07-09-2013, 02:20 PM
SIMULATION OF BLACK HOLE ATTACK IN WIRELESS AD-HOC NETWORKS
SIMULATION OF BLACK HOLE .pdf (Size: 1.71 MB / Downloads: 46)
ABSTRACT
A Wireless ad-hoc network is a temporary network set up by wireless mobile
computers (or nodes) moving arbitrary in the places that have no network
infrastructure. Since the nodes communicate with each other, they cooperate by
forwarding data packets to other nodes in the network. Thus the nodes find a path to
the destination node using routing protocols. However, due to security vulnerabilities
of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the
malicious nodes.
One of these attacks is the Black Hole Attack against network integrity absorbing all
data packets in the network. Since the data packets do not reach the destination node
on account of this attack, data loss will occur.
There are lots of detection and defense mechanisms to eliminate the intruder that
carry out the black hole attack. In this thesis, we simulated the black hole attack in
various wireless ad-hoc network scenarios and have tried to find a response system in
simulations.
INTRODUCTION
Wireless ad-hoc networks are composed of autonomous nodes that are self- managed
without any infrastructure. In this way, ad-hoc networks have a dynamic topology
such that nodes can easily join or leave the network at any time. They have many
potential applications, especially, in military and rescue areas such as connecting
soldiers on the battlefield or establishing a new network in place of a network which
collapsed after a disaster like an earthquake. Ad-hoc networks are suitable for areas
where it is not possible to set up a fixed infrastructure. Since the nodes communicate
with each other without an infrastructure, they provide the connectivity by
forwarding packets over themselves. To support this connectivity, nodes use some
routing protocols such as AODV (Ad-hoc On-Demand Distance Vector), DSR
(Dynamic Source Routing) and DSDV (Destination-Sequenced Distance-Vector).
Besides acting as a host, each node also acts as a router to discover a path and
forward packets to the correct node in the network.
WIRELESS NETWORKS
Wireless communication is used to transfer data among users without a wired
infrastructure. Using electromagnetic waves, mobile users transmit and receive data
over the air. Wireless communication spreads from home RF to satellites, from
cellular phones to walkie-talkies. Its mobility, simplicity and cost saving installation
advantages make the wireless communication more popular, especially in recent
decades Increasing user mobility needs and developments in the use of laptop
computers and PDA’s is one of the main reasons of the popularity of wireless
networks.