Conference PaperPDF Available

A review of blackhole attack in mobile adhoc network

Authors:

Abstract

Mobile ad hoc network (MANET) is used in a wide range of application from civilian usage to military battlefield communications. Using multi-hop communication model, a source node can directly communicate with the destination node without infrastructure. Unfortunately, this feature causes the network vulnerable to various attacks. Security preventions implemented in the traditional wired network are unsuitable for MANET. This paper studies several types of attacks, and then discusses one of the most severe attack in the network, blackhole attack. Furthermore, recent efforts for preventing the blackhole attack are comprehensively discussed. Study of literature indicates that the prevention of the blackhole attack can be categorized into three groups, i.e., Protection based on Cryptography, Protocol Modification, and Intrusion Detection and Counter Measure.
A preview of the PDF is not available
... The nodes in Mobile Ad-hoc Network (MANET), as the name suggests have mobility. The routes are being divided into sender and receivers if there is any change in the topology [22]. At this point, the Route Error (RERR) packet will be produced if there is any breakage in the route. ...
Chapter
Full-text available
DTN is the latest growing technology having unique characteristics such as longer delays, intermittent connectivity and limited resources or constrained resources. Delay tolerant networks is a store and forward method which delivered the messages to the nearest potential forwarder by replicating copies of the original messages. DTN is created to handle long delays in wireless networks and handle the intermittent connectivity. An information at particular node is delivered only if it has higher particular than the current node. DTN is studied and implemented in opportunistic network environment (ONE) simulator. DTN is having characteristics like disconnected paths, long delays, higher mobility, uplinks, and downlinks, which leads to network vulnerabilities. These vulnerabilities lead to the compromisation of nodes and can cause security threats as these compromised nodes can disrupt the routing protocols in the network. DTN is exposed to different network layer attacks. Attacks on network layer like gray hole and black hole attack can destroy the topology of the network resulting in loss of data and damage to the network. This paper discusses about the black hole, type of black hole attacks, and different detection techniques in delay tolerant networks.
... In this solution need to built trust table based on the trust values given by other vehicle which they collected from their neighboring vehicles. For the blackhole attack detection in [4] and [6], author proposed the usage of cryptographic methods. By using RSA key exchange neighbor node can be authenticated. ...
Research
Full-text available
Abstract— The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANETs), from the well-known Mobile Ad Hoc Networks (MANETs) in wireless communications. VANETs are self-organizing networks established among vehicles equipped with communication facilities. In VANETs vehicles are equipped with On Board Unit (OBU) through which they are capable of organizing themselves, by discovering their neighbor vehicles and capable to communicate with Infrastructure nodes equipped with Road Side Unit (RSU) for finding optimal path, Service based Information as well as other sensible Information for safe Transportation over the wireless medium. Recently, VANETs have been getting greater attention as more applications are depending on them. Researchers have tried to propose various Protocols, Approaches and methodologies that will improve the Quality, Efficiency, Authenticity and Integrity of different services of VANETs. Many of the applications require a high level of security. Thus, the main challenge is to protect VANETs from different security attacks. VANETs use the open wireless medium to communicate which makes it easy for an attacker to impose his attacks by Manipulating, Sniffing, and blocking the different packets. In VANETs all the nodes can act as routers for the data packets and there is no clear line of defence where it is possible to place a firewall. The main concern is how to provide best security in VANET without any negotiating with performance & reliability.The objective of this work is to check feasibility of using infrastructure based vehicular communication for detecting and preventing Blackhole Attacks. In this paper we proposed three different approaches for Blackhole attack prevention. We analyze performance of the proposed approaches for different scenario by generating heterogeneous traffic environment. With the proposed approaches we get the reduction in Packet Loss of up to 79.6971%. Link: http://www.ijfrcsce.org/download/browse/Volume_3/October_17_Volume_3_Issue_10/1509609510_02-11-2017.pdf
Conference Paper
Mobile Ad-hoc Network (MANET) is based on the routing algorithm which adapts the random changes that may occur in the network topology. MANET is the network with the number of mobile nodes that communicates with one another without any centralized infrastructure. A MANET has a self-organizing property due to which every mobile node gets in connect with each other by wireless links, which follows a random topology. Due to this the wireless ad-hoc network is not secure from the attacks of the malicious nodes. This paper presents the literature review of the routing protocols like AODV, DSR and etc. The paper also presents different layers attacks behavior and countermeasures against those attacks like Blackhole attack, Wormhole attack, Greyhole attack and etc.
Conference Paper
Utilization of mobile devices are burgeoning rapidly and consequently mobile ad-hoc networks (MANETs). The self configuring and infrastructure less property of MANETs makes them easily deployable anywhere and extremely dynamic in nature. Lack of centralized administration and coordinator are the reasons for MANET to be vulnerable to active attack like black hole. Black hole attack is ubiquitous in mobile ad hoc as well as wireless sensor networks. Black hole affected node, without knowing actual route to destination, spuriously replies to have shortest route to destination and entice the traffic towards itself to drop it. Network containing such node may not work according to the protocol being used for routing. Commonly used protocols like ADOV, DSR, and so forth in MANET are not designed to tackle black hole attack or black hole affected routes. Hence this paper proposes an AODV-based secure routing mechanism to detect and eliminate black hole attack and affected routes in the early phase of route discovery. A validity value is attached with RREP which ensures that there is no attack along the path. The proposed method is simulated in NS2 and performance analysis is carried out.
Conference Paper
