This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
N0363079085
1. International Journal of Computational Engineering Research||Vol, 03||Issue, 6||
www.ijceronline.com ||Ju ne ||2013|| Page 79
MANET: Black Hole Node Detection in AODV
Ms.Chetana Khetmal1,
Prof.Shailendra Kelkar2,
Mr.Nilesh Bhosale3
1
M.E Student, Vidyalankar Institute of Technology,Mumbai, 2
Asst.Prof. Vidyalankar Institute of Technology,
Mumbai,
3.
Software Engineer, Oracle, Hydrabad.
I. INTRODUCTION
Wireless applications and devices(Laptops, Cell phones, Personal Computers etc) have mainly two
modes of operations; one is in the presence of Control Module (CM) called as Base Stations and second is Ad-
Hoc connectivity where there is no Control Module involved. The devices belong to wireless network exchanges
data with each other without any wired connection between them. For communication between mobile devices,
these nodes should belong to the transmission range of each other; if there is no direct connection from source to
destination than intermediate nodes assist for transmission using hop by hop connections. Ad-hoc network
having various characteristics [1] like non- infrastructure, autonomous node, dynamic in nature, scalable and
many more which causes MANET to become popular in this modern era.
Figure 1. Mobile Ad-hoc NETwork
Mobile Ad-Hoc networks are full of autonomous nodes i.e. the nodes which are not having any central control
node for their management. Due to the mobility of devices dynamic topology appears in wireless network.
Communication can be carried out with mutual understanding among the nodes. There is no any restriction on
mobile node for leaving and entering in the network. These autonomous nodes can act as host/router or both at
the same time. A host which demands for particular services from other nodes and a router node helps to
forward the data to the neighboring nodes also discovering and maintaining routes for other nodes. The mobile
ABSTRACT:
In today’s world every user need to transfer data with one-other irrespective to individual’s
geographic location. Hence a Mobile Ad-hoc Network (MANET) has become a vital part of modern
communication over wireless network. MANET helps to transfer data without fixed infrastructure and
many autonomous nodes vigorously can become part of ongoing communication. Due to this, MANET
gets attacked by malicious nodes very easily. Hence secure routing of data packet in MANET is
essential task. There are number of attacks we have seen in MANET like Denial of Service attack,
Jellyfish attack, Warm-Hole attack etc. In this paper we are concentrating on Black Hole attack in
AODV i.e. Ad-hoc On Demand Distance Vector Routing. We are proposing authentication techniques
based on Authenticated Node, Authentication on Path, Authentication Key Packet and Data Routing
Information table (DRI) on each node.
By using authentication techniques we are trying to detect black hole in network so that we can transfer
data packet over secure path.
KEYWORDS: AODV routing protocol, Authentication Terminologies, Black Hole Attack, MANET
(Mobile Ad-hoc NETwork), External or Internal attack, Active or Passive attack.
2. Manet: Black Hole Node…
www.ijceronline.com ||Ju ne ||2013|| Page 80
nodes have self-configuration ability due to which they can organize themselves in any network without prior
infrastructure. Ad-hoc networking is applied on battlefield or for military units where static infrastructure is
impossible and stills the communication among the users within a transmission range is necessary [3].The
Attributes of MANET like changing topology, lack of central monitoring and management, no security
mechanisms, limited battery and open medium where all nodes can access data within the communication range
without any transmission medium between them; any un trusted node can become part of ongoing
communication and demolish current packet transmission by dropping the packets, by changing the data from
packet headers or by presenting wrong information to the network. Hence MANET is enormously prone to get
attacked by malicious nodes.
II. COMMUNICATION IN MANET
In MANET communication takes place using TCP/IP structure among its mobile users. Therefore
traditional TCP/IP has been modified to achieve betterment in transmission [3].There are various routing
protocols which are use to route the packet securely from source to destination over the communication channel.
