Your SlideShare is downloading. ×
  • Like
Performance analysis of aodv protocol on blackhole attack
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Performance analysis of aodv protocol on blackhole attack

  • 3,800 views
Published

 

Published in Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • Do u have the code for implementing black hole attack in Ns2 simulator??
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
3,800
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
294
Comments
1
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Performance Analysis of AODV Protocol on Black hole Attacks
  • 2.
    • Prepared By
    • Md. Al-Amin-Al-Mehedi Sr.System Engineer
    • Contact: [email_address]
    • +8801718161615
  • 3. Content
    • Introduction.
    • What is AODV Protocol?
    • Why We Use AODV Protocol.
    • Security On AODV Protocol.
    • Attacks On AODV Protocol.
    • What is DDOS Attacks?
    • What is Black Hole Attack?
    • Caused of Black Hole Attack.
    • Conclusion
  • 4. Introduction
    • Wireless ad-hoc networks are composed of autonomous nodes that are self- managed without any infrastructure. In this way, ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time. Ad-hoc networks are suitable for areas where it is not possible to set up a fixed infrastructure. Since the nodes communicate with each other without an infrastructure, they provide the connectivity by forwarding packets over themselves. To support this connectivity, nodes use some routing protocols such as AODV, DSR and DSDV.
  • 5. What is AODV Protocol?
    • Ad-hoc On-Demand Distance Vector (AODV) is an on demand routing protocol. which is used to find a route between the source and destination node as needed.
    • It uses control messages such as Route Request (RREQ),and Route Reply (RREP) for establishing a path from the source to the destination.
  • 6. Why We Use AODV Protocol?
    • We select AODV protocol because, AODV is capable of both unicast and multicast routing. It is a reactive routing protocol. AODV avoids the counting to infinity problem of other distance-vector protocols. AODV protocol is a flat routing protocol it does not need any central administrative system to handle the routing process.
  • 7. Security Design Issues in AODV
    • AODV do not have any centrally administered secure routers
        • Attackers from inside or outside can easily exploit the network.
        • Passive eavesdropping, data tampering, active interfering, leakage of secret information, DoS etc.
    • Shared Wireless Medium.
    • Dynamic Topology.
  • 8. Attacks On AODV Protocol
    • Known attacks on AODV are :
        • DDOS attack
        • Traffic redirection by modification
        • Replay attacks
        • Loop formation by spoofing
        • False route error.
  • 9. What Is DDOS Attacks?
    • Distributed Denial of Service (DDoS) attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. This kind of attack, consume more bandwidth and uses more sources in network. One of the most important attacks of DDoS attacks category is Black hole attack.
  • 10. What Is Black Hole Attack?
    • A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious.
  • 11. Caused Of Black Hole Attack
    • Black hole attacks in AODV protocol routing level can be classified into two categories:
        • RREQ Blackhole attack and
        • RREP Blackhole attack.
    • Black hole attack caused by RREQ:
    • When a node requires a route to a destination, it initiates a route discovery process within the network. It broadcasts a route request (RREQ) packet to its neighbors. (Figure 1)
  • 12. Caused Of Black Hole Attack (Cont..) Fig1: Propagation of RREQ
  • 13. Caused Of Black Hole Attack (Cont..)
    • Black hole attack caused by RREP:
    • Once the RREQ reaches the destination or an intermediate node with a fresh enough route, the destination or intermediate node responds by unicasting a route reply (RREP) packet (Figure 2) back to the neighbor from which it first received the RREQ.
  • 14. Caused Of Black Hole Attack (Cont..) Fig2: The path of a route reply
  • 15. Conclusion
    • The performance of routing protocols AODV depends heavily on much kind of attacks. One of these attacks is Black hole attack. This attack has high effect on AODV protocol. I want to show the performance of AODV protocol when it is effected by the black hole attack. I use network simulator-2(NS-2) to show the performance of AODV protocol during black hole attack.