Identification and Prevention of Joint Gray Hole and Black Hole Attacks

2019 ◽  
Vol 10 (2) ◽  
pp. 80-90
Author(s):  
Munesh C. Trivedi ◽  
Sachin Malhotra

Ad-hoc networks consist of a set of autonomous communicating devices that can communicate with each other by establishing multi-hop radio connections, and these connections are maintained in a localized manner. In these types of networks, especially where the nature of communicating nodes is mobile, e.g., MANETs, maintaining security remains a serious challenge due to their wireless, open, and shared communication medium, reliance on cooperative algorithms, dynamically adaptable topologies, an absence of centralized watching points, etc. Most of the existing protocols, utilized for routing in MANETs are susceptible to diverse varieties of attacks. However, it is also susceptible to the well-known gray and black hole attacks. In these types of attacks, malicious nodes are incorrectly advertised as sensible ways to a destination node throughout the route discovery method. This attack becomes complicated when a bunch of malicious nodes are acting together. In this work, a novel mechanism is introduced to identify the malicious node or nodes that have tried to perform malicious activity. Here, identification is made by their increased data routing information (DRI).

Author(s):  
Subash Chandra Mandhata ◽  
S .N. Patro

Security is a major threat and essential requirement for mobile Ad Hoc network. Due to its inherent characteristics, it has many consequent challenges, which needs to be taken care of. In this paper we analyse the black hole attack in MANET using AODV as its routing protocol. Black hole is a type of routing attack where a malicious node impersonates a destination node by sending deceived route reply packet to a source node that initiates a route discovery process. By doing this, the malicious node can deprive the traffic from the source node. We propose a solution that makes a modification in existing AODV routing protocol


Author(s):  
Lalit Tripathi ◽  
Kanojia Sindhuben

MANET (Mobile ad hoc networks) is a collection of wireless mobile nodes dynamically forming an infrastructure less network. Several routing protocols are designed for routing of packets in MANET. One of them is AODV (Ad hoc on demand Distance Vector) protocol whose performance is better for higher mobile nodes. It is more vulnerable to black hole attack by the malicious node. Black hole attack is a network layer attack in MANET that tries to hamper the routing process. During route discovery phase it sends false reply to the nodes and dropped data packets. In this paper, first we have implemented black hole attack in AODV and then analyzed the impact of black hole attack under deferent metrics like throughput, packet delivery ratio and packet loss. Simulator NS-2.35 is used for implementation and result analysis.


2019 ◽  
Author(s):  
Rohi Tariq ◽  
Sheeraz Ahmed ◽  
Raees Shah Sani ◽  
Zeeshan Najam ◽  
Shahryar Shafique

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.


2014 ◽  
Vol 13 (9) ◽  
pp. 5029-5038
Author(s):  
Deepali Raut ◽  
Kapil Hande

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this work the effect of Black hole and Gray Hole attack on DSR protocol has been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed using NS2 simulator. 


2017 ◽  
Vol 10 (1) ◽  
pp. 94-102 ◽  
Author(s):  
Ashish Jain ◽  
Vrinda Tokekar

Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.


Author(s):  
A. S. M. Muntaheen ◽  
Milton Chandro Bhowmick ◽  
Md. Raqibul Hasan Rumman ◽  
Nayeem Al-Tamzid Bhuiyan ◽  
Md. Taslim Mahmud Bhuyain ◽  
...  

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.


2019 ◽  
Vol 8 (4) ◽  
pp. 9203-9210

A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.


Author(s):  
Sunita Prasad ◽  
Rakesh Chouhan

Pervasive computing has wide application in military, medical and smart home domain. In pervasive computing, a large number of smart objects interact with one another without the user intervention. Although the technology is promising but security needs to be addressed before the technology is widely deployed. Pervasive networks are formed spontaneously and the devices communicate via radio. Thus, mobile ad hoc networking is an essential technology for pervasive computing. An ad hoc network is a collection of wireless mobile nodes, which acts as a host as well as a router. The communication between the nodes is multihop without any centralized administration. AODV (Ad Hoc On demand Distance Vector) is a prominent on-demand reactive routing protocol for mobile ad hoc networks. But in existing AODV, there is no security provision against well-known attack known as “Black hole attack”. Black hole nodes are those malicious nodes that agree to forward the packets to destination but do not forward the packets intentionally. Thischapter extends the watchdog mechanism for the AODV routing protocol to detect such misbehavior based on promiscuous listening. The proposed method first detects a black hole node and then gives a new route bypassing this node. The experimental results show that in a lightly loaded, hostile environment, the proposed scheme improves the throughput compared to an unprotected AODV protocol.


Sign in / Sign up

Export Citation Format

Share Document