scholarly journals Black Hole Attacks on MANETs: Analysis and Prevention

Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.

2011 ◽  
Vol 225-226 ◽  
pp. 565-568 ◽  
Author(s):  
Chiu Ching Tuan ◽  
Kuen Yang Chen ◽  
Yi Chao Wu

In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector routing (AODV), called PSM-AODV. PSM-AODV modified some field in RREQ, RREP, and RERR packets based on AODV. PSM-AODV thus may defend the possible black hole and fabricated routing attacks. Simulation results showed that PSM-AODV could promote the packet delivery rate based on little overhead in control packets.


Mobile Ad Hoc network (MANET) is a self-configuring network consisting of mobile nodes without any fixed infrastructure. However due to the nodes has not any fixed infrastructure in MANET, it is susceptible to various security attacks like data modification, information sniff, due to low energy, computing ability and bandwidth. In MANET Black hole is also an attack and it is difficult to detect and prevent. The lack of quality in security aspects of ad-hoc routing protocols won’t provide reliability in the data packets movement between source and destination nodes. Implementing the routing decision with trust is an important one in the MANNET security. Hence, this research work propose an enhanced Fuzzy based combined trust scheme (FCTRS) based on public trust and Quality of Service (QoS) trust to detect black hole attack. It provides secure routing based on certificate authority (CA) to improve the performance of Ad-hoc On-demand Distance Vector (AODV). The results will show the performance improvement of proposed protocol over Enhanced Trusted Routing Scheme with Pattern Discovery (ETRS-PD) and the protocol AODV. The metrics in the performance of network examined with different conditions of mobility and the presence of black hole node positions.


Author(s):  
Phat Nguyen Huu

Wireless sensor network (WSN) is a network through radio waves to link a large number of unevenly distributed nodes on a wide range of areas for the purpose of sensing, processing and collecting data.The data transmitted in WSNs is usually sensitive that needs to be protected. WSNs are more vulnerable to attacks due to network characteristics such as wireless transmission, changing network topologies, computing power, limited memory and power of nodes comparing to wired networks. There are many types of attacks on WSNs such as sinkhole attacks, data integrity attacks, wormhole attacks, Black hole attacks, etc. In this article, we will evaluate the impact of Black-hole attacks in the WSN network when using the AODV routing protocol (Ad-hoc On-demand Distance Vector routing). The Black hole attack model will be simulated by Network Simulator 2 (NS-2) by the number of lost packets by counting the number of packets sent by the sending node, receiving packets to destination, and rest energy of the nodes in two cases.


Author(s):  
Sunita Prasad ◽  
Rakesh Chouhan

Pervasive computing has wide application in military, medical and smart home domain. In pervasive computing, a large number of smart objects interact with one another without the user intervention. Although the technology is promising but security needs to be addressed before the technology is widely deployed. Pervasive networks are formed spontaneously and the devices communicate via radio. Thus, mobile ad hoc networking is an essential technology for pervasive computing. An ad hoc network is a collection of wireless mobile nodes, which acts as a host as well as a router. The communication between the nodes is multihop without any centralized administration. AODV (Ad Hoc On demand Distance Vector) is a prominent on-demand reactive routing protocol for mobile ad hoc networks. But in existing AODV, there is no security provision against well-known attack known as “Black hole attack”. Black hole nodes are those malicious nodes that agree to forward the packets to destination but do not forward the packets intentionally. Thischapter extends the watchdog mechanism for the AODV routing protocol to detect such misbehavior based on promiscuous listening. The proposed method first detects a black hole node and then gives a new route bypassing this node. The experimental results show that in a lightly loaded, hostile environment, the proposed scheme improves the throughput compared to an unprotected AODV protocol.


