SlideShare a Scribd company logo
1 of 6
Download to read offline
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209
                     Effective Measure to Prevent Cooperative Black Hole Attack
                                in Mobile Ad-hoc Wireless Networks
                                         Mrs.M.Jhansi, Assoc.Professor,
                                               Computer science and engineering,
                               Samskruti college of engineering and technology,R,R Dist.A.P,India

                                            Ms. K.RoopaDevi,(M.Tech)
                                              Computer science and engineering
                                        Tirumala engineering college,Bogaram,A.P,India

                                    Mr.B.Mukesh Chandra,Asst. Professor
                                              Computer science and engineering
                                       Vignan inst. Of Technology and science,A.P,India.



Abstract— A mobile ad hoc network (MANET) is an                    share the same physical media; they transmit and acquire
autonomous network that consists of mobile nodes that              signals at the same frequency band. However, due to their
communicate with each other over wireless links. In the            inherent characteristics of dynamic topology and lack of
absence of a fixed infrastructure, nodes have to cooperate         centralized management security, MANET is vulnerable to
in order to provide the necessary network functionality.           various kinds of attacks. Black hole attack [2] is one of many
One of the principal routing protocols used in Ad hoc              possible attacks in MANET. Black hole attack can occur
networks is AODV (Ad hoc On demand Distance Vector)                when the malicious node on the path directly attacks the data
protocol. The security of the AODV protocol is                     traffic and intentionally drops, delay or alter the data traffic
compromised by a particular type of attack called ‘Black           passing through it. This attack can be easily lessen by setting
Hole’ attack [1]. In this attack a malicious node                  the promiscuous mode of each node and to see if the next
advertises itself as having the shortest path to the node          node on the path forward the data traffic as expected.
whose packets it wants to intercept. In this paper, we             Another type of black hole attack is to attack routing control
address the problem of coordinated attack by multiple              traffic. Fig. 1: shows the black hole attack, where M is the
black holes acting in group. And we propose a complete             malicious node, S is the source node, D is the destination
protocol to detect a chain of cooperating malicious nodes          node and A, B and C are the intermediate nodes.
in an ad hoc network that disrupts transmission of data
by feeding wrong routing information. We present a
technique to identify multiple black holes cooperating
with each other and a solution to discover a safe route
avoiding cooperative black hole attack.

Keywords - Ad hoc networks, Black hole, security,
routing protocols, AODV.


I INTRODUCTION
         Ad hoc network [1] is a wireless network without
having any fixed infrastructure. Each mobile node in an ad         Fig. 1: Black Hole attack
hoc network moves arbitrarily and acts as both a router and a
host. A wireless ad-hoc network consists of a Collection of        II ROUTING PROTOCOLS
"peer" mobile nodes that are capable of communicating with                  There are currently three main routing protocols for
each other without help from a fixed infrastructure. The           ad hoc networks [1], Destination- Sequenced Distance
interconnections between nodes are capable of changing on a        Vector routing (DSDV) [12], Dynamic Source Routing
continual and arbitrary basis. Nodes within each other's radio     (DSR) [9], and AODV [2]. DSDV is a table driven routing
range communicate directly via wireless links, while those         protocol. In DSDV, each mobile node in the network
that are far apart use other nodes as relays. Nodes usually        maintains a routing table with entries for every possible
                                                                   destination node, and the number of hops to reach them. The




                                                                                                                    204 | P a g e
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209
routing table is periodically updated for every change in the      even though the route is spurious, with the intention of
network to maintain consistency. This involves frequent            intercepting packets. Second, the node consumes the
route update broadcasts. DSDV is inefficient because as the        intercepted packets. We define the following conventions for
network grows the overhead grows as O(n2) [1]. DSR is an           protocol representation.
on-demand routing protocol and it maintains a route cache,
which leads to memory overhead. DSR has a higher
overhead as each packet carries the complete route, and does
not support multicast. AODV is a source initiated on-demand
routing protocol. Every mobile node maintains a routing
table that maintains the next hop node information for a route
to the destination node. When a source node wishes to route
a packet to a destination node, it uses the specified route if a
fresh enough route to the destination node is available in its
routing table. If not, it starts a route discovery process by
broadcasting the Route Request (RREQ) message to its
neighbors, which is further 2 propagated until it reaches an
intermediate node with a fresh enough route to the                 3.2 Cooperative Black Hole Attack
destination node specified in the RREQ, or the destination
node itself. Each intermediate node receiving the RREQ,                       According to the original AODV protocol, when
makes an entry in its routing table for the node that              source node S wants to communicate with the destination
forwarded the RREQ message, and the source node.                   node D, the source node S broadcasts the route request
                                                                   (RREQ) packet. The neighboring active nodes update their
          The destination node or the intermediate node with       routing table with an entry for the source node S, and check
a fresh enough route to the destination node, uncast the           if it is the destination node or has a fresh enough route to the
Route Response (RREP) message to the neighboring node              destination node. If not, the intermediate node updates the
from which it received the RREQ. An intermediate node              RREQ (increasing the hop count) and floods the network
makes an entry for the neighboring node from which it              with the RREQ to the destination node D until it reaches
received the RREP, then forwards the RREP in the reverse           node D or any other intermediate node which has a fresh
direction. Upon receiving the RREP, the source node updates        enough route to D, as depicted by example in Figure 2.
its routing table with an entry for the destination node, and
the node from which it received the RREP. The source node                   The destination node D or the intermediate node
starts routing the data packet to the destination node through     with a fresh enough route to D, initiates a route response
the neighboring node that first responded with an RREP.            (RREP) in the reverse direction, as depicted in Figure 3.
                                                                   Node S starts sending data packets to the neighboring node
         However, the proposed method cannot be applied to         which responded first, and discards the other responses. This
identifying a cooperative black hole attack involving              works fine when the network has no malicious nodes.
multiple nodes. In this paper, we develop a methodology to
identify multiple black hole nodes cooperating as a group.
The technique works with slightly modified AODV protocol
and makes use of the Data Routing Information (DRI) table
in addition to the cached and current routing tables. The rest
of the paper is organized as follows. In Section 3, we
introduce the cooperative black hole attack. Next, in Section
4, we present a new methodology to prevent a cooperative
black hole attack. Finally, in Section 5, we conclude and
discuss future work.

