SlideShare a Scribd company logo
Ad-hoc On-Demand Distance
 Vector Protocol and Black
   Hole Attack Detection
                            Presented By :
                            Rajkumar Singh
                            Guide :
                            Dr. Santosh Biswas

         Dept. Of Computer Science
  Indian Institute of Technology, Guwahati
Mobile Ad-hoc Network
● A Mobile ad-hoc network is a collection of
wireless nodes that can dynamically be set
up anywhere and anytime without having the
preexisting network infrastructure.

●It is an autonomous system in which mobile
hosts connected by wireless links are free to
move randomly. Here the node sometime act
as host and also some time act as Router.

●Very Useful in Household, Industry, Study
and Military purposes.
Ad-hoc On-Demand Distance
          Vector Protocol
● AODV Routing protocol is one of the more commonly
used routing algorithm in ad-hoc networks, and this is
based on the principle of discovering routes on
requirement. Means AODV is both On-demand and
Table driven protocol.

●AODV is a reactive algorithm that has some
capabilities as low processing, memory overhead, low
network utilization.

●When a path needed then source node first check in
its routing table and if not found then it send Route
Request (RREQ).
AODV Contd..
    ●   Source node broadcasts a
        RREQ packet. RREQ packet
        having fields.


    ●
     Either intermediate node
    having Fresh enough route to
    the destination or destination
    node itself will send Route
    Reply (RREP) packet. RREP
    packet having fields.

●Node uni-casts RREP to its
neighbouring node from which it
has received the RREQ packet
                                     Fig. 1: Route Discovery
Attacks in Ad-hoc Network

●Attacks can be classified into passive and
active attack.
●Active attacks can be further divided into

external attacks and internal attacks.
 Some of the Active attacks are :
  ● Black Hole

  ● Denial of Service

  ● Routing table overflow

  ● Impersonation

  ● Energy Consumption

  ● Information Disclosure
Black Hole Attack in AODV
● As shown in Fig. 1 any intermediate node having
fresh enough route to destination node can reply to
Route request(RREQ) sent by source node.
●Hence taking advantage of this a malicious node send

a RREP packet to source node claiming that i am
having a route to destination node. But in reality that
malicious node is not having any route to destination
node. Means Malicious node send a RREP having
false information.
● Source node after receiving this send the data

through this malicious node and this node drops the
data. Hence such nodes can crash the network.
● Some times a chain of black nodes perform this

attack cooperatively, known as cooperative black hole
attack. Attacks are shown below.
Black Hole Attack (Contd..)




Fig. 2: Black Hole attack    Fig. 3: Cooperative black hole attack

● Some time in AODV if in RREP the next hop
information is also asked than malicious node provide
next malicious node as next hop, so when confirmed with
the next hop then next malicious node replies that i am
having route to the destination node but actually they
don't have any information of routes to destination. This
case is shown in Fig. 3.
Black Hole Attack Detection
● Many solutions are proposed for black hole attack
detection or removal.
●The approach that i am discussing is based on the

backbone network discussed by Rubin et. Al.
● We maintain a backbone network which operates at a

level above the ad-hoc network. In this algorithm this
idea is used to monitor the traffic flow.
●In this Algorithm nodes are divided in three parts:

 1. Regular Node (RN): low power and low
transmission range, not trustworthy.
 2. Back Bone Node (BN): Have high transmission
range and form a core that monitors the nodes
 3. Backbone core node (BCN) : Similar power as
BN, these nodes can be elevated to BN nodes for
increasing connectivity and coverage of the network
Black-hole attack Detection(Contd..)
This algorithm is having mainly two parts.
1. Core Formation and maintenance
2. Detection of Black/malicious nodes.

1. Core Formation and maintenance: Core formation
progresses incrementally. During this BCN node
perform some tasks those are

(i) Detect RN in its neighbourhood, if found broadcast
“invitation” message.

(ii) On receiving Join request from RN, check if it is
reachable in specified number of hops, if yes add in
associated node list else in unassociated list.

(iii)if no other request go to next grid.
Core Formation (Contd..)
(iv) If BCN detects any BN in its vicinity then this node
sends a coordination message to BN and waits for
reply.

(v) BCN on receiving reply to coordination message, it
executes action which is specified in the reply.

