Академический Документы
Профессиональный Документы
Культура Документы
Introduction
Mobile Ad hoc Network (MANET) is a temporary network of mobile nodes, interconnected via
wireless links without any central administration or fixed infrastructure. Nodes within transmission
range of each other can communicate directly. But nodes which are outside the range of each other
rely on other nodes to communicate, that is each node in the network has to forward the traffic of
other nodes also. So every node works as a host and as a router. In MANET, as nodes are mobile,
network topology is highly dynamic and very unpredictable.
Attacks in MANET
Security involves the identification of possible attacks and susceptibilities or unauthorized access
which confrontations the confidentiality, availability, and integrity of any system . Attacks can be
distinguished into passive and active attacks. A passive attack is very durable to discover as it
determines valuable material by snooping on to the routing traffic without disturbing or operating
the routing protocol. Malicious nodes trigger an active attack to advance illegal access to the
system by introducing fake packets or changing the existing packet transmission. Active attack
can further be divided into external attacks and internal attacks. In an external attack the nodes are
a portion of external network which try to interrupt an internal network. In an internal attack, the
cooperated or hijacked nodes and the attacking nodes both fit to the similar network. Further down,
some of the common attacks are itemized which affects the routing process adversely.
1. Black Hole: In a black hole attack a lethal node places itself among the interactive nodes by
presenting a false optimum route to trap the packets in the communication stream.
2. Replay: An attacker in replay attack misuses the flexibility feature in MANETs by resending
previously recorded packet and producing other nodes in the system to supply stale route in their
routing tables.
3. Blackmail: In this group of attacks malicious nodes attempt to blacklist permitted nodes by
cooking up false information which directs that they are malignant .
4. Link Withholding and Link Spoofing Attacks: In this category of attacks vital material
about links are suspended or false routing data is announced to disturb the network.
5. Worm Hole: Attackers keep the packets from reaching the destination node by always
tunneling the packets between the malicious nodes.
6. Sink Hole: Here a vicious module falsely announces itself as the end to receive the complete
network traffic. It then confuses the network by falling these packets after creating important
changes which unintentionally affects the network.
Sinkhole attack is one of the dangerous and biggest attacks in wireless ad hoc network. A
malicious node is introduced. This node starts giving wrong routing information in order to
become a specific node and then receives the traffic of the whole network itself. After getting
the whole network traffic, the secret information is modified, such that the data packet is
changed to make it more complicated. A harmful node tries to attract the secure data or
information from all neighboring nodes. the performance of ad hoc networks protocols such as
AODV, DSR etc is affected by sinkhole. Thus, the malicious node gets access to all the traffic
and is free to tamper the data as it wishes.
METHODOLOGY
Sinkhole attack is one of the most dreadful security problems in Manet. The main aim is to detect
and isolate the sinkhole node in mobile ad hoc networks and its security is critical challenge
because its nature is independent network creation with frequently topology changes. That’s why
MANET is survival from physical to application layer unsecure. But security is major issue for the
communication so we study number of prevention mechanisms and protect thread-hoc network
through different attack.Sinkhole attack is a type of attack where network traffic is attracted by the
comprised nodes by advertising the fake routing update. Other affect of sinkhole attack is that it
allows other attacks like selective forwarding attack.
Applications of manet
Most of these applications demand a specific security guarantees and reliable communication,
Some well known applications are:
1.Military Tactical Operations: For fast and possibly short term establishment of military
communications and troop deployments in hostile and/or unknown environments.
2.Search and Rescue Operations: For communication in areas with little or no wireless
infrastructure support.
3.Disaster Relief Operations: For communication in environments where the existing
infrastructure is destroyed or left inoperable.
4.Law Enforcement: For secure and fast communication during law enforcement operations.
5.Commercial Use: For enabling communications in exhibitions, conferences and large gatherings.
For some business scenarios, the need for collaborative computing might be more important
outside office environments than inside a building. After all, it is often the case where people do
need to have outside meetings to cooperate and exchange information on a given project.
5.emergency/rescue operations,intelligent transportation systems, conferences, patient monitoring,
environment control and other security sensitive applications
Network Simulator(NS)
NS (from network simulator) is a name for a series of discrete event network simulators,
specifically NS-1, and NS-2. All of them are discrete-event computer network simulators,
primarily used in research and teaching.
We are mainly using NS2 simulator. NS2 stands for Network Simulator Version 2. It is an open-
source event-driven simulator designed specifically for research in computer communication
networks.
Features of ns2 are as follows
NS2 consists of two key languages: C++ and Object-oriented Tool Command Language (OTcl).
While the C++ defines the internal mechanism (i.e., a backend) of the simulation objects, the OTcl
sets up simulation by assembling and configuring the objects as well as scheduling discrete events.