III COOPERATIVE BLACK HOLE ATTACK
PROBLEM                                                            Figure 2: Network flooding of RREQ

3.1 Black Hole

         A Black Hole attack is a kind of denial of service
where a malicious node can attract all packets by falsely
claiming a fresh route to the destination and then absorb
them without forwarding them to the destination. Co
operative Black hole means the malicious nodes act in a
group. A black hole has two properties. First, the node
exploits the ad hoc routing protocol, such as AODV, to
advertise itself as having a valid route to a destination node,

                                                                                                                    205 | P a g e
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209




Figure 3: Propagation of RREP messages
                                                                 Figure 5: Solution to identify multiple black hole nodes in
                                                                 one-time check
         Researchers have proposed solutions to identify and
eliminate a single black hole node [3]. However, the case of
                                                                          The solution to identify multiple black hole nodes
multiple black hole nodes acting in coordination has not been
                                                                 acting in cooperation involves two bits of additional
addressed. For example, when multiple black hole nodes are
                                                                 information from the nodes responding to the RREQ of
acting in coordination with each other, the first black hole
                                                                 source node S. Each node maintains an additional Data
node B1 refers to one of its teammates B2 as the next hop, as
                                                                 Routing Information (DRI) table. In the DRI table, 1 stands
depicted in Figure 3. According to [3], the source node S
                                                                 for „true‟ and 0 for „false‟. The first bit “From” stands for
sends a “Further Request (FRq)” to B2 through a different
                                                                 information on routing data packet from the node (in the
route (S-2-4-B2) other than via B1. Node S asks B2 if it has a
                                                                 Node field) while the second bit “Through” stands for
route to node B1 and a route to destination node D. Because
                                                                 information on routing data packet through the node (in the
B2 is cooperating with B1, its “Further Reply (FRp)” will be
                                                                 Node field). In reference to the example of Figure 4, a
“yes” to both the questions. Now per the solution proposed in
                                                                 sample of the database maintained by node 4 is shown in
[3], node S starts passing the data packets assuming that the
                                                                 Table 1. The entry 1 0 for node 3 implies that node 4 has
route S-B1-B2 is secure. However, in reality, the packets are
                                                                 routed data packets from 3, but has not routed any data
consumed by node B1 and the security of the network is
                                                                 packets through 3 (before node 3 moved away from 4). The
compromised.
                                                                 entry 1 1 for node 6 implies that, node 4 has successfully
                                                                 routed data packets from and through node 6. The entry 0 0
IV SOLUTION                                                      for node B2 implies that, node 4 has NOT routed any data
         In this section, we propose a methodology for           packets from or through B2.
identifying multiple black hole nodes cooperating as a group
with slightly modified AODV protocol by introducing Data
Routing Information (DRI) Table and Cross Checking.

4.1 Data Routing Information Table




                                                                 Table 1. Additional table of data routed from, and routed
                                                                 to nodes maintained by node 4.

                                                                 4.2 Cross Checking

                                                                          In our techniques we rely on reliable nodes (nodes
                                                                 through which the source node has routed data) to transfer
Figure 4: Solution to avoid cooperative black hole attack        data packets. The modified AODV protocol, and the
                                                                 algorithm for our proposed methodology are illustrated in
                                                                 Figure 6.

                                                                          In the protocol, the source node (SN) broadcasts a
                                                                 RREQ message to discover a secure route to the destination
                                                                 node. The Intermediate Node (IN) generating the RREP has
                                                                 to provide its Next Hop Node (NHN), and its DRI entry for
                                                                 the NHN. Upon receiving RREP message from IN, the


                                                                                                                206 | P a g e
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209
source node will check its own DRI table to see whether IN
is a reliable node.

