This document provides an overview of a project that aims to simulate and address a black hole attack in the AODV routing protocol in a mobile ad hoc network (MANET) using the NS2 network simulator. The document outlines that the project will implement the AODV protocol in NS2, introduce a malicious node to emulate a black hole attack, develop an algorithm to detect the black hole node, and compare network performance metrics like throughput, delay and packet delivery ratio with and without the black hole node. The project is scheduled over 6 months and expects to identify black hole nodes, bypass them and observe improved network performance after implementing the detection algorithm.
This document provides an overview of a project that aims to simulate and address a black hole attack in the AODV routing protocol in a mobile ad hoc network (MANET) using the NS2 network simulator. The document outlines that the project will implement the AODV protocol in NS2, introduce a malicious node to emulate a black hole attack, develop an algorithm to detect the black hole node, and compare network performance metrics like throughput, delay and packet delivery ratio with and without the black hole node. The project is scheduled over 6 months and expects to identify black hole nodes, bypass them and observe improved network performance after implementing the detection algorithm.
This document provides an overview of a project that aims to simulate and address a black hole attack in the AODV routing protocol in a mobile ad hoc network (MANET) using the NS2 network simulator. The document outlines that the project will implement the AODV protocol in NS2, introduce a malicious node to emulate a black hole attack, develop an algorithm to detect the black hole node, and compare network performance metrics like throughput, delay and packet delivery ratio with and without the black hole node. The project is scheduled over 6 months and expects to identify black hole nodes, bypass them and observe improved network performance after implementing the detection algorithm.
Under The Guidance Of Ms. KAMAKSHI M B Assistant Professor Department Of T.E. Submitted by A . BALA KISHORE (1RV12LDC02) CONTENTS Introduction Literature survey Motivation Problem Definition Objectives Proposed Methodology Expected Outcome Project Schedule References
INTRODUCTION
MANET A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Routes between nodes may potentially contain multiple hops Nodes act as routers to forward packets for each other Node mobility may cause the routes change
A B C
D A B C
D INTRODUCTION(CONT..) ADVANTAGES OF AD HOC NETWORKS No infrastructure and lower cost Mobility Decentralized and robust Easy to build and spontaneous infrastructure Cost effective Less setup time
USAGE Military environments, emergency and rescue operations, meeting rooms, etc
INTRODUCTION(CONT..) AODV ROUTING PROTOCOL Ad hoc On-Demand Distance Vector (AODV) is a reactive routing protocol The communication involves mainly three procedures , i.e. path discovery, establishment and maintenance of the routing paths using 3 types of control messages. Those are Request (RREQ), Route Reply (RREP) and Route Error (RERR) messages.
INTRODUCTION(CONT..)
SECURITY ISSUE Security has become a primary concern to provide protected communication between mobile nodes in a hostile environment of MANET as they are more vulnerable than wired networks
BLACK HOLE ATTACK Black hole attack is one such attack in which a malicious node makes use of the vulnerabilities of the route discovery packets of the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept.
To prevent this attack, an algorithm is proposed that detects the black hole node and finds new path to the destination
LITERATURE SURVEY Proactive(periodic) protocols and Reactive(on-demand) protocols are the two main categories of routing protocols in ad hoc networks . AODV, Adhoc on demand distant vector [2] is one of such reactive routing protocols with weaker design, which is prone to numerous security threats including Denial-of- Service (DoS) attacks such as Black hole attack[3]. Black hole attack and wormhole attack[4] are some of the security attacks in which malicious users monitor the data and make the network inactive. paper [1] studies several types of attacks, and then discusses one of the most severe attack in the network, black hole attack.
MOTIVATION MANETS are gaining popularity in every field because of their flexibility, mobility and independent of infrastructure. By considering the security issue and thereby attempt is made to overcome the problem of black hole attack. PROBLEM DEFINITION Detection and avoidance of black hole node to provide security for packet transmission in Mobile adhoc networks using AODV protocol. OBJECTIVES To Study about AODV protocol To learn and understood about black hole attacks. To implement AODV protocol and add malicious node (black hole) in the network. To implement the algorithm that detects the black hole node in the network and bypasses it. Calculate throughput, end to end delay and packet delivery ratio of the network without black hole node and with black hole node and compare.
PROPOSED METHODOLOGY When source node broadcast messages to all the nodes, each node will check in its routing table if it has a route to destination. If it has a route, it will send packet to destination else it will again broadcast the packet to its neighboring nodes. The malicious node (Blackhole node) only receives packet but wont forward packet to other nodes instead it will reply to the source that it has the shortest path to destination. So the packet delivery ratio of the network in the presence of black hole is 0. This algorithm detects those nodes which only receives packets but does not forward them, and adds such nodes information into quarantine list so that all other nodes in the network ignores the packets recieved from quarantine list nodes and wont forwards the packet to them. The packets will reach the destination in fresh route avoiding blackhole nodes.
Expected outcome The parameters Throughput, Packet Delivery Ratio and Average End to End Delay are calculated for normal network, network with black hole and network bypassing black hole. PROJECT SCHEDULE
Month Week Proposed work august 1 st 2 nd week 3 rd - 4 th week
Study the security issues of manet and related papers september 1 st -2 nd week 3 rd 4 th week
Understanding the concept of aodv protocol and doing literature survey.
October 1 st -2 nd week 3 rd 4 th week
Presentation of synopsys Learning ns2 software. November 1 st -2 nd week 3 rd 4 th week
Implement AODV protocol in ns2 software and checking result by adding malicious node and preparation of report for Phase-1 review
December 1 st 2 nd week 3 rd - 4 th week
Study and understood about black hole prevention algorithm january 1 st 3 rd week 4 th week
Write a code for algorithm and preparation of report for phase - 2 Phase-2 review
February to april Implement the code in ns2 and observe the results of PDR,end to end delay, and throughput. PROJECT SCHEDULE Month Week Proposed work May Report writing and documentation June Phase 3 review(demo of project) / REFERENCES 1. Mandala, S.; Abdullah, A.H.; Ismail, A.S.; Haron, H.; Ngadi, M.A.; Coulibaly, Y., "A review of black hole attack in mobile adhoc network," Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on , vol., no., pp.339,344, 7- 8 Nov. 2013. 2. Perkins, C.E.; Royer, E.M., "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on , vol., no., pp.90,100, 25- 26 Feb 1999. 3. Medadian, M.; Mebadi, A.; Shahri, E., "Combat with Black Hole attack in AODV routing protocol," Communications (MICC), 2009 IEEE 9th Malaysia International Conference on , vol., no., pp.530,535, 15-17 Dec. 2009. 4. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET , International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012. 5. Ipsa De, Debdutta Barman Roy, Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks, International Journal on Computer Science and Engineering (IJCSE).