) packet (Figure 2) back to the neighbor from which it first received the RREQ.

Page 14: Performance analysis of aodv protocol on blackhole attack

Caused Of Black Hole Attack (Cont..)

Fig2: The path of a route reply

Page 15: Performance analysis of aodv protocol on blackhole attack

Conclusion

The performance of routing protocols AODV depends heavily on much kind of attacks. One of these attacks is Black hole attack. This attack has high effect on AODV protocol. I want to show the performance of AODV protocol when it is effected by the black hole attack. I use network simulator-2(NS-2) to show the performance of AODV protocol during black hole attack.