         If source node has used IN before to route data, then
IN is a reliable node and source node starts routing data
through IN. Otherwise, IN is unreliable and the source node
sends FRq message to NHN to check the identity of the IN,
and asks NHN:

1) if IN has routed data packets through NHN
2) who is the current NHN‟s next hop to destination, and
3) has the current NHN routed data through its own next hop.

The NHN in turn responds with FRp message including

1) DRI entry for IN
2) the next hop node of current NHN, and
3) the DRI entry for the current NHN‟s next hop.

         Based on the FRp message from NHN, source node
checks whether NHN is a reliable node or not. If source node
has routed data through NHN before, NHN is reliable;
otherwise, unreliable. If NHN is reliable, source node will
check whether IN is a black hole or not. If the second bit (ie.
IN has routed data through NHN) of the DRI entry from the
IN is equal to 1, and the first bit (ie. NHN has routed data
from IN) of the DRI entry from the NHN is equal to 0, IN is
a black hole.
         If IN is not a black-hole and NHN is a reliable node,
the route is secure, and source node will update its DRI entry
for IN with 01, and starts routing data via IN.

          If IN is a black-hole, the source node identifies all            If NHN is an unreliable node, source node treats
the nodes along the reverse path from IN to the node that         current NHN as IN and sends FRq to the updated IN‟s next
generated the RREP as black hole nodes. Source node               hop node and goes on in a loop from steps 7 through 24 in
ignores any other RREP from the black holes and broadcasts        the algorithm.
the list of cooperative black holes.
                                                                           As an example, let‟s consider the network in Figure
                                                                  5. When node B1 responds to source node S with RREP
                                                                  message, it provides its next hop node B2 and DRI for the
                                                                  next hop (i.e. if B1 has routed data packets through B2). Here
                                                                  the black hole node lies about using the path by replying with
                                                                  the DRI value equal to 0 1. Upon receiving RREP message
                                                                  from B1, the source node S will check its own DRI table to
                                                                  see whether B1 is a reliable node.

                                                                            Since S has never sent any data through B1 before,
                                                                  B1 is not a reliable node to S. Then S sends FRq to B2 via
                                                                  alternative path S-2-4-B2 and asks if B2 has routed any data
                                                                  from B1, who is B2‟s next hop, and if B2 has routed data
                                                                  packets through B2‟s next hop. Since B2 is collaborating
                                                                  with B1, it replies positively to all the three requests and
                                                                  gives node 6 (randomly) as its next hop. When the source
                                                                  node contacts node 6 via alternative path S-2-4-6 to cross
                                                                  check the claims of node B2, node 6 responds negatively.
                                                                  Since node 6 has neither a route to node B2 nor has received
                                                                  data packets from node B2, the DRI value corresponding to
                                                                  B2 is equal to 0 0 as shown in Figure 4.




