20-08-2013, 03:43 PM
Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
Black Hole Attack .pdf (Size: 928.29 KB / Downloads: 141)
ABSTRACT
Wireless networks are gaining popularity to its peak today, as the users want wireless
connectivity irrespective of their geographic position. There is an increasing threat of attacks
on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in
which the traffic is redirected to such a node that actually does not exist in the network. It’s
an analogy to the black hole in the universe in which things disappear. The node presents
itself in such a way to the node that it can attack other nodes and networks knowing that it
has the shortest path. MANETs must have a secure way for transmission and communication
which is quite challenging and vital issue. In order to provide secure communication and
transmission, researcher worked specifically on the security issues in MANETs, and many
secure routing protocols and security measures within the networks were proposed.
Previously the works done on security issues in MANET were based on reactive routing
protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were
studied, and their effects were elaborated by stating how these attacks disrupt the
performance of MANET.
INTRODUCTION
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs
consist of mobile nodes that are free in moving in and out in the network. Nodes are the
systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and
personal computer that are participating in the network and are mobile. These nodes can act
as host/router or both at the same time. They can form arbitrary topologies depending on
their connectivity with each other in the network. These nodes have the ability to configure
themselves and because of their self configuration ability, they can be deployed urgently
without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET
working group (WG) that is devoted for developing IP routing protocols. Routing protocols
is one of the challenging and interesting research areas. Many routing protocols have been
developed for MANETS, i.e. AODV, OLSR, DSR etc.
Motivation
Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic
functionality of network. Availability of network services, confidentiality and integrity of the
data can be achieved by assuring that security issues have been met. MANET often suffer
from security attacks because of its features like open medium, changing its topology
dynamically, lack of central monitoring and management, cooperative algorithms and no
clear defense mechanism. These factors have changed the battle field situation for the
MANET against the security threats.
Related Work
MANET is very much popular due to the fact that these networks are dynamic, infrastructure
less and scalable. Despite the fact of popularity of MANET, these networks are very much
exposed to attacks [9, 23]. Wireless links also makes the MANET more susceptible to
attacks which make it easier for the attacker to go inside the network and get access to the
ongoing communication [9, 21]. Different kinds of attacks have been analyzed in MANET
and their affect on the network. Attack such as gray hole, where the attacker node behaves
maliciously for the time until the packets are dropped and then switch to their normal
behavior [14]. MANETs routing protocols are also being exploited by the attackers in the
form of flooding attack, which is done by the attacker either by using RREQ or data flooding
[16].
In any network, the sender wants its data to be sent as soon as possible in a secure and fast
way, many attackers advertise themselves to have the shortest and high bandwidth available
for the transmission such as in wormhole attack, and the attacker gets themselves in strong
strategic location in the network. They make the use of their location i.e. they have shortest
path between the nodes [12, 17]. One of the most arising issues in MANET is the limited
battery, attackers take an advantage of this flaw and tries to keep the nodes awake until all its
energy is lost and the node go into permanent sleep [18]. Many other attacks MANET such
as jellyfish attack, modification attack, misrouting attack and Routing Table Overflow have
been studied and exposed [19, 13, 20].
WIRELESS NETWORKS
Wireless networks are gaining popularity to its peak today, as the user wants wireless
connectivity irrespective of their geographic position. Wireless Networks enable users to
communicate and transfer data with each other without any wired medium between them.
One of the reasons of the popularity of these networks is widely penetration of wireless
devices. Wireless applications and devices mainly emphasize on Wireless Local Area
Networks (WLANs). This has mainly two modes of operations, i.e. in the presence of
Control Module (CM) also known as Base Stations and Ad-Hoc connectivity where there is
no Control Module. Ad-Hoc networks do not depend on fixed infrastructure in order to carry
out their operations. The operation mode of such network is stand alone, or may be attached
with one or multiple points to provide internet and connectivity to cellular networks.
Ad-Hoc Networks
Ad-Hoc networks have no infrastructure where the nodes are free to join and left the
network. The nodes are connected with each other through a wireless link. A node can serve
as a router to forward the data to the neighbors’ nodes. Therefore this kind of network is also
known as infrastructure less networks. These networks have no centralized administration.
Ad-Hoc networks have the capabilities to handle any malfunctioning in the nodes or any
changes that its experience due to topology changes. Whenever a node in the network is
down or leaves the network that causes the link between other nodes is broken. The affected
nodes in the network simply request for new routes and new links are established Ad-Hoc
network can be categorized in to static Ad-Hoc network (SANET) and Mobile Ad-Hoc
network (MANET).
SECURITY ISSUES IN MANET
Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic
functionality of network. Availability of network services, confidentiality and integrity of the
data can be achieved by assuring that security issues have been met. MANET often suffer
from security attacks because of its features like open medium, changing its topology
dynamically, lack of central monitoring and management, cooperative algorithms and no
clear defense mechanism. These factors have changed the battle field situation for the
MANET against the security threats.
In the last few years, security of computer networks has been of serious concern which has
widely been discussed and formulized. Most of the discussions involved only static and
networking based on wired systems. However, mobile Ad-Hoc networking is still in need of
further discussions and development in terms of security [21]. With the emergence of
ongoing and new approaches for networking, new problems and issues arises for the basics
of routing. With the comparison of wired network Mobile Ad-Hoc network is different. The
routing protocols designed majorly for internet is different from the mobile Ad-Hoc
networks (MANET). Traditional routing table was basically made for the hosts which are
connected wired to a non dynamic backbone [22]. Due to which it is not possible to support
Ad-Hoc networks mainly due to the movement and dynamic topology of networks.
Due to various factors including lack of infrastructure, absence of already established trust
relationship in between the different nodes and dynamic topology, the routing protocols are
vulnerable to various attacks [23].