The protocols like AODV (Ad-hoc On Demand Distance Vector), DSR (Dynamic Source Routing), DSDV
(Destination Sequenced Distance Vector) etc are some routing protocols which are useful over wireless
communication. Major aim of routing protocol is to establish shortest path (i.e. with minimum hop count)
between source and destination nodes also less bandwidth to be used to traverse packets in timely
manner.Routing protocols in MANETs are organized into three different categories according to their
functionality. The categories and the name of protocols in each category are listed down in Fig. 2:
1. Reactive protocols
2. Proactive protocols
3. Hybrid protocols
Figure 2. MANET routing protocols
1) Reactive Protocols:
Reactive protocols are known as On Demand protocols. These protocols are called reactive because they do not
initiate route discovery by their own until any source node in the network request to find a route. These
protocols setup routes when packet transmission demanded by users in the network.
2) Proactive Protocols:
A proactive protocol constantly maintains the updated topology of the network. Every node in the network
knows about their neighboring nodes in advance. The routing information tables are maintained on each node
and which are updated periodically. Whenever there is a change in the network topology, these tables are
updated. The nodes exchange topology information with each other; any time when they needed.
3) Hybrid Protocols:
Hybrid protocol; it is a combination of strengthens of reactive and proactive protocol. It gives better results of
transmission in MANET compare to other two protocols. It uses reactive or proactive approach as per the
requirement of zones since it divides whole network in the small zones.
III. ATTACKS IN MANET
There are some flaws in MANET like [6]: No secure boundaries, No central management, Problem of
scalability, Limited Resources, Dynamic topology, where it is hard to find out malicious nodes. Due to all this
defects there are two main categories of attack one based on the source of attack i.e. External or Internal and
other is based on behavior of attack i.e. Active or Passive [7]. In the fig. 3 and Fig.4 the circle represents
different nodes in network which is shown by rectangle.
3. Manet: Black Hole Node…
www.ijceronline.com ||Ju ne ||2013|| Page 81
3.1.External and Internal Attacks: As shown in Fig 3 respectively;
External attacks: An External attacker from outside the networks tries to get access to the current network and
once it becomes part of the network start interrupting ongoing transmission and performance of the whole
network. External attacks can be prevented by implementing firewall, where the access of unauthorized person
to the network can be avoided.
Internal attack: An attacker node is already works as internal node of network and also contributes in normal
network activities. But after some transmission this node starts its malicious behavior. It is difficult to find
internal malicious node of the network hence Internal attack is rigorous than external attack.
Figure 3. External and Internal attacks in MANET
3.2.Active and Passive Attacks: As Shown in Fig.4 respectively;
Active attack: It can be external or internal type attack. Being part of active network a node can destroy
ongoing transmission by changing data, by stealing data or by denial of service.
Passive attack: In this attack the node does not introduce attack before getting the enough information about
current network. The attacker node first observes whole network carefully by considering points like how nodes
are communicating, what are the positions of the nodes.
Figure 4. Active and Passive attacks in MANET
IV. BLACK HOLE ATTACK IN MANET
Black Hole is considered as an inside attack occurs in Network Layer and which is hard to find out also
due to malicious node many damages takes place in the network [1] [4]. A black hole node sends fake routing
information, claiming that it has an optimum route to reach to the destination requested by the source node and
directs other good nodes to route data packets through it and consumes the transferred packets. Some major
destruction generated by Black Hole is listed below:
It increases network overhead; Due to unwanted transmission.
It decreases the network’s lifetime by boosting energy consumption unnecessarily.
It destroys the network by dropping the critical data packets over the current communication channel.
As shown in Fig.5 the network having one black hole node; which shows fake route from source to destination
and due to which the transmission error occurs and causes hazard in the mobile Ad-hoc network.
4. Manet: Black Hole Node…
www.ijceronline.com ||Ju ne ||2013|| Page 82
Figure 5. Black Hole in MANET
V. PROPOSED AUTHENTICATION TERMINOLOGIES
In our proposed system we are using AODV protocol and also different terminologies which help us to
determined black hole in the network. We will work on it as reactive technique.