                                                                                                                  207 | P a g e
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209
          Based on this information, node S can infer that B2      feasible solution for it in the AODV protocol. The proposed
is a black hole node. If node B1 was supposed to have routed       solution can be applied to
data packets through node B2, it should have validated the          1.) Identify multiple black hole nodes cooperating with each
node before sending it. Now, since node B2 is invalidated          other in a MANET; and
through node 6, node B1 must cooperate with node B2.                2.) Discover secure paths from source to destination by
Hence both nodes B1 and B2 are marked as black hole nodes          avoiding multiple black hole nodes acting in cooperation.
and this information is propagated through the network
leading to their listing as black holes, and revocation of their             As future work, we intend to develop simulations to
certificates. Further, S discards any further responses from       analyze the performance of the proposed solution. We also
B1 or B2 and looks for a valid alternative route to D.             plan to study the impact of GRAY hole nodes (nodes which
                                                                   switch from good nodes to black hole nodes) and techniques
                                                                   for their identification.
  Algorithm to prevent cooperative black hole attack in
  MANETs
                                                                   References
  Notations :                                                      [1]   Hongmei Deng, Wei Li, and Dharma P. Agarwal,
                                                                         “Routing Security in Wireless Ad Hoc Networks”,
  SN: Source Node IN: Intermediate Node
                                                                         University of Cincinnati, IEEE Communications
  DN: Destination Node NHN: Next Hop Node
  FRq: Further Request FRp: Further Reply                                magazine,Vol.40, no.10, October 2002.
  Reliable Node: The node through which the SN has routed data
  DRI: Data Routing Information                                    [2]   Bo Sun,Yong Guan,Jian Chen,Udo , “Detecting
  ID: Identity of the node
                                                                         Black-hole Attack in Mobile Ad Hoc Network” , The
  1 SN broadcasts RREQ
  2 SN receivesRREP                                                      institute of Electrical Engineers, Printed and published
  3 IF (RREP is from DN or a reliable node) {                            by IEEE, 2003.
  4 Route data packets (Secure Route)
  5}
                                                                   [3]   Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato,
  6 ELSE {
  7 Do {                                                                 Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting
  8 Send FRq and ID of IN to NHN                                         Black holeAttack on AODV-based Mobile Ad Hoc
  9 Receive FRp, NHN of current NHN, DRI entry for                       Networks      by Dynamic        Learning Method”,
  10 NHN's next hop, DRI entry for current IN
                                                                         International Journal of Network Security, Vol.5, issue
  11 IF (NHN is a reliable node) {
  12 Check IN for black hole using DRI entry                             3, Nov 2007, pp 338–346.
  13 IF (IN is not a black hole)
  14 Route data packets (Secure Route)                             [4]   Elizabeth M. Royer, and Chai-Keong Toh, “A Review
  15 ELSE {
                                                                         of Current Routing Protocols for Ad Hoc Mobile
  16 Insecure Route
  17 IN is a black hole                                                  Wireless Networks,” IEEE Personal Communications,
  18 All the nodes along the reverse path from IN to the node            pp. 46-55, April 1999.
  19 that generated RREP are black holes
  20 }
                                                                   [5]   Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc
  21 }
  22 ELSE                                                                On-Demand Distance Vector (AODV) Routing,”
  23 Current IN = NHN                                                    Internet Draft, November 2002.
  24 } While (IN is NOT a reliable node)
  25 }
                                                                   [6]   Hongmei Deng, Wei Li, and Dharma P. Agrawal,
                                                                         “Routing Security in Wireless Ad Hoc Network,”
                                                                         IEEE Communications Magzine, vol. 40, no. 10,
Figure 6: Modified AODV protocol and algorithm to                        October 2002.
prevent cooperative black hole attack
                                                                   [7]   S. Marti et al., “Mitigating Routing Misbehavior in
         The process of cross checking the intermediate                  Mobile Ad Hoc Networks,” 6th Int‟l. Conference
nodes is a onetime procedure which we believe is affordable              Mobile Comp. Net., pp. 255-265, August 2000.
to secure a network from multiple black hole nodes.
                                                                   [8]   Vesa Kärpijoki, “Security in Ad hoc Networks,”
         The cost of cross checking the nodes can be                     http://www.tcm.hut.fi/Opinnot/Tik110.501/2000/paper
minimized by letting nodes sharing their trusted nodes list              s/karpijoki.pdf.
(DPI table) with each other.
                                                                   [9]   Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato,
                                                                         Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting
V CONCLUSION AND FUTURE WORK                                             Blackhole Attack on AODV-based Mobile Ad Hoc
         In this paper we have studied the routing security              Networks      by Dynamic       Learning Method”,
issues of MANETs, described the cooperative black hole                   International Journal of Network Security, Volume 5,
attack that can be mounted against a MANET and proposed a                Number 3, 2007, pp 338–346



                                                                                                                   208 | P a g e
Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research
                      and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.204-209
[10]   Lidong Zhou, and Zygmunt J. Haas, “Securing Ad
       Hoc Networks,” IEEE Network Magazine, vol. 13,
       no.6, November/December 1999.

[11] Janne Lundberg, “Routing Security in Ad Hoc
     Networks,” routing-security-in-ad.pdf

[12]   Bo Sun Yong, Guan Jian Chen and Udo W. Pooch,
       “Detecting Black-hole Attack in Mobile Ad Hoc
       Networks”,The Institution of Electrical Engineers
       (IEE) ,Volume 5, Number 6, 2003, pp 490-495

[13]   Y. Zhang, W. Lee, “Intrusion Detection in Wireless
       Ad Hoc Networks,” 6th Int‟l. Conference Mobile
       Comp. Net., Mobicom 2000, pp. 275-283, August
       2000.

[14]   Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu
       and Lixia Zhang, “Self-securing Ad Hoc Wireless
       Networks,”http://www.cs.ucla.edu/~jkong/publication
       s/ISCC02.pdf.

[15]   C. E. Perkins and P. Bhagwat, “Highly Dynamic
       Destination-Sequenced Distance-Vector Routing
       (DSDV) for Mobile Computers,” Computer
       Communications Review, pp. 234-244, October 1994.




                 M..Jhansi, working as Assoc.prof. in
Samskruti College of Engineering and Technology, R.R.Dist.
MTech from Nishitha College of Engineering and
Technology.JNTUH. B.Tech from University College of
Engineering,KU. Her research interests are in Computer
Networks, wireless communication networks and network
security.




              K.RoopaDevi, Pursuing M.Tech from
Tirumala Engineering College, R.R.Dist. MCA from
Vaagdevi P.G.College,KU. Her research interests are in
Computer networks and network security.




                B.Mukesh Chandra, working as Asst.prof. in
Vignan Institute of Technology and Science, Nalgonda Dist.
MTech from Sreedatha Engineering College,JNTUH. M.Sc,
physics from Osmania University,His research interests are
Computer networks and network security.



