29-07-2011, 02:53 PM
Abstract
Mobile Ad Hoc Network (MANET) consists of a collection
of wireless mobile hosts without the required intervention of any
existing infrastructure or centralized access point such as base
station. The dynamic topology of MANET allows nodes to join and
leave the network at any point of time. Wireless MANET is
particularly vulnerable due to its fundamental characteristics such
as open medium, dynamic topology, distributed cooperation and
constrained capability. In this paper we simulate the blackhole
attack which is one of the possible attacks on AODV routing protocol
in mobile ad hoc networks by the help of network simulator (NS-2).
The simulation results show the packet loss, throughput, and
end-to-end delay with blackhole and without blackhole on AODV in
MANET. We analyzed that the packet loss increases in the network
with a blackhole node. We also observed that the throughput and
end-to-end delay decreases in the network with a blackhole node.
Keywords -MANET, Blackhole, AODV.
I. INTRODUCTION
Wireless networks use some sort of radio frequencies in
air to transmit and receive data instead of using some
physical cables. Wireless networks are formed by routers
and hosts. Ad-hoc networks are wireless networks where
nodes communicate with each other using multi-hop links.
Networks that support mobile wireless ad hoc architecture
are typically called mobile ad hoc networks (MANET). A
mobile ad hoc network is formed by mobile hosts. There is
no stationary infrastructure or base station for
communication. So the functioning of Ad-hoc networks is
dependent on the trust and co-operation between nodes. As
in [1] Nodes help each other in conveying information
about the topology of the network and share the
responsibility of managing the network. As in [2] Each
mobile node acts as a host when requesting/providing
information from/to other nodes in the network, and acts
as router when discovering and maintaining routes for
other nodes in the network.
As in [3] Based on the routing information update
mechanism, routing protocols in ad hoc wireless networks
can be classified into three broad categories: Proactive (or
table-driven) protocols, Reactive (or on-demand)
protocols, and Hybrid routing protocols. These are further
divided into sub categories. As in [3] These are vulnerable
to routing attacks. Routing attacks in ad hoc wireless
networks can also be classified into five broad categories:
Attacks using Impersonation, Modification, Fabrication,
Replay, and Denial of Service (DoS). In this paper, we
focus on blackhole attack that belongs to category of
fabrication attacks.
As in [4] There are three main routing protocols
proposed for MANET: Ad hoc On-demand Distance
Vector (AODV) routing, Dynamic Source Routing
(DSDV), and Destination Sequence Distance Vector
routing protocols. AODV and DSR belong to on-demand
routing protocols and DSDV is a table-driven routing
protocol. These protocols are vulnerable to different
security attacks. In this paper, we use AODV routing
protocol because the AODV protocol is vulnerable to the
blackhole attack. So we have simulated the behavior of
blackhole attack on AODV in MANET.
The rest of this paper is organized as follows. In
section II, we discuss the AODV routing protocol in detail.
Section III describes the characteristics of the blackhole
attack on AODV. Section IV provides the simulation
environment and results. Finally we conclude in section V.
Download full report
http://www.googleurl?sa=t&source=web&cd=...bs_all.jsp%3Farnumber%3D5384021&ei=q3syTviUC8blrAevz8yjCw&usg=AFQjCNFWqr-w0tKr0h8VflZEqZOCtWdB3w&sig2=cJWh85sG5tQExNX09W-9TA