Action of a Regular node:
(i) Every Regular node first check if it is associated with
some BCN or BN, if yes then terminate its actions.

(ii) On receiving invitation message send a join request,
and after getting reply for its join request from BN or
BCN send “accept” to BN or BCN.
Black Node Detection
The key idea is that source node, after every block of
data packets, asks the backbone network to perform
end-to-end check with the destination, whether the
packets have reached it. If destination did not receive a
block of data packets, then backbone network initiates
the detection of the chain of malicious nodes.

Let Suppose here :
S : Source node,
D: Destination node,
N1:Backbone node, to which S is associated
N2:Backbone node, to which D is associated
V : Regular Node
Nr: is the node which send RREP to S (For the RREQ
for S to D route)
Black Node Detection(Contd..)
Actions of S: (i) Divide the data into k equal parts let
say Data[1..k].
(ii) Send a prelude message to D with shared key k.
(iii) Sends the data to D and after that send a message
check having Nr, to N1.
(iv) if an “ok” is received from N1 the continue data
sending.
(v) if a “not ok” is received from N1 then sets a timer for
malicious removal. If before timeout receive the
“removed ok” from N1 then go to (ii), else terminate.

D on receiving prelude from D. Wait for data packet
and after receiving data send a postulate message to
N1 and S stating the number of packets received from
S.
Black Node Detection
Action of N1: (i) On receiving prelude from S, sends
monitor message to all neighbours of S asking them to
monitor data sent by S.
(ii) on receiving “check” from S sends query to all
neighbours of S and waits for result message.
(iii) on receiving result message set the the its max
counter value. If it receive “D malicious” then repeat the
steps, and if not receive any message from D then
sends message to D and terminate.
● In same way N2 also send monitor message to

neighbours of D to record the number of packets
received by D and then set its counter accordingly.
● Regular node on receiving monitor check if S is its

neighbour then start counting the number of packets S
to D. And also on receiving query message send result
message to the source of query message.
Black Node Detection(Contd..)
Once the BN say N1 finds that ack message not
received until a predefined timeout. Then Black hole
removal process get initiated by N1. The actions of
different node are as follows:
Actions by N1: Broadcast find_chain message on the
backbone network. The message contains the id of
node Nr( node sending RREP to S).
Action of a BN Nb:(i) On receiving the find_chain
message, checks if node Nr belongs to its associated
list. If not, no further action.
(ii) Initialize a list (black_node_chain) to contain node
Nr.
(iii) Instruct all neighbours of Nr to vote for the next
node to which Nr is forwarding packets originating from
S and Destined to D.
(iv) On receiving node ids from the neighbours of Nr,
find the node to which Nr is sending the packet.
Black Node Detection(Contd..)
(v) if no node is getting packet from Nr in its
neighbourhood, means Nr is dropping all the packets.
Hence Nr is malicious node, black hole process
terminates, then this node is black listed and a
broadcast message is sent across the network to alert
all other nodes about the node as malicious.

(vi) Append the elected/found node to black_hole
chain. If that node is in association list of this Nb the go
to step (iii), replacing Nr with the elected node.

(vii) Broadcast a find)chain message over backbone
network containing id of the elected node as the
malicious node. Also Broadcast the Black_hole_chain
formed till now over the network so that other BN can
append malicious nodes to the list
Black Node Detection(Contd..)

Action of BCN/RN: Regular node or Backbone core
node on receiving instruction from a BN node to find
the next node to which malicious node Nr is forwarding
the packets, check if Nr is a neighbour of this node. If
yes, turn on promiscuous mode and listen packets from
node N, which has S as source node and D as
destination node. Infer the next node to which these
packets are going and send a message containing
node id to the BN.

