You are on page 1of 15

Behria University Karachi

Topic:
Security Issues in MANET (Black Hole Attack)
Submitted to:
Sir Adnan Nadeem
Muhammad Adil Nasir
Reg. No. 31414
ABSTRACT
Wireless networks are gaining popularity to its peak today, as the users want wireless
connectivity irrespective of their geographic position. There is an increasing threat of
attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the
security threat in which the traffic is redirected to such a node that actually does not
exist in the network. Its an analogy to the black hole in the universe in which things
disappear. The node presents itself in such a way to the node that it can attack other
nodes and networks knowing that it has the shortest path. MANETs must have a
secure way for transmission and communication which is quite challenging and vital
issue. In order to provide secure communication and transmission, researcher worked
specifically on the security issues in MANETs, and many secure routing protocols and
security measures within the networks were proposed.
Previously the works done on security issues in MANET were based on reactive
routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of
attacks were studied, and their effects were elaborated by stating how these attacks
disrupt the performance of MANET.
The scope of this thesis is to study the effects of Black hole attack in MANET using
both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive
routing protocol Ad-Hoc On Demand Distance Vector (AODV). Comparative analysis
of Black Hole attack for both protocols is taken into account. The impact of Black Hole
attack on the performance of MANET is evaluated finding out which protocol is more
vulnerable to the attack and how much is the impact of the attack on both protocols.
The measurements were taken in the light of throughput, end-to-end delay and
network load. Simulation is done in NS-2.
Keywords: MANET, Black Hole, Routing Protocols.
INTRODUCTION
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems.
MANETs consist of mobile nodes that are free in moving in and out in the network.
Nodes are the systems or devices i.e. mobile phone, laptop, personal digital
assistance, MP3 player and personal computer that are participating in the network
and are mobile. These nodes can act as host/router or both at the same time. They
can form arbitrary topologies depending on their connectivity with each other in the
network. These nodes have the ability to configure themselves and because of their
self configuration ability, they can be deployed urgently without the need of any
infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG)
that is devoted for developing IP routing protocols. Routing protocols is one of the
challenging and interesting research areas. Many routing protocols have been
developed for MANETS, i.e. AODV, OLSR; DSR etc.
Security in Mobile Ad-Hoc Network is the most important concern for the basic
functionality of network. The availability of network services, confidentiality and
integrity of the data can be achieved by assuring that security issues have been met.
MANETs often suffer from security attacks because of its features like open medium,
changing its topology dynamically, lack of central monitoring and management,
cooperative algorithms and no clear defense mechanism. These factors have changed
the battle field situation for the MANETs against the security threats. The MANETs
work without a centralized administration where the nodes communicate with each
other on the basis of mutual trust. This characteristic makes MANETs more vulnerable
to be exploited by an attacker inside the network. Wireless links also makes the
MANETs more susceptible to attacks, which make it easier for the attacker to go inside
the network and get access to the ongoing communication. Mobile nodes present
within the range of wireless link can overhear and even participate in the network.
MANETs must have a secure way for transmission and communication and this is a
quite challenging and vital issue as there is increasing threats of attack on the Mobile
Networks. Security is the cry of the day. In order to provide secure communication and
transmission, the engineers must understand different types of attacks and their effects
on the MANETs. Wormhole attack, Black hole attack, Sybil attack, flooding attack,
routing table overflow attack, Denial of Service (DoS), selfish node misbehaving,
impersonation attack are kind of attacks that a MANET can suffer from. A MANET is
more open to these kinds of attacks because communication is based on mutual trust
between the nodes, there is no central point for network management, no authorization
facility, vigorously changing topology and limited resources.
Research Problem
Previously the works done on security issues i.e. Attack (Black Hole attack) involved in
MANET was based on reactive routing protocol like Ad-Hoc On Demand Distance
Vector (AODV). Black Hole attack is studied under the AODV routing protocol and its
effects are elaborated by stating how this attack disrupt the performance of MANET.
Very little attention has been given to the fact to study the impact of Black Hole attack
in MANET using both Reactive and Proactive protocols and to compare the
vulnerability of both these Protocols against the attack. There is a need to address
both these types of protocols as well as the impacts of the attacks on the MANETs.
REVIEW OF PAPERS
RP 1 RP 2 RP 3 RP 4 Rp5
Simulator NS2 network NS-2 version 2.34 NS2 network NS2 network NS2
network
Simulation area 1000m x I000m 800m x 800m 100m X 100m 50m x 50m
Number of nodes 43 10 to 80 20, 30, 40, 50 30
Node type Wi-Fi Wi-Fi Wi-Fi Wi-Fi Wi-Fi
Mobility Random2way Up to 3 m/s Random Way point Random Way point
Mac layer 802 -II - IEEE 802.l5.4 IEEE 802.11b
Channel Wireless Wireless Wireless Wireless Wireless
Malicious nodes 1 1 3 1 2
Simulation Time 15 seconds - 100 seconds 30 seconds
Start time 1 sec 1 sec 1 sec 1 sec
Routing Protocol AODV AODV DOA and AODV DOA and AODV
ANALYSIS:
Rp1
This research paper is about Clustering of Mobile Ad Hoc Networks. Using the above
given simulation parameters, the proposed simulation model is designed and
simulated. The overall work is defined using two different scenarios, first with the
simple AODV routing protocol and with the traditional MANET. This simulates how the
communication is initiated by any sender node and how the malicious node stops the
communication between sender and receiver. During attack conditions not any data
packets are sent between sender and receiver, therefore throughput of the network
becomes O. The above given result is evaluated during first network simulation
scenario. After implementation of the proposed system, a malicious node is inserted