                                                                                             209 | P a g e

More Related Content

What's hot

Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 

What's hot (19)

Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
47 50
47 5047 50
47 50
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
E41022938
E41022938E41022938
E41022938
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 

Viewers also liked (20)

Av24317320
Av24317320Av24317320
Av24317320
 
Ez24947953
Ez24947953Ez24947953
Ez24947953
 
Al24258261
Al24258261Al24258261
Al24258261
 
Ah24233237
Ah24233237Ah24233237
Ah24233237
 
Ae24215219
Ae24215219Ae24215219
Ae24215219
 
Bh24380384
Bh24380384Bh24380384
Bh24380384
 
Ap31289293
Ap31289293Ap31289293
Ap31289293
 
Ip2616541659
Ip2616541659Ip2616541659
Ip2616541659
 
Il2616361640
Il2616361640Il2616361640
Il2616361640
 
Ii2616161619
Ii2616161619Ii2616161619
Ii2616161619
 
Iw2616951698
Iw2616951698Iw2616951698
Iw2616951698
 
Ax31338342
Ax31338342Ax31338342
Ax31338342
 
B31008012
B31008012B31008012
B31008012
 
Ab31169180
Ab31169180Ab31169180
Ab31169180
 
Ppt 3
Ppt 3Ppt 3
Ppt 3
 
Crisci Cataldi
Crisci CataldiCrisci Cataldi
Crisci Cataldi
 
Brands Magazine Presentation
Brands Magazine PresentationBrands Magazine Presentation
Brands Magazine Presentation
 
Panorama de negócios – maestra (fernando real)
Panorama de negócios – maestra (fernando real)Panorama de negócios – maestra (fernando real)
Panorama de negócios – maestra (fernando real)
 
Realidade nova[1]
Realidade nova[1]Realidade nova[1]
Realidade nova[1]
 
Aula contadores
Aula contadoresAula contadores
Aula contadores
 

Similar to Ac24204209

Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Editor IJARCET
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manetINFOGAIN PUBLICATION
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 

Similar to Ac24204209 (20)

Ab26180184
Ab26180184Ab26180184
Ab26180184
 
G343741
G343741G343741
G343741
 
C0331215
C0331215C0331215
C0331215
 
Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321Ijarcet vol-2-issue-4-1318-1321
Ijarcet vol-2-issue-4-1318-1321
 
560 229-237
560 229-237560 229-237
560 229-237
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
He3413241328
He3413241328He3413241328
He3413241328
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
black hole attack
black hole attackblack hole attack
black hole attack
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
B03406010
B03406010B03406010
B03406010
 