5.1. AODV (Ad-hoc On Demand Distance Vector) Protocol [7]
It is On Demand reactive protocol. It uses three types of messages: explained using Fig 6
[1] RREQ (Route REQuest): Source node which wants to communicate with destination node broadcasts
RREQ message. Each RREQ packet has TTL (Time To Live) value which gives idea about how many hops
needs to be traverse. Some fields of Route Request message packets are shown below;
[2] RREP (Route REPly): A node which has requested identity or which has information about it generates
RREP message and unicast it using the reverse path which was generated at the time of RREQ to reach the
initiator of this request. Some fields of Route Reply message packet are shown below;
[3] RERR (Route ERRor): Every node in the network periodically keeps updating its routing table by
checking status of its neighboring nodes. If any node found its neighbor is down than it generates RERR
message to update other nodes in the network.
Figure 6. AODV protocol transmission with all type of messages
5. Manet: Black Hole Node…
www.ijceronline.com ||Ju ne ||2013|| Page 83
5.2. Proposed Terminologies
Following are some terminologies which we are using to transfer our very first data packet over the network
using AODV protocol.
5.2.1 Authenticated Node (Authn)
If any node has already done successful transmission via its immediate node than the status of its Authn will be
True. It means that path is secure for further transmission in same period.
As shown in Fig.7 Authn(X,Y) Sender : Node X Receiver : Node Y
Node Y is authenticated to Node X; it means Node X has at least one successful transmission completed
through Node Y.
Hence Authn(X,Y) = T else Authn(X,Y) = F
Figure 7. Transmission between Node X and Node Y
5.2.2. Authentication on Path (Authp):
When we are not getting an authentication of required neighbouring node that time we should carry
Authentication of Path. We have to choose immediate neighbours of current node and if only one node is
available than by considering mutual trust without waiting for any other option directly transfer packet to that
node.
As shown in Fig.7 Authp(X,Y) If Authn(X,Y) = F then Authp is carried out.
Choose all path from Node Y i.e. Set of all Pi
If Pi = { } Then send to exact next node
5.2.3. Auth Key Packet (Authkey):
It is a packet used for authentication of destination. When intermediate nodes receives RREP message
from any source node; the intermediate nodes will forward the acknowledgement packet along with some
authentication majors. The authentication will be done using security questions or more information to
authenticate the nodes on the route. We are considering MAC Address and also we will see Data Routing
Information of each node along with normal routing table [3][6].In DRI table we will add the fields like node
and the transmission taken Through and From that node. The DRI table will be updated periodically.
5.2.4. Acknowledgement:
After successful completion of first data packet acknowledgement is sent back to the source node.
If Ack = success
Ack(sucess) = {Ack 0, info of Authn(X,Y)}
If Transmission between Node X and Node Y is successful than ack will be sent to Node X also the status of
Auth(X, Y) will be updated.
Figure 7. Successful transmission through Node X to Node Y
6. Manet: Black Hole Node…
www.ijceronline.com ||Ju ne ||2013|| Page 84
After following these steps source will receive Authkey packet from all the nodes which are on its path.
If Authkey packet differs considering its security means then the Black hole is detected.
Else data packet can be passed from the path.
5.3. Example for detection of Black hole using above technologies:
As shown in the following network; there are total six nodes which are connected.
Source Node = A Destination Node = D
Let; Authn(A,B) = T Authn(F,D) = T Means Successful data transmission already occurred.
Authn(B,C) = F Authn(C,F) = F Means Still any successful data transmission not occurred.
Figure 8. MANET Example with our Terminologies
Some notations we have used like:
Steps for solving:
1. Initial data packet transmission is initiated from source Node A.
2. Since Authn(A,B) = T
Pass packet to Node B
3. Since Authn(B,C) = F we will go for Authp(B,C)
Also PB TO D = { 0 }
No other authenticated path exists from Node B hence pass packet to Node C by considering mutual trust.
4. Authn(C,F) = F and Authn(C,E) = F Hence consider Authp
Since PC TO D = {CFD,CED} Hence send packet to both the path.
After getting reply of Autkey packet from Node F and Node E.