Академический Документы
Профессиональный Документы
Культура Документы
The AODV [1] is soft target for malicious node that resides B. Security
inside the network. Its performance degraded due to malicious
nodes as they dropall the data packets. It is known as "Co- In MANET nodes are connected with a wireless network. In
Operative Black hole Attack". Due to this type of nature nodes this type of net work data is transferred between sender and
are feeble to much type of attacks. The MANET suffers from receiver through intermediate nodes. All nodes must act as
disruption so that node may or may not take part in path router to deliver the packet to destination node. Nodes act as
finding methods with an intension to spoil the full net work both host and router, in such type of net work many types of
functioning. The network topology is rapidly change due to security attacks can occur which disturb the network
nodes mobility, resource constraint and bandwidth limitation operation. Such nodes dropped the data and transfer to its
of wireless medias [2]. desired destination instead of original destination. Security
attacks are generally two types: Passive attacks and Active with size of network. That’s why performance of network
attacks. Some attacks are like Black Hole, Worm Hole, Grey decline in result. The Destination-Sequenced distance vector
Hole, Sink Hole disturb the functioning of network. Security (DSDV) and Wireless Ad-hoc Routing (WARP) are two
criteria guaranteed the safety of network like: Integrity, examples of table driven protocols.
authorization, authenticating, confidentially,
nonrepudiation[3]. B. On-Demand Routing Protocol
F. Scalability
Scalability occurs in MANET due to multihop applications.
Mobile adhoc network involve huge networks. Scalability is
critical to the successful deployment of these networks. A
large network of nodes with limited resources has many
challenges like: addressing, routing security etc. Scalability
depends on network size and packet capacity.
819
2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),
Dec. 18-20, 2017, ADET, Amity University Dubai, UAE
820
2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),
Dec. 18-20, 2017, ADET, Amity University Dubai, UAE
it in this case. Attacker node participates in route finding with the behavior of the normal protocol. This process stores
methods by sending RREP message. When source node starts the last three hoptimes for a route reply acknowledged by the
transmission of data, the faulty node do not forward them to destination and the interruption time is calculated between the
destination and destroy them. It is more destructive than grey request and reply divided by the hop count.
hole attack [6],[9].
A Siddiqua et. al.[14] in the year 2015 proposed a new
TABLE III: Comparison between Effects of Security Attacks technique using secure knowledge algorithm in which it
promises data delivery to receiver node to identify and stop
Black Hole Worm Hole Flooding Black Hole attack in MANET and also finds the reasons
Attack Attack Attack behind the packet drop before asserting node as a black-hole
Throughput More with Not Evaluated Not node. In this work, Modified AODV protocol isused, so that
DSR Evaluated each node in the network compares the information resides in
its neighbor node and stores in its fm and rm table entries. Fm
Probability of Great Great Lower table have the details about the recent packet and rm table hold
Success the detail about neighbouring node like destination address,
Damage Lesser Maximum Lesser TTL value, and node energy. If values fm≠rm and cut-off value
is reached then attack other wise node will be trusted. If rm
Technical Lower Higher Lower
and threshold value is reached then it will be a Black hole
Skills
attack.
Packet More with Not Evaluated Not
Delivery DSR Evaluated A. S. Bhandare et. al.[15] in 2015 proposed a detection and
defence mechanism against co-operative black hole attack. It
Solving Less than Maximum Lesser
removes malicious nodes by identifying abnormal activities.
Complexity Worm hole
The performance of proposed method checked with more than
E. Flooding attack one malicious node and improved the PDR upto 76 to 99%.
The best part of this method is that unsafe route decided by
In this attack malevolent nodes inject phony packets in the source node only and no any additional overhead required.
network and flood the network with these unnecessary packets
which creates ghost packets that loop around. The effected N. Choudhary et. al.[16] in the year 2015 used timer based
nodes are not able to receive or forward any packet. Ghost approach to stop black hole attack. This approach identifies
packets are using bandwidth and processing resources along the action of next node on network layer proposed. Results
the way. That affects the network. Certain node can lead to simulated over EXata-Cyber and get improved results. Each
damage cost. node assigned a trust value by its neighbor and a timer also
attached with each data packet. A node is black listed by its
F. Byzantine Attack neighbours if its trust value decreases below specified
threshold.
This type of attack can be done by one or more intermediary
nodes that are working with in network, behaving as A. Dorri et. al.[17] in the year 2015 proposed a new method
malevolent nodes they carry out attacks for example creating for detection and elimination of co-operative malevolent nodes
routing loops or transfer the data packets through nonoptimal in MANET based on AODV routing protocol. In this approach
path or selectively dropping the packets which result disturb safety of path ensured by checking both previous and next
the network. It degrades the routing efficiency within network. hop. Simulation results show that it takes less processing time
Such attacks are difficult to identify. and low over head.