The C++ and the OTcl are linked together using TclCL
Code
#===================================
# Simulation parameters setup
#===================================
set val(chan) Channel/WirelessChannel ;# channel type
set val(prop) Propagation/TwoRayGround ;# radio-propagation model
set val(netif) Phy/WirelessPhy ;# network interface type
set val(mac) Mac/802_11 ;# MAC type
set val(ifq) Queue/DropTail/PriQueue ;# interface queue type
set val(ll) LL ;# link layer type
set val(ant) Antenna/OmniAntenna ;# antenna model
set val(ifqlen) 50 ;# max packet in ifq
set val(nn) 7 ;# number of mobilenodes
set val(rp) AODV ;# routing protocol
set val(x) 800 ;# X dimension of topography
set val(y) 541 ;# Y dimension of topography
set val(stop) 100.0 ;# time of simulation end
#Create a ns simulator
set ns [new Simulator]
#===================================
# Mobile node parameter setup
#===================================
$ns node-config -adhocRouting $val(rp) \
-llType $val(ll) \
-macType $val(mac) \
-ifqType $val(ifq) \
-ifqLen $val(ifqlen) \
-antType $val(ant) \
-propType $val(prop) \
-phyType $val(netif) \
-channel $chan \
-topoInstance $topo \
-agentTrace ON \
-routerTrace ON \
-macTrace OFF \
-movementTrace ON
#===================================
# Nodes Definition
#===================================
#Create 7 nodes
set n0 [$ns node]
$n0 set X_ 99
$n0 set Y_ 299
$n0 set Z_ 0.0
$ns initial_node_pos $n0 20
set n1 [$ns node]
$n1 set X_ 299
$n1 set Y_ 297
$n1 set Z_ 0.0
$ns initial_node_pos $n1 20
set n2 [$ns node]
$n2 set X_ 499
$n2 set Y_ 298
$n2 set Z_ 0.0
$ns initial_node_pos $n2 20
set n3 [$ns node]
$n3 set X_ 900
$n3 set Y_ 599
$n3 set Z_ 0.0
$ns initial_node_pos $n3 20
set n4 [$ns node]
$n4 set X_ 199
$n4 set Y_ 350
$n4 set Z_ 0.0
$ns initial_node_pos $n4 20
set n5 [$ns node]
$n5 set X_ 599
$n5 set Y_ 350
$n5 set Z_ 0.0
$ns initial_node_pos $n5 20
set n6 [$ns node]
$n6 set X_ 600
$n6 set Y_ 200
$n6 set Z_ 0.0
$ns initial_node_pos $n6 20
#===================================
# Set node 5 as attacker
#===================================
#$ns at 0.0 "[$n5 set rangent_] malicious" #[$n5 set ragent_]
#===================================
# Agents Definition
#===================================
#Setup a UDP connection
set udp0 [new Agent/UDP]
$ns attach-agent $n0 $udp0
#===================================
# Applications Definition
#===================================
#Setup a CBR Application over UDP connection
set cbr0 [new Application/Traffic/CBR]
$cbr0 attach-agent $udp0
$cbr0 set packetSize_ 1000
$cbr0 set rate_ 0.1Mb
$cbr0 set random_ null
$ns at 1.0 "$cbr0 start"
$ns at 100.0 "$cbr0 stop"
#===================================
# Termination
#===================================
#Define a 'finish' procedure
proc finish {} {
global ns tracefile namfile
$ns flush-trace
close $tracefile
close $namfile
exec nam sinkhole.nam &
exit 0
}
for {set i 0} {$i < $val(nn) } { incr i } {
$ns at $val(stop) "\$n$i reset"
}
$ns at $val(stop) "$ns nam-end-wireless $val(stop)"
$ns at $val(stop) "finish"
$ns at $val(stop) "puts \"done\" ; $ns halt"
$ns run
Output
Conclusion
The Mobile Ad hoc Network (MANET) is a dynamic cost-effective network and provides
communication with random movement of mobile nodes. The security is the major problem
in this kind of decentralized network. The centralized administrator control absence is
venerable to network from different attacks. In this research we study the sinkhole attack,
security and normal routing in networks and find its affects.
MANETs are popular networks used broadly due to their dynamic nature. These types of
networks are suffered from the sinkhole attack as there is no centralized security
management.
Reference
1. C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc
networks,” in Proc. Securecomm Workshops, 2006
2. C. Chen, M. Song, G. Hsieh, "lntrusion detection of sinkhole attacks in large-scale
wireless sensor networks", Wireless Communications Networking and Information
Security (WCNIS) 2010 IEEE International Conference on, pp.
3. Ahmad Salehi, S., M. A., Parisa Razzaque, Naraei, "Detection of sink hole Attack in
wireless sensor networks", IEEE International Conference on Space Science and
Communication
4. http://www.ijcttjournal.org/2017/Volume48/number-2/IJCTT-V48P111.
5. http://ieeexplore.ieee.org/document/7938914/?anchor=references