In this way all the black nodes are detected and every
node is having list of such malicious nodes so if they
get any RREP from such malicious node then they just
drop it. And Hence can avoid the Attack.
Conclusion


● Here I have presented AODV details and
Detection of Black hole Attack.
●Using this Algorithm the Simple black hole

attack, Cooperative black hole attack can be
removed, and also to some extent Gray hole
attack can also be removed.
●This algorithm takes O(md) number of hops

to detect black nodes. Where m is the
number of malicious nodes and d is the
diameter of the network.
References
1. RFC standard-3561, http://www.ietf.org/rfc/rfc3561.txt
2. Izhak Ruhin,Arash Behzad, Runlie Zhang, Iluiyu Luo,Eric Caballero : TBONE:
A Mobile-Backbone Protocol for Ad Hoc Wireless Networks.
3. H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc network.
IEEE Communications Magzine, pages 70 - 75, 2002.
4. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard.
 Prevention of cooperative black hole attack in wireless ad hoc networks. In
Proceedings of 2003 International Conference on Wireless Networks (ICWN03),
pages 570575. Las Vegas, Nevada, USA, 2003.
5. P.Agarwal, R.K Ghosh, S.K Das, Cooperative Black and Gray Hole Attacks in
Mobile Ad Hoc Networks
6. I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero. Tbone: A mobile
Backbone protocol for ad hoc wireless networks. In Proceedings of IEEE
Aerospace Conference, volume 6, pages 2727 2740, 2002.
7. Y. C. Hu, A. Perrig, and D. B. Johnson, Ariadne: A secure on-demand
Routing protocol for ad hoc networks, in Eighth Annual International Conference
 on Mobile Computing and Networking (Mobi-Com 2002), pp. 12-23, Sept. 2002.
AODV protocol and Black Hole attack

More Related Content

What's hot

Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Global state routing
Global state routingGlobal state routing
Global state routing
Tata Consultancy Service Limited
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
Vishal Tandel
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
selvakumar_b1985
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
Pallavi Agarwal
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
KhushbooGupta145
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Shanka Mahakumbura
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
Smriti Agrawal
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 

What's hot (20)

Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Dect
DectDect
Dect
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 

Similar to AODV protocol and Black Hole attack

IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attack
ijma
 
C0331215
C0331215C0331215
C0331215
iosrjournals
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
Alexander Decker
 
Grayhole
GrayholeGrayhole
Grayhole
Kumud Dixit
 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
pijans
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
Birju Tank
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
IJERD Editor
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
INFOGAIN PUBLICATION
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
IJERD Editor
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
ijasa
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
HemalathaR31
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
IOSR Journals
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh network
Anbarasu S
 

Similar to AODV protocol and Black Hole attack (20)

IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attack
 
C0331215
C0331215C0331215
C0331215
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Grayhole
GrayholeGrayhole
Grayhole
 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh network
 

More from Raj Sikarwar

Rabindranath tagore Biography
Rabindranath tagore BiographyRabindranath tagore Biography
Rabindranath tagore Biography
Raj Sikarwar
 
Hidden Surface Removal using Z-buffer
Hidden Surface Removal using Z-bufferHidden Surface Removal using Z-buffer
Hidden Surface Removal using Z-buffer
Raj Sikarwar
 
Overlapping community Detection Using Bayesian NMF
Overlapping community Detection Using Bayesian NMFOverlapping community Detection Using Bayesian NMF
Overlapping community Detection Using Bayesian NMFRaj Sikarwar
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
Raj Sikarwar
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
Raj Sikarwar
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Raj Sikarwar
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
Raj Sikarwar
 

More from Raj Sikarwar (7)

Rabindranath tagore Biography
Rabindranath tagore BiographyRabindranath tagore Biography
Rabindranath tagore Biography
 
Hidden Surface Removal using Z-buffer
Hidden Surface Removal using Z-bufferHidden Surface Removal using Z-buffer
Hidden Surface Removal using Z-buffer
 
Overlapping community Detection Using Bayesian NMF
Overlapping community Detection Using Bayesian NMFOverlapping community Detection Using Bayesian NMF
Overlapping community Detection Using Bayesian NMF
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
 