G. Spoofing Attack R. K. Chauhan et. al.[18] in the year 2015 gives a solution for
In this attack, the attacker node pre supposes the black hole attack detection. A local utility function based
strategy was proposed with the help of hint-based probabilistic
characteristics of other node and receives the messages of that
routing protocol to identify black hole nodes. Tip value of
node. This attack can be introduced by any harmful node,
each node is computed and stored in the buffer of each node. It
which is familiar with network credential [12].
calculates the hint value of all the surrounding nodes of sender
VII. RECENT DEVELOPMENT IN SECURITY and test the value with trusted authority (Hint Value<=Trusted
MECHANISM FOR MANET Authority), if the result is yes then set them as black hole node
otherwise fair node.
M. A. Abdelshafy[13] in 2016 proposed a new method called
BRM-AODV protocol which will find the black hole A. K. Jain et. al.[19] in the year 2015 proposed a method for
neighbours. This method uses a Self-Protocol Trustiness that black hole attack detection using route reply caching
detects the malicious attacker which is skilled by complying mechanism. It is based on first Route Reply (RREP) caching
821
2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),
Dec. 18-20, 2017, ADET, Amity University Dubai, UAE
strategy in AODV protocol. Simulation shows that this A modern approach to improve the recital of AODV for
modified AODV protocol works very well under many black MANET was proposed by VK Sagtani et al.[24] ans
hole nodes. significant improvement in performance of AODV observed
in terms of packet delivery ratio.
R. Kumar et. al.[20] in the year 2015 proposed a solution for
black hole attack detection and modifies the AODV at source VIII. CONCLUSION
and destination node. This approach adds extra function at
This paper discussed various routing protocols of distinct
source node as well as destination node so whenever a RREP
nature and issues of security in MANET. Here we have
or RREQ message comes to the respective node it checks the
focused on types of security attacks in routing protocols. The
sequence number of the packets and compares it with the
main focus is on the black hole attack in network and its
threshold value. The threshold value is defined for three
detection and prevention methods. A detailed study of selected
environments small, medium and large and compares it with
existing methods for detection of black hole attacks in
respective environment threshold value. In this approach the
MANETs presented. A detailed analysis of different types of
receiver and the sender nodes verifies the sequence number in
security attacks are summarized in form of a table in Table IV.
the Route reply and Route Request messages respectively.
The detection methods which make use of table driven routing
Everytime RREP and RREQ messages come to the respective
protocol have superior packet delivery. This detection method
nodes and the sequence number of the packet compares with
make correct detection probability. This technique has higher
the threshold value to prevent and detect the black hole attack
overhead while detecting the black hole attack in MANET. In
in a network. Here threshold value is given for three different
the survey we have reviewed different methods and techniques
environments (Small, Medium, and Large) and compare it
to defy the blackhole attacks.
with respective threshold value.
REFERENCES
R. J. Cai et. al.[21] in the year 2014 introduces extended
neighbourhood connectivity based trust scheme which [1] R C Poonia, D. Bhargava, and B.Suresh Kumar.
periodically broadcasts hello message to couple of hops in "CDRA:Cluster-based dynamic routing approach as a
place of direct neighbours. The proposed strategy can identify development of the AODV in vehicular ad-hoc networks." In
the single and conspired attackers during route finding and Signal Processing and Communication Engineering Systems
(SPACES), 2015 International Conferenceon, pp.397-401.
remove them. Now when source node gets a route reply from
IEEE, 2015.
three hops, then firstly it will find the information stored in
[2] R. Sheikh, MS Chandel, DK Mishra, “Security Issuesin
neighbourhood connectivity information table (NCIT). If the MANET: Areview”, IEEE 2010.
replied path is not reliable with the NCIT, Source node will [3] S.Umang, BVR Reddy, MN Hoda, “Enhanced intrusion
fall this RREP and down the trust level of node intermediate Detection System for Malicious Node detection in ADHoc
node1. Routing Protocols using Minimal energy Consumption”, IET
Communications 4(17): 2084-2094. 2010.
R. Syed et. al.[22] in the year 2014 proposed scheme for [4] B Wu, J Chen, J Wu, M Cardei, "A survey of attacks and
avoidance of Black hole Attack using AODV. The anticipated counter measures in mobile adhoc networks. "Wireless network
approach makes use of a route legitimacy value associated security (2007):103-135.
with RREP which make sure that there is no any black hole [5] A. Shastri, R. Dadhich, and R.C. Poonia. "Performance analysis
node in the route. Here RREP is using an additional table to of on-demand Routing protocols for vehicular ad-hoc
store validity value with other required details of node like Networks. "International Journal of Wireless & Mobile
destination sequence number. A legitimacy check isused at Networks (IJWMN) Vol3 (2011):103-111.