Ac24204209

  • 1. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 Effective Measure to Prevent Cooperative Black Hole Attack in Mobile Ad-hoc Wireless Networks Mrs.M.Jhansi, Assoc.Professor, Computer science and engineering, Samskruti college of engineering and technology,R,R Dist.A.P,India Ms. K.RoopaDevi,(M.Tech) Computer science and engineering Tirumala engineering college,Bogaram,A.P,India Mr.B.Mukesh Chandra,Asst. Professor Computer science and engineering Vignan inst. Of Technology and science,A.P,India. Abstract— A mobile ad hoc network (MANET) is an share the same physical media; they transmit and acquire autonomous network that consists of mobile nodes that signals at the same frequency band. However, due to their communicate with each other over wireless links. In the inherent characteristics of dynamic topology and lack of absence of a fixed infrastructure, nodes have to cooperate centralized management security, MANET is vulnerable to in order to provide the necessary network functionality. various kinds of attacks. Black hole attack [2] is one of many One of the principal routing protocols used in Ad hoc possible attacks in MANET. Black hole attack can occur networks is AODV (Ad hoc On demand Distance Vector) when the malicious node on the path directly attacks the data protocol. The security of the AODV protocol is traffic and intentionally drops, delay or alter the data traffic compromised by a particular type of attack called ‘Black passing through it. This attack can be easily lessen by setting Hole’ attack [1]. In this attack a malicious node the promiscuous mode of each node and to see if the next advertises itself as having the shortest path to the node node on the path forward the data traffic as expected. whose packets it wants to intercept. In this paper, we Another type of black hole attack is to attack routing control address the problem of coordinated attack by multiple traffic. Fig. 1: shows the black hole attack, where M is the black holes acting in group. And we propose a complete malicious node, S is the source node, D is the destination protocol to detect a chain of cooperating malicious nodes node and A, B and C are the intermediate nodes. in an ad hoc network that disrupts transmission of data by feeding wrong routing information. We present a technique to identify multiple black holes cooperating with each other and a solution to discover a safe route avoiding cooperative black hole attack. Keywords - Ad hoc networks, Black hole, security, routing protocols, AODV. I INTRODUCTION Ad hoc network [1] is a wireless network without having any fixed infrastructure. Each mobile node in an ad Fig. 1: Black Hole attack hoc network moves arbitrarily and acts as both a router and a host. A wireless ad-hoc network consists of a Collection of II ROUTING PROTOCOLS "peer" mobile nodes that are capable of communicating with There are currently three main routing protocols for each other without help from a fixed infrastructure. The ad hoc networks [1], Destination- Sequenced Distance interconnections between nodes are capable of changing on a Vector routing (DSDV) [12], Dynamic Source Routing continual and arbitrary basis. Nodes within each other's radio (DSR) [9], and AODV [2]. DSDV is a table driven routing range communicate directly via wireless links, while those protocol. In DSDV, each mobile node in the network that are far apart use other nodes as relays. Nodes usually maintains a routing table with entries for every possible destination node, and the number of hops to reach them. The 204 | P a g e
  • 2. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 routing table is periodically updated for every change in the even though the route is spurious, with the intention of network to maintain consistency. This involves frequent intercepting packets. Second, the node consumes the route update broadcasts. DSDV is inefficient because as the intercepted packets. We define the following conventions for network grows the overhead grows as O(n2) [1]. DSR is an protocol representation. on-demand routing protocol and it maintains a route cache, which leads to memory overhead. DSR has a higher overhead as each packet carries the complete route, and does not support multicast. AODV is a source initiated on-demand routing protocol. Every mobile node maintains a routing table that maintains the next hop node information for a route to the destination node. When a source node wishes to route a packet to a destination node, it uses the specified route if a fresh enough route to the destination node is available in its routing table. If not, it starts a route discovery process by broadcasting the Route Request (RREQ) message to its neighbors, which is further 2 propagated until it reaches an intermediate node with a fresh enough route to the 3.2 Cooperative Black Hole Attack destination node specified in the RREQ, or the destination node itself. Each intermediate node receiving the RREQ, According to the original AODV protocol, when makes an entry in its routing table for the node that source node S wants to communicate with the destination forwarded the RREQ message, and the source node. node D, the source node S broadcasts the route request (RREQ) packet. The neighboring active nodes update their The destination node or the intermediate node with routing table with an entry for the source node S, and check a fresh enough route to the destination node, uncast the if it is the destination node or has a fresh enough route to the Route Response (RREP) message to the neighboring node destination node. If not, the intermediate node updates the from which it received the RREQ. An intermediate node RREQ (increasing the hop count) and floods the network makes an entry for the neighboring node from which it with the RREQ to the destination node D until it reaches received the RREP, then forwards the RREP in the reverse node D or any other intermediate node which has a fresh direction. Upon receiving the RREP, the source node updates enough route to D, as depicted by example in Figure 2. its routing table with an entry for the destination node, and the node from which it received the RREP. The source node The destination node D or the intermediate node starts routing the data packet to the destination node through with a fresh enough route to D, initiates a route response the neighboring node that first responded with an RREP. (RREP) in the reverse direction, as depicted in Figure 3. Node S starts sending data packets to the neighboring node However, the proposed method