AODV protocol and Black Hole attack

  • 1. Ad-hoc On-Demand Distance Vector Protocol and Black Hole Attack Detection Presented By : Rajkumar Singh Guide : Dr. Santosh Biswas Dept. Of Computer Science Indian Institute of Technology, Guwahati
  • 2. Mobile Ad-hoc Network ● A Mobile ad-hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without having the preexisting network infrastructure. ●It is an autonomous system in which mobile hosts connected by wireless links are free to move randomly. Here the node sometime act as host and also some time act as Router. ●Very Useful in Household, Industry, Study and Military purposes.
  • 3. Ad-hoc On-Demand Distance Vector Protocol ● AODV Routing protocol is one of the more commonly used routing algorithm in ad-hoc networks, and this is based on the principle of discovering routes on requirement. Means AODV is both On-demand and Table driven protocol. ●AODV is a reactive algorithm that has some capabilities as low processing, memory overhead, low network utilization. ●When a path needed then source node first check in its routing table and if not found then it send Route Request (RREQ).
  • 4. AODV Contd.. ● Source node broadcasts a RREQ packet. RREQ packet having fields. ● Either intermediate node having Fresh enough route to the destination or destination node itself will send Route Reply (RREP) packet. RREP packet having fields. ●Node uni-casts RREP to its neighbouring node from which it has received the RREQ packet Fig. 1: Route Discovery
  • 5. Attacks in Ad-hoc Network ●Attacks can be classified into passive and active attack. ●Active attacks can be further divided into external attacks and internal attacks. Some of the Active attacks are : ● Black Hole ● Denial of Service ● Routing table overflow ● Impersonation ● Energy Consumption ● Information Disclosure
  • 6. Black Hole Attack in AODV ● As shown in Fig. 1 any intermediate node having fresh enough route to destination node can reply to Route request(RREQ) sent by source node. ●Hence taking advantage of this a malicious node send a RREP packet to source node claiming that i am having a route to destination node. But in reality that malicious node is not having any route to destination node. Means Malicious node send a RREP having false information. ● Source node after receiving this send the data through this malicious node and this node drops the data. Hence such nodes can crash the network. ● Some times a chain of black nodes perform this attack cooperatively, known as cooperative black hole attack. Attacks are shown below.
  • 7. Black Hole Attack (Contd..) Fig. 2: Black Hole attack Fig. 3: Cooperative black hole attack ● Some time in AODV if in RREP the next hop information is also asked than malicious node provide next malicious node as next hop, so when confirmed with the next hop then next malicious node replies that i am having route to the destination node but actually they don't have any information of routes to destination. This case is shown in Fig. 3.
  • 8. Black Hole Attack Detection ● Many solutions are proposed for black hole attack detection or removal. ●The approach that i am discussing is based on the backbone network discussed by Rubin et. Al. ● We maintain a backbone network which operates at a level above the ad-hoc network. In this algorithm this idea is used to monitor the traffic flow. ●In this Algorithm nodes are divided in three parts: 1. Regular Node (RN): low power and low transmission range, not trustworthy. 2. Back Bone Node (BN): Have high transmission range and form a core that monitors the nodes 3. Backbone core node (BCN) : Similar power as BN, these nodes can be elevated to BN nodes for increasing connectivity and coverage of the network
  • 9. Black-hole attack Detection(Contd..) This algorithm is having mainly two parts. 1. Core Formation and maintenance 2. Detection of Black/malicious nodes. 1. Core Formation and maintenance: Core formation progresses incrementally. During this BCN node perform some tasks those are (i) Detect RN in its neighbourhood, if found broadcast “invitation” message. (ii) On receiving Join request from RN, check if it is reachable in specified number of hops, if yes add in associated node list else in unassociated list. (iii)if no other request go to next grid.
  • 10. Core Formation (Contd..) (iv) If BCN detects any BN in its vicinity then this node sends a coordination message to BN and waits for reply. (v) BCN on receiving reply to coordination message, it executes action which is specified in the reply. Action of a Regular node: (i) Every Regular node first check if it is associated with some BCN or BN, if yes then terminate its actions. (ii) On receiving invitation message send a join request, and after getting reply for its join request from BN or BCN send “accept” to BN or BCN.
  • 11. Black Node Detection The key idea is that source node, after every block of data packets, asks the backbone network to perform end-to-end check with the destination, whether the packets have reached it. If destination did not receive a block of data packets, then backbone network initiates the detection of the chain of malicious nodes. Let Suppose here : S : Source node, D: Destination node, N1:Backbone node, to which S is associated N2:Backbone node, to which D is associated V : Regular Node Nr: is the node which send RREP to S (For the RREQ for S to D route)
