You are on page 1of 16

synopsis on

SIMULATION OF BLACK HOLE ATTACK IN AODV


PROTOCOL USING NS2

R.V. COLLEGE OF ENGINEERING
Department of TCE

Under The Guidance Of
Ms. KAMAKSHI M B
Assistant Professor
Department Of T.E.
Submitted by
A . BALA KISHORE
(1RV12LDC02)
CONTENTS
Introduction
Literature survey
Motivation
Problem Definition
Objectives
Proposed Methodology
Expected Outcome
Project Schedule
References

INTRODUCTION

MANET
A mobile ad hoc network (MANET) is a self-configuring
infrastructure less network of mobile devices connected by
wireless links.
Each device in a MANET is free to move independently in any
direction, and will therefore change its links to other devices
frequently.
Routes between nodes may potentially contain multiple hops
Nodes act as routers to forward packets for each other
Node mobility may cause the routes change


A
B
C

D
A
B
C

D
INTRODUCTION(CONT..)
ADVANTAGES OF AD HOC NETWORKS
No infrastructure and lower cost
Mobility
Decentralized and robust
Easy to build and spontaneous infrastructure
Cost effective
Less setup time

USAGE
Military environments, emergency and rescue operations, meeting rooms, etc

INTRODUCTION(CONT..)
AODV ROUTING PROTOCOL
Ad hoc On-Demand Distance Vector (AODV) is a reactive routing protocol
The communication involves mainly three procedures , i.e. path discovery,
establishment and maintenance of the routing paths using 3 types of control
messages. Those are Request (RREQ), Route Reply (RREP) and Route Error
(RERR) messages.

INTRODUCTION(CONT..)

SECURITY ISSUE
Security has become a primary concern to provide protected communication between
mobile nodes in a hostile environment of MANET as they are more vulnerable than
wired networks

BLACK HOLE ATTACK
Black hole attack is one such attack in which a malicious node makes use of the
vulnerabilities of the route discovery packets of the routing protocol to advertise itself
as having the shortest path to the node whose packets it wants to intercept.

To prevent this attack, an algorithm is proposed that detects the black hole node and
finds new path to the destination


LITERATURE SURVEY
Proactive(periodic) protocols and Reactive(on-demand) protocols are the two main
categories of routing protocols in ad hoc networks . AODV, Adhoc on demand distant
vector [2] is one of such reactive routing protocols with weaker design, which is
prone to numerous security threats including Denial-of- Service (DoS) attacks such
as Black hole attack[3].
Black hole attack and wormhole attack[4] are some of the security attacks in which
malicious users monitor the data and make the network inactive.
paper [1] studies several types of attacks, and then discusses one of the most severe
attack in the network, black hole attack.





MOTIVATION
MANETS are gaining popularity in every field because of their flexibility,
mobility and independent of infrastructure. By considering the security issue
and thereby attempt is made to overcome the problem of black hole attack.
PROBLEM DEFINITION
Detection and avoidance of black hole node to provide security for packet
transmission in Mobile adhoc networks using AODV protocol.
OBJECTIVES
To Study about AODV protocol
To learn and understood about black hole attacks.
To implement AODV protocol and add malicious node (black hole) in the
network.
To implement the algorithm that detects the black hole node in the network
and bypasses it.
Calculate throughput, end to end delay and packet delivery ratio of the
network without black hole node and with black hole node and compare.



PROPOSED METHODOLOGY
When source node broadcast messages to all the nodes, each node will check in its
routing table if it has a route to destination.
If it has a route, it will send packet to destination else it will again broadcast the
packet to its neighboring nodes.
The malicious node (Blackhole node) only receives packet but wont forward packet
to other nodes instead it will reply to the source that it has the shortest path to
destination.
So the packet delivery ratio of the network in the presence of black hole is 0.
This algorithm detects those nodes which only receives packets but does not forward
them, and adds such nodes information into quarantine list so that all other nodes in
the network ignores the packets recieved from quarantine list nodes and wont
forwards the packet to them.
The packets will reach the destination in fresh route avoiding blackhole nodes.



Expected outcome
The parameters Throughput, Packet Delivery Ratio and Average End to
End Delay are calculated for normal network, network with black hole and
network bypassing black hole.
PROJECT SCHEDULE

Month Week Proposed work
august 1
st
2
nd
week
3
rd
- 4
th
week

Study the security issues of manet and related papers
september 1
st
-2
nd
week
3
rd
4
th
week

Understanding the concept of aodv protocol and doing literature
survey.

October 1
st
-2
nd
week
3
rd
4
th
week

Presentation of synopsys
Learning ns2 software.
November 1
st
-2
nd
week
3
rd
4
th
week

Implement AODV protocol in ns2 software and checking result
by adding malicious node and
preparation of report for Phase-1 review

December 1
st
2
nd
week
3
rd
- 4
th
week

Study and understood about black hole prevention algorithm
january 1
st
3
rd
week
4
th
week

Write a code for algorithm and preparation of report for phase -
2
Phase-2 review

February to april Implement the code in ns2 and observe the results of PDR,end
to end delay, and throughput.
PROJECT SCHEDULE
Month Week Proposed work
May Report writing and documentation
June Phase 3 review(demo of project)
/
REFERENCES
1. Mandala, S.; Abdullah, A.H.; Ismail, A.S.; Haron, H.; Ngadi, M.A.; Coulibaly, Y., "A review of black
hole attack in mobile adhoc network," Instrumentation, Communications, Information Technology, and
Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on , vol., no., pp.339,344, 7-
8 Nov. 2013.
2. Perkins, C.E.; Royer, E.M., "Ad-hoc on-demand distance vector routing," Mobile Computing Systems
and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on , vol., no., pp.90,100, 25-
26 Feb 1999.
3. Medadian, M.; Mebadi, A.; Shahri, E., "Combat with Black Hole attack in AODV routing
protocol," Communications (MICC), 2009 IEEE 9th Malaysia International Conference on , vol., no.,
pp.530,535, 15-17 Dec. 2009.
4. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, Black-Hole and Wormhole Attack in Routing
Protocol AODV in MANET , International Journal of Computer Science, Engineering and
Applications (IJCSEA) Vol.2, No.1, February 2012.
5. Ipsa De, Debdutta Barman Roy, Comparative study of Attacks on AODV-based Mobile Ad Hoc
Networks, International Journal on Computer Science and Engineering (IJCSE).

You might also like