cannot be applied to which responded first, and discards the other responses. This identifying a cooperative black hole attack involving works fine when the network has no malicious nodes. multiple nodes. In this paper, we develop a methodology to identify multiple black hole nodes cooperating as a group. The technique works with slightly modified AODV protocol and makes use of the Data Routing Information (DRI) table in addition to the cached and current routing tables. The rest of the paper is organized as follows. In Section 3, we introduce the cooperative black hole attack. Next, in Section 4, we present a new methodology to prevent a cooperative black hole attack. Finally, in Section 5, we conclude and discuss future work. III COOPERATIVE BLACK HOLE ATTACK PROBLEM Figure 2: Network flooding of RREQ 3.1 Black Hole A Black Hole attack is a kind of denial of service where a malicious node can attract all packets by falsely claiming a fresh route to the destination and then absorb them without forwarding them to the destination. Co operative Black hole means the malicious nodes act in a group. A black hole has two properties. First, the node exploits the ad hoc routing protocol, such as AODV, to advertise itself as having a valid route to a destination node, 205 | P a g e
  • 3. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 Figure 3: Propagation of RREP messages Figure 5: Solution to identify multiple black hole nodes in one-time check Researchers have proposed solutions to identify and eliminate a single black hole node [3]. However, the case of The solution to identify multiple black hole nodes multiple black hole nodes acting in coordination has not been acting in cooperation involves two bits of additional addressed. For example, when multiple black hole nodes are information from the nodes responding to the RREQ of acting in coordination with each other, the first black hole source node S. Each node maintains an additional Data node B1 refers to one of its teammates B2 as the next hop, as Routing Information (DRI) table. In the DRI table, 1 stands depicted in Figure 3. According to [3], the source node S for „true‟ and 0 for „false‟. The first bit “From” stands for sends a “Further Request (FRq)” to B2 through a different information on routing data packet from the node (in the route (S-2-4-B2) other than via B1. Node S asks B2 if it has a Node field) while the second bit “Through” stands for route to node B1 and a route to destination node D. Because information on routing data packet through the node (in the B2 is cooperating with B1, its “Further Reply (FRp)” will be Node field). In reference to the example of Figure 4, a “yes” to both the questions. Now per the solution proposed in sample of the database maintained by node 4 is shown in [3], node S starts passing the data packets assuming that the Table 1. The entry 1 0 for node 3 implies that node 4 has route S-B1-B2 is secure. However, in reality, the packets are routed data packets from 3, but has not routed any data consumed by node B1 and the security of the network is packets through 3 (before node 3 moved away from 4). The compromised. entry 1 1 for node 6 implies that, node 4 has successfully routed data packets from and through node 6. The entry 0 0 IV SOLUTION for node B2 implies that, node 4 has NOT routed any data In this section, we propose a methodology for packets from or through B2. identifying multiple black hole nodes cooperating as a group with slightly modified AODV protocol by introducing Data Routing Information (DRI) Table and Cross Checking. 4.1 Data Routing Information Table Table 1. Additional table of data routed from, and routed to nodes maintained by node 4. 4.2 Cross Checking In our techniques we rely on reliable nodes (nodes through which the source node has routed data) to transfer Figure 4: Solution to avoid cooperative black hole attack data packets. The modified AODV protocol, and the algorithm for our proposed methodology are illustrated in Figure 6. In the protocol, the source node (SN) broadcasts a RREQ message to discover a secure route to the destination node. The Intermediate Node (IN) generating the RREP has to provide its Next Hop Node (NHN), and its DRI entry for the NHN. Upon receiving RREP message from IN, the 206 | P a g e
  • 4. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 source node will check its own DRI table to see whether IN is a reliable node. If source node has used IN before to route data, then IN is a reliable node and source node starts routing data through IN. Otherwise, IN is unreliable and the source node sends FRq message to NHN to check the identity of the IN, and asks NHN: 1) if IN has routed data packets through NHN 2) who is the current NHN‟s next hop to destination, and 3) has the current NHN routed data through its own next hop. The NHN in turn responds with FRp message including 1) DRI entry for IN 2) the next hop node of current NHN, and 3) the DRI entry for the current NHN‟s next hop. Based on the FRp message from NHN, source node checks whether NHN is a reliable node or not. If source node has routed data through NHN before, NHN is reliable; otherwise, unreliable. If NHN is reliable, source node will check whether IN is a black hole or not. If the second bit (ie. IN has routed data through NHN) of the DRI entry from the IN is equal to 1, and the first bit (ie. NHN has routed data from IN) of the DRI entry from the NHN is equal to 0, IN is a black hole. If IN is not a black-hole and NHN is a reliable node, the route is secure, and source node will update its DRI entry for IN with 01, and starts routing data via IN. If IN is a black-hole, the source node identifies all If NHN is an unreliable node, source node treats the nodes along the reverse path from IN to the node that current NHN as IN and sends FRq to the updated IN‟s next generated the RREP as black hole nodes. Source node hop node and goes on in a loop from steps 7 through 24 in ignores any other RREP from the black holes and broadcasts the algorithm. the list of cooperative black holes. As an example, let‟s consider the network in Figure 5. When node B1 responds to source node S with RREP message, it provides its next hop node B2 and DRI for the next hop (i.e. if B1 has routed data packets through B2). Here the black hole node lies about using the path by replying with the DRI value equal to 0 1. Upon receiving RREP message from B1, the source node S will check its own DRI table to see whether B1 is a reliable node. Since S has never sent any data through B1 before, B1 is not a reliable node to S. Then S sends FRq to B2 via alternative path S-2-4-B2 and asks if B2 has routed any data from B1, who is B2‟s next hop, and if B2 has routed data packets through B2‟s next hop. Since B2 is collaborating with B1, it replies positively to all the three requests and gives node 6 (randomly) as its next hop. When the source node contacts node 6 via alternative path S-2-4-6 to cross check the claims of node B2, node 6 responds negatively. Since node 6 has neither a route to node B2 nor has received data packets from node B2, the DRI value corresponding to B2 is equal to 0 0 as shown in Figure 4. 207 | P a g e