receiver node which gives the authenticity of a route and made [6] R A R Mahmood, A L Khan, “A Survey on Detecting Black
Hole Attack in AODV-based Mobile AdHoc networks” In
a secure entry in routing table with low processing overhead. High Capacity Optical Networks and Enabling Technologies,
2007. HONET 2007. International Symposium on, pp.1-6.
Mohar lal priya and Krishnamurthi[23] in 2014 proposed a IEEE, 2007.
new modified protocol called as Modified Dynamic Source [7] MS Alkatheiri J Liu, A R Sangi, “AODV Routing Protocol
Routing Protocol (MDSR). A light weight, energy efficient under several Routing Attacks in MANETs” In Communication
and non-cryptographic solution is proposed forgray-hole Technology (ICCT), 2011 IEEE 13th International
detection process in MANET. The malicious nodes isolated Conferenceon, pp.614-618. IEEE, 2011.
just after detection. This scheme gives routing security with [8] S Corson and J Macker, “Mobile adhoc networking (MANET):
64% reduction in packet loss rate than DSR. In this strategy Routing protocol performance issues and evaluation
firstly the source node picks the shortest path for the actual considerations,” IETFRFC 2501, Jan.1999.
transmission or to forward the packets. Next the packet count [9] S. Hazra, and S.K. Setua. “Black Hole Attack Defending
and the transmitted data is compared and if there is any Trusted On-Demand Routing in Ad-Hoc Network.” In
Advanced Computing, Networking and Informatics-Volume2,
difference then it will notify to all its immediate neighbours
pp.59-66. Springer International Publishing, 2014.
that there is hidden or faulty node is near in the network.
822
2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),
Dec. 18-20, 2017, ADET, Amity University Dubai, UAE
[10] S. Jain, M. Jain, H. Kandwal, “Advanced Algorithm for Information and Knowledge Technology (IKT), 2015 7th
Detection and Prevention of Cooperative Black and Gray hole Conference on.IEEE,2015.
Attacks in Mobile Ad-hoc Networks“, Intl. Journal of [18] R.K Chauhan "An assessment based approach to detect black
Computer Application 1(7): 37-42, Feb. 2010. hole attack in MANET." Computing, Communication &
[11] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Automation (ICCCA), 2015 International Conference on.
Adhoc Network,” Mobile Computing T. Imielinski and IEEE2015.
H.Korth, Eds., Kulwer Publ.,1996, pp.152-81. [19] AK Jain and V Tokekar. "Mitigating the effects of Black hole
[12] Al-Shurman, M.Yoo, S.Park, “Black hole attack in Mobile attacks on AODV routing protocol in Mobile adhoc Networks."
Adhoc Networks” in Proc. ACM Southeast Regional Pervasive computing (ICPC), 2015 international conference on.
Conference, pp.96-97, 2004. IEEE, 2015.
[13] MA Abdelshafy and PJ King. “Resisting Blackhole Attacks on [20] R. Kumar, A Quyoom, and DN Gouttam. "To mitigate black
MANETs”. Consumer Communications & Networking hole attack in AODV." Next Generation Computing
conferenceon IEEE,2016. technologies (NGCT), 2015 1st International Conference on
[14] A.Siddiqua, S.Kotari, and AAKhan Mohammed. “Preventing IEEE, 2015.
black hole attacks in MANETs using secure knowledge [21] R J Cai, P.H.J. Chong, and C Y Aung. "Poster: Trust-based
algorithm. "Signal Processing and Communication Engineering routing with neighborhood connectivity to preventsing leand
Systems (SPACES), 2015 International Conferenceon. IEEE, colluded active black hole." Communications and Networking
2015. in China (CHINACOM), 2014 9th International Conferenceon.
[15] AS Bhandare, and SB Patil. “Securing MANET against IEEE, 2014.
Cooperative Black Hole Attack and Its Performance Analysis- [22] U-H. Syed, AI Umar, and F Khurshid. "Avoidance of Black
A Case Study." Computing Communication Control and hole affected routes in AODV-based MANET." Open Source
Automation (ICCUBEA), 2015 International Conferenceon. Systems and Technologies, 2014 International Conference on.
IEEE,2015. IEEE, 2014.
[16] N.Choudhary and L.Tharani. “Preventing black Hole attack in [23] M Moharlalpriya and I Krishnamurthi. “Modified DSR
AODV using timer-based detection mechanism. ”Signal protocol for detection and removal of selective black hole
processing and communication engineering systems attack in MANET”, Comput. Electr. Eng., 40: 530-538. 2014
(SPACES), 015 international conferenceon. IEEE,2015. [24] VK Sagtani, and SKumar, “Modern Approach to Enhance
[17] A. Dorri and H.Nikdel. “A new approach for detecting And Routing Recitation in MANET”. International Journal of
eliminating cooperative black hole nodes in MANET”. Emerging Technology and Advanced Engineering, 4(7),
pp.265-270, 2014
TABLE IV: Literature Survey of Detection and Prevention Techniques During Black Hole Attack
823
2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),
Dec. 18-20, 2017, ADET, Amity University Dubai, UAE
824