during third session which is represented usmg session 3. During first two sessions are
free from malicious node and after introducing malicious node that becomes 0
throughput of network. Here estimated throughput in terms of MBPS.
Rp2
This research paper is about Black hole Effect Mitigation Method in AODV Routing
Protocol. A simulation model was developed using NS-2 where the evaluation was
done by analyzing performance results of three conditions below,
1) using normal AODV protocol
2) using AODV protocol with ERDA method
3) using AODV protocol with EAODV method
Researchers simulated the black hole attack scenario in five network topologies. The
simulation model was setup to observe the effect of network performance in various
number of CBR connections with different number of attacks. The results of
performance using Normal AODV, AODV with ERDA method and AODV with EAOD
method were analysed. Packet Delivery Ratio (PDR) was used as an evaluation metric
to measure the performance. Overall simulation parameters were summarized. In
order to ensure consistency and uniformity in the same connection pattern was used
throughout all experiments.
In comparing, ERDA and EODV method, the results show that EAODV is considerably
better results than ERDA method. By varying the CBR connections and number of
malicious nodes in the experiments, the EOADV performance consistently shows
better results as compared to ERDA.
Rp3
The performance of DOA and AODV routing protocols injected with black hole attack
and the performance without attack is analyzed by varying the size of the network. The
evaluation result showed that the packet delivery ratio drastically decreases when the
malicious node is present in the network and is better during nil effect of Black hole
attack. This is caused by the Black hole attack because few packets are discarded by
the black hole node. Simulation results show that DOA gives better performance even
when malicious node is present in the network. The performance of DOA is
significantly better with black hole attack due to the segmental clustered hierarchical
nature of DOA as malicious nodes provide the path with less number of nodes.
Rp4
The simulation is done using NS-2, to analyze the performance of the network by
varying the nodes mobility. The metrics used to evaluate the performance are given
below.
a. Packet Delivery Ratio: The ratio between the number of packets originated by the
application layer Constant Bit Rate (CBR) sources and the number of packets
received by the CBR sink at the final destination.
b. Throughput: Throughput is the average rate of successful message delivery over a
communication channel.
c. Node Mobility: Node mobility indicates the mobility speed of nodes.
The effect to the packet delivery ratio (PDR) measured for the AODV protocol when
the node mobility is increased. The result shows both the cases, with the black hole
attack and without the black hole attack. It is measured that the packet delivery ratio
dramatically decreases when there is a malicious node in the network. For example,
the packet delivery ratio is 100% when there is no effect of Black hole attack and when
the node is moving at the speed 10 m/s. But due to effect of the Black hole attack the
packet delivery ratio decreases to 82 %, because some of the packets are dropped by
the black hole node.
It is observed that, the impact of the Black hole attack to the Networks throughput. The
throughput of the network also decreases due to black hole effect as compared to
without the effect of black hole attack. We vary the speed of the node and take the
result to the different node speed.
Rp5
Researchers have proposed solutions to identify and eliminate a single black hole
node. However, the case of multiple black hole nodes acting in coordination has not
been addressed. For example, when multiple black hole nodes are acting in
coordination with each other, the first black hole node B1 refers to one of its
teammates B2 as the next hop. The source node S sends a Further Request (FRq) to
B2 through a different route (S-2-4-B2) other than via B1. Node S asks B2 if it has a
route to node B1 and a route to destination node D. Because B2 is cooperating with B1,
its Further Reply (FRp) will be yes to both the questions. Now per the solution
proposed in, node S starts passing the data packets assuming that the route S-B1-B2
is secure. However, in reality, the packets are consumed by node B1 and the security
of the network is compromised.
SUMMARY / CONCLUSION
Mobile Ad-Hoc Networks has the ability to deploy a network where a traditional
network infrastructure environment cannot possibly be deployed. With the importance
of MANET comparative to its vast potential it has still many challenges left in order to
overcome. Security of MANET is one of the important features for its deployment. In
our thesis, we have analyzed the behavior and challenges of security threats in Mobile
Ad-Hoc Networks with solution finding technique. Although many solutions have been
proposed but still these solutions are not perfect in terms of effectiveness and
efficiency. If any solution works well in the presence of single malicious node, it cannot
be applicable in case of multiple malicious nodes. After studying all the approaches,
our conclusion is that the approach offered by Deng suit well in our scenario. The
intermediate reply messages if disabled leads to the delivery of message to the
destination node will not only improve the performance of network, but it will also
secure the network from Black Hole attack.
In a network it is important for a protocol to be redundant and efficient in term of
security. The percentage of severances in delay under attack is 2 to 5 percent and in
case of OLSR, where as it is 5 to 10 percent for AODV. The throughput of AODV is
effected by twice as compare of OLSR. In case of network load however, there is
effect on AODV by the malicious node is less as compare to OLSR. Based on our
research and analysis of simulation result we draw the conclusion that AODV is more
vulnerable to Black Hole attack than OLSR
References
[1] Jitendra Sayner, Vinit Gupta, Clustering of Mobile Ad Hoc Networks: An
Approach for Black Hole Prevention
[2] Zaid Ahmad, Kamarularifin Abd. Jalil & Jamalul-lail Ab Manan, Black hole Effect
Mitigation Method in AODV Routing Protocol
[3] P. R. Jasmine Jeni, A. V imala Juliet, R. Parthasarath y & A. Messiah Bose,
Performance Analysis of DOA and AODV Routing Protocols with Black Hole Attack in
MANET
[4] Rajib Das, Dr. Bipul Syam Purkayastha & Dr. Prodipto Das, Security Measures
for Black Hole Attack in MANET: An Approach
[5] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and
Kendall Nygard, Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc
Networks

You might also like