You are on page 1of 22

PREVENTION OF BLACK

HOLE ATTACK IN AODV


ROUTING ALGORITHM
USING MANET

BY
A.ARIVU
SELVI(312216403004)
A.ASLINE
CELES(312216403005)
OVERVIEW
A Mobile Ad hoc Network (MANET) is a temporary
wireless network formed by the collection of mobile
nodes which help in transferring the information and
managing the network.
To detect and prevent the black hole attack and to
provide efficient data transmission and secure
communication.
Since secure communication is the most demanding
issue in MANETs due to its various vulnerabilities.
BLACK HOLE ATTACK
BLACK HOLE ATTACK

The black hole attack is one of the well-known security


threats in wireless mobile ad hoc networks.
The intruders utilize the loophole to carry out their
malicious behaviors because the route discovery
process is necessary.
AODV
AODV (AdHoc on demand distance vector) requests only a
route when needed and does not require nodes to maintain
routes to the destinations that are not actively used in
communication.
Route discovery in AODV is done by broadcasting RREQ
(Route Request) and RREP (Route Reply) packet.
After receiving RREP node modifies its routing table and
start sending data.
If node receives more than one RREP packets for same
destination from different nodes in the network then node
will chose the shortest route to destination.
DSR
DSR (Dynamic Source Routing) is a source initiated/reactive
protocol as AODV protocol.
Difference in AODV and DSR is that AODV only stores address
of next hop to the destination but DSR stores complete route
from source to destination including all the intermediate nodes.
Sender of the packet discovers the complete path through which
to forward the packets.
The sender explicitly lists this route in the packets header,
identifying each forwarding hop by the address of the next
node to which to transmit the packet on its way to the destination
host.
DSDV
DSDV (Destination-Sequenced Distance-Vector Routing) is a
table routing protocol in which routes to all the nodes in the
network are discovered in advance.
In DSDV Protocol, every node stores one or more routing
tables.
The sequence number stored in routing table is used to make
the protocol loop free.
Every node maintains a monotonically increasing sequence
number for itself.
It also maintains the highest known sequence number for
each destination in the routing table.
REFERNCES
TITLE JOURNAL INFERENCE
Performance evaluation of International conference The author presents a
AODV under Blackhole on ICT in Business performance analysis of
attack in MANET using industry and Government using AODV in MANET
NS2 IEEE Conference for various network
Publications(2016) parameters like
PDR,Throughput.

AODV-based secure Recent Trends in The author adds a validity


routing against blackhole electronics and value along with the route
attack in MANET communication technology request and is being
IEEE conference (2016) updated in the routing
table.The AODV remains
unchanged.
TITLE JOURNAL INFERENCE
Black hole attack detection International conference on The author proposes a real
and prevention by real time Computing time method of providing a
monitoring communications and count of the packets being
network technologies dropped by the malicious
2013 nodes.

Mitigate black hole attack International The author uses trust


using trust with AODV in Conference on based algorithm in
MANET Computing for AODV routing
sustainable global algorithm .
development. TREQ(Trust request
2016 message),TREP(Trust
reply
message),TWARN(Tru
st warning message)
MOTIVATION
With the increase of portable devices as well as
progress in wireless communication, ad-hoc
networking is gaining importance and is also being
vulnerable to various attacks.
To detect the malicious nodes in MANET for
preventing the black hole attack for enhancing the
security of the system, and to provide efficient packet
delivery.
METHODOLOGY
An approach to enhance the routing protocol AODV to
be more secure and to use it in case of black hole
attacks since the demand of using MANETs are found
to be increasing with the past of each day.
AODV can be extended by adding control packets and
threshold value: Secure Reliable Route Discovery
Request (SRRD_REQ) and Secure Reliable Route
Discovery Reply (SRRD_REP).
DETECTION OF BLACK
HOLE
In order to detect black hole attack, a mechanism based
on watchdog has been designed.
Watchdog detect misbehavior nodes by monitoring the
transmission of next hop neighbor.
The watchdog increments the failure count of the node
which is responsible for forwarding packets.
The node is detected as misbehaving node when the
failure count exceeds some threshold value and a
notification message is sent to source node .
DETECTION OF BLACK
HOLE
DETECTION OF BLACK
HOLE
TRACE FILE
PREVENTION OF BLACK HOLE
ATTACK
SOCIAL RELEVANCE
Ad-hoc networking can be applied anywhere where there
is little or no communication infrastructure or the
existing infrastructure is expensive or inconvenient to use
Military Battlefield: Military equipment now routinely
contains some sort of computer equipment. Ad- hoc
networking would allow the military to take advantage of
commonplace network technology to maintain an
information network between the sol-diers, vehicles, and
military information headquarters. The basic techniques
of ad hoc network came from this field
Commercial Sector: Ad hoc can be used in
emergency/rescue operations for disaster relief efforts,
e.g. in fire, flood, or earth-quake
Information is relayed from one rescue team member to
another over a small hand held. Other commercial
scenarios include e.g. ship-to-ship ad hoc mobile
communication

You might also like