  • 5. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 Based on this information, node S can infer that B2 feasible solution for it in the AODV protocol. The proposed is a black hole node. If node B1 was supposed to have routed solution can be applied to data packets through node B2, it should have validated the 1.) Identify multiple black hole nodes cooperating with each node before sending it. Now, since node B2 is invalidated other in a MANET; and through node 6, node B1 must cooperate with node B2. 2.) Discover secure paths from source to destination by Hence both nodes B1 and B2 are marked as black hole nodes avoiding multiple black hole nodes acting in cooperation. and this information is propagated through the network leading to their listing as black holes, and revocation of their As future work, we intend to develop simulations to certificates. Further, S discards any further responses from analyze the performance of the proposed solution. We also B1 or B2 and looks for a valid alternative route to D. plan to study the impact of GRAY hole nodes (nodes which switch from good nodes to black hole nodes) and techniques for their identification. Algorithm to prevent cooperative black hole attack in MANETs References Notations : [1] Hongmei Deng, Wei Li, and Dharma P. Agarwal, “Routing Security in Wireless Ad Hoc Networks”, SN: Source Node IN: Intermediate Node University of Cincinnati, IEEE Communications DN: Destination Node NHN: Next Hop Node FRq: Further Request FRp: Further Reply magazine,Vol.40, no.10, October 2002. Reliable Node: The node through which the SN has routed data DRI: Data Routing Information [2] Bo Sun,Yong Guan,Jian Chen,Udo , “Detecting ID: Identity of the node Black-hole Attack in Mobile Ad Hoc Network” , The 1 SN broadcasts RREQ 2 SN receivesRREP institute of Electrical Engineers, Printed and published 3 IF (RREP is from DN or a reliable node) { by IEEE, 2003. 4 Route data packets (Secure Route) 5} [3] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, 6 ELSE { 7 Do { Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting 8 Send FRq and ID of IN to NHN Black holeAttack on AODV-based Mobile Ad Hoc 9 Receive FRp, NHN of current NHN, DRI entry for Networks by Dynamic Learning Method”, 10 NHN's next hop, DRI entry for current IN International Journal of Network Security, Vol.5, issue 11 IF (NHN is a reliable node) { 12 Check IN for black hole using DRI entry 3, Nov 2007, pp 338–346. 13 IF (IN is not a black hole) 14 Route data packets (Secure Route) [4] Elizabeth M. Royer, and Chai-Keong Toh, “A Review 15 ELSE { of Current Routing Protocols for Ad Hoc Mobile 16 Insecure Route 17 IN is a black hole Wireless Networks,” IEEE Personal Communications, 18 All the nodes along the reverse path from IN to the node pp. 46-55, April 1999. 19 that generated RREP are black holes 20 } [5] Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc 21 } 22 ELSE On-Demand Distance Vector (AODV) Routing,” 23 Current IN = NHN Internet Draft, November 2002. 24 } While (IN is NOT a reliable node) 25 } [6] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Network,” IEEE Communications Magzine, vol. 40, no. 10, Figure 6: Modified AODV protocol and algorithm to October 2002. prevent cooperative black hole attack [7] S. Marti et al., “Mitigating Routing Misbehavior in The process of cross checking the intermediate Mobile Ad Hoc Networks,” 6th Int‟l. Conference nodes is a onetime procedure which we believe is affordable Mobile Comp. Net., pp. 255-265, August 2000. to secure a network from multiple black hole nodes. [8] Vesa Kärpijoki, “Security in Ad hoc Networks,” The cost of cross checking the nodes can be http://www.tcm.hut.fi/Opinnot/Tik110.501/2000/paper minimized by letting nodes sharing their trusted nodes list s/karpijoki.pdf. (DPI table) with each other. [9] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting V CONCLUSION AND FUTURE WORK Blackhole Attack on AODV-based Mobile Ad Hoc In this paper we have studied the routing security Networks by Dynamic Learning Method”, issues of MANETs, described the cooperative black hole International Journal of Network Security, Volume 5, attack that can be mounted against a MANET and proposed a Number 3, 2007, pp 338–346 208 | P a g e
  • 6. Mrs. M. Jhansi, Ms. K. RoopaDevi, Mr. B.Mukesh Chandra / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.204-209 [10] Lidong Zhou, and Zygmunt J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no.6, November/December 1999. [11] Janne Lundberg, “Routing Security in Ad Hoc Networks,” routing-security-in-ad.pdf [12] Bo Sun Yong, Guan Jian Chen and Udo W. Pooch, “Detecting Black-hole Attack in Mobile Ad Hoc Networks”,The Institution of Electrical Engineers (IEE) ,Volume 5, Number 6, 2003, pp 490-495 [13] Y. Zhang, W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks,” 6th Int‟l. Conference Mobile Comp. Net., Mobicom 2000, pp. 275-283, August 2000. [14] Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu and Lixia Zhang, “Self-securing Ad Hoc Wireless Networks,”http://www.cs.ucla.edu/~jkong/publication s/ISCC02.pdf. [15] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, pp. 234-244, October 1994. M..Jhansi, working as Assoc.prof. in Samskruti College of Engineering and Technology, R.R.Dist. MTech from Nishitha College of Engineering and Technology.JNTUH. B.Tech from University College of Engineering,KU. Her research interests are in Computer Networks, wireless communication networks and network security. K.RoopaDevi, Pursuing M.Tech from Tirumala Engineering College, R.R.Dist. MCA from Vaagdevi P.G.College,KU. Her research interests are in Computer networks and network security. B.Mukesh Chandra, working as Asst.prof. in Vignan Institute of Technology and Science, Nalgonda Dist. MTech from Sreedatha Engineering College,JNTUH. M.Sc, physics from Osmania University,His research interests are Computer networks and network security. 209 | P a g e