Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: A Mechanism for Detection of Black Hole Attack in Mobile Ad Hoc Networks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
A Mechanism for Detection of Black Hole Attack in Mobile Ad Hoc Networks

[attachment=49882]



Abstract

A mobile ad hoc network (MANET) is a
collection of autonomous nodes that communicate
with each other by forming a multi-hop radio
network and maintaining connections in a
decentralized manner. Security remains a major
challenge for these networks due to their features of
open medium, dynamically changing topologies,
reliance on cooperative algorithms, absence of
centralized monitoring points, and lack of clear lines
of defense. Most of the routing protocols for
MANETs are thus vulnerable to various types of
attacks. Ad hoc on-demand distance vector routing
(AODV) is a very popular routing algorithm.
However, it is vulnerable to the well-known black
hole attack, where a malicious node falsely advertises
good paths to a destination node during the route
discovery process. In this paper, a defense
mechanism is presented against a coordinated attack
by multiple black hole nodes in a MANET.



Introduction

A MANET is a collection of wireless hosts that
can be rapidly deployed as a multi-hop packet radio
network without the aid of any established
infrastructure or centralized administrator. Such
networks can be used to enable next generation
battlefield applications, including situation awareness
systems for maneuvering war fighters, and remotely
deployed unmanned micro-sensor networks.
MANETs have some special characteristic features
such as unreliable wireless media (links) used for
communication between hosts, constantly changing
network topologies and memberships, limited
bandwidth, battery, lifetime, and computation power
of nodes etc.


Black Hole Problem

In an ad hoc network that uses the DSR/AODV
protocol, a black hole node pretends to have a fresh
enough routes to all destinations requested b all the
nodes and absorb the network traffic. When source
node broadcasts the RREQ message for any
destination, the black hole node immediately
responds with the RREP message and with next hope
details. This message is perceived as, if it is coming
from the destination or from a node which has a fresh
enough route to the destination. The source node
assume that the destination is behind the black hole
node and next hope node and perceives the other
RREP packets with next hope node coming from
other nodes.



Working principle of AODV/DSR

In the above figure 3, S wants to transmit to D. So
it first transmits the route request to all the
neighboring nodes. Here node 1, node M and node 2
receive this request. The malicious node has no
intention to transmit the DATA packets to the
destination node D but it wants to intercept/collect
the DATA from the source node S. So it immediately
replies to the request as (M-4). Instead of transmitting
the DATA packets immediately through M, S has to
wait for further reply from the other nodes. After
some time it will receives the reply from node 1 as
(1-3) and node 2 as (2-3). According to this proposed
solution it first selects first two links which contains
next hope details and then transmit simultaneously
same DATA packets along with first link and along
with second link.