An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distance Vector Routing Protocol
1. An Efficient Blackhole Attack Securing
Mechanism in Ad hoc On-demand Distance
Vector (AODV) Routing Protocol
Guide - Prasanta Baruah
(Asst. Professor)
Department of CSE, CIT Kokrajhar
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Prepared by - Ninmoy Debnath (Gau-c-13/044)
Mintukan Rabha (Gau-c-13/l-195)
Ajoy Swargiary (Gau-c-13/051)
5. Mobile Ad-Hoc Network(MANET)
Collection of mobile nodes forming ad-hoc network.
Self-configuring network.
Each node participates in routing.
Topology changes frequently.
6. Applications of MANET
Personal area networking
cell phone, laptop, ear phone
Military environments
soldiers, tanks, planes
7. Challenges and Issues in MANET
Limited wireless range.
Packet losses.
Routes changes.
Devices heterogeneity.
Battery power constraints.
Security threats .
9. AODV Routing Protocol
Reactive Routing Protocol.
AODV maintains all the route informations in the form of
tables.
AODV has three control packets
RREQ(Route Request Packet) broadcasting to find a
route.
RREP(Route Reply Packet) is to set up forward path.
RERR(Route Error Packet) to find any broken links.
[5]
10. AODV Routing Protocol Cont...
• Every node maintain two counters
Sequence number
Broadcast_id: it increments whenever the source
issues a new RREQ
• Packet format for RREQ
<source_addr, source_seq#, broadcast_id, dest_addr, dest_seq#, hop_count>
• Packet format for RREP
<source_addr, dest_addr, dest_seq#, hop_count, lifetime>
27. What is Blackhole Attack?
● Malicious node utilizes the routing protocol to attack.
● Claim itself having shortest path to the destination node.
● Does not forward packets to its neighbors.
[4]
28. Type of Blackhole Attack
● Ordinary( single ) Blackhole Attack
– One Malicious node utilizes the routing protocol to
claim itself of being the shortest path to the destination
node.
– After receiving the packet malicious node simply drop
the packet.
● Collaborative Blackhole Attack
– More than one Malicious node collaborate together to
attack.
53. Algorithm
Define table for storing the Route Replies.
Save all the Route Replies in the table for at least two Route
Replies.
Take the average of sequence number of Route Replies store
in the table
Select the Route Reply whose sequence number is smaller or
equal to average of sequence number.
Send the packet through whose sequence number is smaller
or equal to average of sequence number.
Delete the entries in the table.
72. Conclusion
Justified the algorithm of securing the blackhole attack in the
AODV routing protocols in MANET.
The proposed solution achieves a very good rise in Packet Delivery
Ratio with acceptable rise in End-to-End Delay and Throughput.
The algorithm does not have any hidden overhead on either the
intermediate nodes or the destination nodes.
Algorithm is simple and efficient in implementation.
73. References
1. Latha Tamilselvan, V Sankaranarayanan. “Prevention of Blackhole Attacks in
MANET.” In Proceedings of the 2nd International Conference on Wireless
Broadband and Ultra Wideban Communications (AusWireless 2007), pp. 21-
21, Aug. 2007.
2. Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dyanamic Learning System
Against Blackhole Attack In Aodv Based Manet.” In: International Journal of
Computer Science Issues, Vol.2, pp 54-59, 2009.
3. Hongmei Deng, Wei Li, Dharma P. Agrawal,“Routing security in wireless ad
hoc networks” IEEE Communications Magazine (Volume: 40, Issue: 10, Oct
2002 ).
4. Al-Shurman M, Yoo S-M, Park S, “Blackhole Attack in Mobile Ad Hoc
Networks” ACM-SE 42 Proceedings of the 42nd annual Southeast regional
conference (Pages:96-97, date:2004-04-02) .
5. C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector
(AODV) routing” RFC 3561, Experimental, July 2003.
6. Ns2 Manual , http://www.isi.edu/nsnam/ns/tutorial/.