2012 ◽  
Vol 8 (3) ◽  
pp. 199-211 ◽  
Author(s):  
Francesco Palmieri ◽  
Aniello Castiglione

The provision of efficient broadcast containment schemes that can dynamically cope with frequent topology changes and limited shared channel bandwidth, is one of the most challenging research topics in MANETs, and is crucial to the basic operations of networks serving fully mobile devices within areas having no fixed communication infrastructure. This problem particularly impacts the design of dynamic routing protocol that can efficiently establish routes to deliver data packets among mobile nodes with minimum communication overhead, and at the same time, ensure high throughput and low end-to-end delay. Accordingly, this work exploits and analyzes an adaptive probabilistic broadcast containment technique based on a particular condensation phenomenon borrowed from Quantum Mechanics and transposed in self-organizing random networks, that has the potential to effectively drive the on-demand route discovery process. Simulation-based performance analysis has shown that the proposed technique can introduce significant benefits on the general performance of broadcast-based reactive routing protocols in MANETs.


2019 ◽  
Vol 8 (3) ◽  
pp. 8192-8198

Mobile Ad hoc Networks is configured by itself using the Mobile nodes in the Network, the maintenance also done by the wireless nodes itself. Dynamic topology, hop-to-hop communication and open-to-all are the features of MANETS, but these features made security of network highly challengeable. From security concern, routing protocols are highly vulnerable to many security threats like black hole attack. In black hole attack malicious node generates false routing information to the path requests about the route it asked for, which results all data packets forward toward it-self by the source and the black hole node manipulate its data. The cooperative black hole nodes in the other hand cooperate within the malicious nodes to fool the single black hole attack prevention algorithms. Here an approach is proposed to detecting the cooperative black holes nodes and eliminate them by broad casting there information into the network.


The Ad-hoc On-Demand Multipath Distance Vector (AOMDV)is an extension of AODV protocol in the mobile ad-hoc network (MANET). It utilizes the features of DSDV, DSR, and AODV Routing protocols for Secure, Reliable and confidential data transmission against the attacks in the MANET, butinblack hole attack malicious nodes utilize the behavior of AODV and show its malicious behavior at the data transmission, it causes the loss of data packets. So to avoid this loss more researchers have been conducted several techniques for detection and put several efforts to prevent the Blackhole attacks. But still, it isnot prevented completely, sothis paper proposes a Node Disjoint Multiple paths routing algorithm technique on AOMDV against black hole attacks in MANET and shows its better performance in Network Simulator (NS2).


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 477
Author(s):  
Joshua Reginald Pullagura ◽  
D Venkata Rao

In ad hoc network, the topology of network changes frequently due to the mobile nature of nodes where the communication is possible without any fixed network infrastructure. Mobile nodes are battery operated and so energy efficient routing should be provided which increases the network life time. The existing routing mechanisms do not consider both hop count and energy of nodes for data transmission. In this paper we propose a routing mechanism where data transfer from source to destination is based on the minimum hop count and residual energy of mobile nodes. The proposed RPAR protocol shows better performance when compared to existing Energy power aware routing  protocol .The analysis is carried out by using network simulator (NS-2), the simulation results shows that the proposed routing mechanism provides energy efficient and reliable  routing in ad hoc networks.


With traffic increase in a wireless network beyond its capacity and as the number of connected devices continue to grow, the quality of service (QoS) degrades. In this paper we study the impact of mobility on throughput in the case of an infrastructure wireless network using IEEE 802.11 Wi-Fi standard. Since we found in the literature that the mobility of stations can have an impact on the quality of service, we try to remedy to this by implementing a new access category reserved for mobile stations. First we compare the throughput between static and mobile nodes, both connected to a QoS station. Then we propose our new model that consists of adding a new access category used by mobile nodes regardless of their traffic category. The study was made by simulating different scenarios using Network Simulator-3 (NS-3). We found that the throughput may vary depending on the simulation scenario. The simulation results show that with the proposed solution the mobile nodes can have a better throughput.


Sign in / Sign up

Export Citation Format

Share Document