MANET (Mobile ad-hoc network) is a wireless network. Several mobile nodes are present in MANET. It has various applications ranging from military to remote area communication. Several routing protocols are designed for routing of the packets in the network. AODV (ad hoc on demand vector) is one such protocol. Since, nodes are mobile in the network, security is a main concern. Blackhole attack is a network layer attack that tries to hamper the routing process. In this attack the data packets are dropped. The paper focuses on the analysis of AODV routing protocol under blackhole attack. First we have implemented blackhole attack in AODV and then analyzed the impact of blackhole attack on AODV under metrics like throughput, end to end delay and packet delivery fraction.
Article
Full-text available
In this era of wireless devices, Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices. Therefore, interest in research of Mobile Ad-hoc Network has been growing since last few years. In this paper we have discussed some basic routing protocols in MANET like Destination Sequenced Distance Vector, Dynamic Source Routing, Temporally-Ordered Routing Algorithm and Ad-hoc On Demand Distance Vector. Security is a big issue in MANETs as they are infrastructure-less and autonomous. Main objective of writing this paper is to address some basic security concerns in MANET, operation of wormhole attack and securing the well-known routing protocol Ad-hoc On Demand Distance Vector. This article would be a great help for the people conducting research on real world problems in MANET security.
Article
In this era of wireless devices, Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices. Therefore, interest in research of Mobile Ad-hoc Network has been growing since last few years. In this paper we have discussed some basic routing protocols in MANET like Destination Sequenced Distance Vector, Dynamic Source Routing, Temporally-Ordered Routing Algorithm and Ad-hoc On Demand Distance Vector. Security is a big issue in MANETs as they are infrastructure-less and autonomous. Main objective of writing this paper is to address some basic security concerns in MANET, operation of wormhole attack and securing the well-known routing protocol Ad-hoc On Demand Distance Vector. This article would be a great help for the people conducting research on real world problems in MANET security.
Article
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board.
Article
In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector routing (AODV), called PSM-AODV. PSM-AODV modified some field in RREQ, RREP, and RERR packets based on AODV. PSM-AODV thus may defend the possible black hole and fabricated routing attacks. Simulation results showed that PSM-AODV could promote the packet delivery rate based on little overhead in control packets.
Article
This paper presents a guard node based scheme to identify malicious nodes in Ad hoc On-Demand Distance Vector (AODV) protocol. In this scheme each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than a predefined threshold value, it is identified as malicious and it is not considered for route selection. The proposed model does not use any key distribution process and no changes are made in control packets of AODV. Simulation results show that the proposed scheme improves performance of AODV by identifying and removing malicious nodes. Performance of the scheme has been evaluated for three different types of malicious attacks (impersonation attack, colluding nodes attack and black hole attack).
Conference Paper
Mobile and portable nature of MANETs, increased by two fold the popularity of these networks. Wireless channel is used by these networks and such channel is considered highly vulnerable against malicious attacks. It is a cooperation based network that expects each participating node to forward packets to/from the destination. During packet forwarding, valuable packets that belong to any node are on the discretion of another node. A node can act maliciously or selfishly and could harm the packet under transit. Our paper considered two malicious attacks i.e. gray, black hole and two types of selfish behaviors i.e. type-1, type-2. These attacks were simulated with AODV, a famous routing protocol in MANETs. The objective of malicious and selfish behavior node is to disrupt communication and conserve own resources, respectively. Resource conservation by selfish nodes would also ultimately degrade the overall network performance. Simulations result showed an enormous decrease in packet delivery ratio and extensive packet dropping by these malicious and misbehaving nodes. This study could be a valuable asset for those researchers who are working to propose secure routing protocols that can mitigate such malicious or misbehaving attacks.
Conference Paper
This paper presents a trust based collaborative approach to mitigate black hole nodes in AODV protocol for MANET. In this approach every node monitors neighbouring nodes and calculates trust value on its neighbouring nodes dynamically. If the trust value of a monitored node goes below a predefined threshold, then the monitoring node assume it as malicious and avoids that node from the route path. The experiments reveal that the proposed scheme secures the AODV routing protocol for MANET by mitigating and avoiding black hole nodes.
Conference Paper
Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.
Conference Paper
Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & Secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET) where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Denial of Service attack is applied in the network, evidences are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and False Positive is suppressed to negligible.
Article
Existing Ad Hoc routing protocols are mostly based on efficiency-driven protocols. Malicious nodes can easily impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping or black hole attacks without being detected. It is virtually impossible to find out these kinds of malicious before they attack, therefore it would be sensible to base detection of malicious nodes on post route discovery stage, i.e. when packets are transmitted on discovered routes. In this paper we shall review existing techniques for secure routing and propose to use credibility based route finding protocols. Each node would monitor its neighbors' pattern of delivering packets and regularly update their "credibility" according to certain criteria. The level of trust in any route will be based on the credits associated with the neighbor belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks. We will discuss problems we encountered and our solutions. We would also further develop the protocol, to investigate the possibility of using the unique prime factorization theory to enable nodes acquiring more trust knowledge beyond its immediate neighborhood. Such an approach helps to further secure route-finding procedures.