  • 12. Black Node Detection(Contd..) Actions of S: (i) Divide the data into k equal parts let say Data[1..k]. (ii) Send a prelude message to D with shared key k. (iii) Sends the data to D and after that send a message check having Nr, to N1. (iv) if an “ok” is received from N1 the continue data sending. (v) if a “not ok” is received from N1 then sets a timer for malicious removal. If before timeout receive the “removed ok” from N1 then go to (ii), else terminate. D on receiving prelude from D. Wait for data packet and after receiving data send a postulate message to N1 and S stating the number of packets received from S.
  • 13. Black Node Detection Action of N1: (i) On receiving prelude from S, sends monitor message to all neighbours of S asking them to monitor data sent by S. (ii) on receiving “check” from S sends query to all neighbours of S and waits for result message. (iii) on receiving result message set the the its max counter value. If it receive “D malicious” then repeat the steps, and if not receive any message from D then sends message to D and terminate. ● In same way N2 also send monitor message to neighbours of D to record the number of packets received by D and then set its counter accordingly. ● Regular node on receiving monitor check if S is its neighbour then start counting the number of packets S to D. And also on receiving query message send result message to the source of query message.
  • 14. Black Node Detection(Contd..) Once the BN say N1 finds that ack message not received until a predefined timeout. Then Black hole removal process get initiated by N1. The actions of different node are as follows: Actions by N1: Broadcast find_chain message on the backbone network. The message contains the id of node Nr( node sending RREP to S). Action of a BN Nb:(i) On receiving the find_chain message, checks if node Nr belongs to its associated list. If not, no further action. (ii) Initialize a list (black_node_chain) to contain node Nr. (iii) Instruct all neighbours of Nr to vote for the next node to which Nr is forwarding packets originating from S and Destined to D. (iv) On receiving node ids from the neighbours of Nr, find the node to which Nr is sending the packet.
  • 15. Black Node Detection(Contd..) (v) if no node is getting packet from Nr in its neighbourhood, means Nr is dropping all the packets. Hence Nr is malicious node, black hole process terminates, then this node is black listed and a broadcast message is sent across the network to alert all other nodes about the node as malicious. (vi) Append the elected/found node to black_hole chain. If that node is in association list of this Nb the go to step (iii), replacing Nr with the elected node. (vii) Broadcast a find)chain message over backbone network containing id of the elected node as the malicious node. Also Broadcast the Black_hole_chain formed till now over the network so that other BN can append malicious nodes to the list
  • 16. Black Node Detection(Contd..) Action of BCN/RN: Regular node or Backbone core node on receiving instruction from a BN node to find the next node to which malicious node Nr is forwarding the packets, check if Nr is a neighbour of this node. If yes, turn on promiscuous mode and listen packets from node N, which has S as source node and D as destination node. Infer the next node to which these packets are going and send a message containing node id to the BN. In this way all the black nodes are detected and every node is having list of such malicious nodes so if they get any RREP from such malicious node then they just drop it. And Hence can avoid the Attack.
  • 17. Conclusion ● Here I have presented AODV details and Detection of Black hole Attack. ●Using this Algorithm the Simple black hole attack, Cooperative black hole attack can be removed, and also to some extent Gray hole attack can also be removed. ●This algorithm takes O(md) number of hops to detect black nodes. Where m is the number of malicious nodes and d is the diameter of the network.
  • 18. References 1. RFC standard-3561, http://www.ietf.org/rfc/rfc3561.txt 2. Izhak Ruhin,Arash Behzad, Runlie Zhang, Iluiyu Luo,Eric Caballero : TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks. 3. H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc network. IEEE Communications Magzine, pages 70 - 75, 2002. 4. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard. Prevention of cooperative black hole attack in wireless ad hoc networks. In Proceedings of 2003 International Conference on Wireless Networks (ICWN03), pages 570575. Las Vegas, Nevada, USA, 2003. 5. P.Agarwal, R.K Ghosh, S.K Das, Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks 6. I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero. Tbone: A mobile Backbone protocol for ad hoc wireless networks. In Proceedings of IEEE Aerospace Conference, volume 6, pages 2727 2740, 2002. 7. Y. C. Hu, A. Perrig, and D. B. Johnson, Ariadne: A secure on-demand Routing protocol for ad hoc networks, in Eighth Annual International Conference on Mobile Computing and Networking (Mobi-Com 2002), pp. 12-23, Sept. 2002.