12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

96 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010Investigation <strong>of</strong> Blackhole Attack on AODV <strong>in</strong>MANETAnu BalaUniversity Institute <strong>of</strong> Engg. & Tech Deptt, Panjab University, Chandigarh,IndiaEmail: anubala22@gmail.comRaj Kumari and Jagpreet S<strong>in</strong>ghUniversity Institute <strong>of</strong> Engg. & Tech Deptt, Panjab University, Chandigarh,IndiaGuru Teg Bahadur Khalsa Institute <strong>of</strong> Eng<strong>in</strong>eer<strong>in</strong>g and Technology, Malout, IndiaEmail:rajkumari_bhatia5@yahoo.com and drjagz@gmail.comAbstract—Mobile Ad Hoc Network (MANET) consists <strong>of</strong> acollection <strong>of</strong> wireless mobile hosts without the required<strong>in</strong>tervention <strong>of</strong> any exist<strong>in</strong>g <strong>in</strong>frastructure or centralizedaccess po<strong>in</strong>t such as base station. The dynamic topology <strong>of</strong>MANET allows nodes to jo<strong>in</strong> and leave the network at anypo<strong>in</strong>t <strong>of</strong> time. Wireless MANET is particularly vulnerabledue to its fundamental characteristics such as open medium,dynamic topology, distributed cooperation and constra<strong>in</strong>edcapability. In this paper we simulate the blackhole attackwhich is one <strong>of</strong> the possible attacks on AODV rout<strong>in</strong>gprotocol <strong>in</strong> mobile ad hoc networks by the help <strong>of</strong> networksimulator (NS-2). The simulation results show the packetloss, throughput, and end-to-end delay with blackhole andwithout blackhole on AODV <strong>in</strong> MANET. We analyzed thatthe packet loss <strong>in</strong>creases <strong>in</strong> the network with a blackholenode. We also observed that the throughput and end-to-enddelay decreases <strong>in</strong> the network with a blackhole node.Index Terms—<strong>in</strong>troduction, AODV rout<strong>in</strong>g protocol,blackhole attack <strong>in</strong> AODV, simulation environment andresults, conclusion, acknowledgement, referencesI. INTRODUCTIONWireless networks use some sort <strong>of</strong> radio frequencies<strong>in</strong> air to transmit and receive data <strong>in</strong>stead <strong>of</strong> us<strong>in</strong>g somephysical cables. Wireless networks are formed by routersand hosts. Ad-hoc networks are wireless networks wherenodes communicate with each other us<strong>in</strong>g multi-hopl<strong>in</strong>ks. Networks that support mobile wireless ad hocarchitecture are typically called mobile ad hoc networks(MANET). A mobile ad hoc network is formed bymobile hosts. There is no stationary <strong>in</strong>frastructure or basestation for communication. So the function<strong>in</strong>g <strong>of</strong> Ad-hocnetworks is dependent on the trust and co-operationbetween nodes. Ref. [1] Nodes help each other <strong>in</strong>convey<strong>in</strong>g <strong>in</strong>formation about the topology <strong>of</strong> the networkand share the responsibility <strong>of</strong> manag<strong>in</strong>g the network.Ref. [2] Each mobile node acts as a host whenrequest<strong>in</strong>g/provid<strong>in</strong>g <strong>in</strong>formation from/to other nodes <strong>in</strong>the network, and acts as router when discover<strong>in</strong>g andma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g routes for other nodes <strong>in</strong> the network.Ref. [3] Based on the rout<strong>in</strong>g <strong>in</strong>formation updatemechanism, rout<strong>in</strong>g protocols <strong>in</strong> ad hoc wirelessnetworks can be classified <strong>in</strong>to three broad categories:Proactive (or table-driven) protocols, Reactive (or ondemand)protocols, and Hybrid rout<strong>in</strong>g protocols. Theseare further divided <strong>in</strong>to sub categories. Ref. [3] These arevulnerable to rout<strong>in</strong>g attacks. Rout<strong>in</strong>g attacks <strong>in</strong> ad hocwireless networks can also be classified <strong>in</strong>to five broadcategories: Attacks us<strong>in</strong>g Impersonation, Modification,Fabrication, Replay, and Denial <strong>of</strong> Service (DoS). In thispaper, we focus on blackhole attack that belongs tocategory <strong>of</strong> fabrication attacks.Ref. [4] There are three ma<strong>in</strong> rout<strong>in</strong>g protocolsproposed for MANET: Ad hoc On-demand DistanceVector (AODV) rout<strong>in</strong>g, Dynamic Source Rout<strong>in</strong>g(DSDV), and Dest<strong>in</strong>ation Sequence Distance Vectorrout<strong>in</strong>g protocols. AODV and DSR belong to on-demandrout<strong>in</strong>g protocols and DSDV is a table-driven rout<strong>in</strong>gprotocol. These protocols are vulnerable to differentsecurity attacks. In this paper, we use AODV rout<strong>in</strong>gprotocol because the AODV protocol is vulnerable to theblackhole attack. So we have simulated the behavior <strong>of</strong>blackhole attack on AODV <strong>in</strong> MANET.II.AODV ROUTING PROTOCOLRef. [5] Ad-Hoc On-Demand Distance Vector(AODV) is a reactive rout<strong>in</strong>g protocol <strong>in</strong> which thenetwork generates routes at the start <strong>of</strong> communication.Ref. [7] The Ad Hoc On-Demand Distance Vector(AODV) rout<strong>in</strong>g protocol described <strong>in</strong> builds on theDSDV algorithm. AODV is an improvement on DSDVbecause it typically m<strong>in</strong>imizes the number <strong>of</strong> requiredbroadcasts by creat<strong>in</strong>g routes on a demand basis, asopposed to ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a complete list <strong>of</strong> routes as <strong>in</strong> theDSDV algorithm. Ref. [7] The authors <strong>of</strong> AODV classifyit as a pure on-demand route acquisition system, s<strong>in</strong>cenodes that are not on a selected path do not ma<strong>in</strong>ta<strong>in</strong>rout<strong>in</strong>g <strong>in</strong>formation or participate <strong>in</strong> rout<strong>in</strong>g tableexchanges.AODV builds routes us<strong>in</strong>g a route request / route replyquery cycle. When a source node desires a route to adest<strong>in</strong>ation for which it does not already have a route, itbroadcasts a route request (RREQ) packet across thenetwork. Nodes receiv<strong>in</strong>g this packet update their<strong>in</strong>formation for the source node and set up backwardspo<strong>in</strong>ters to the source node <strong>in</strong> the route tables. In additionto the source node's IP address, current sequence number,and broadcast ID, the RREQ also conta<strong>in</strong>s the mostrecent sequence number for the dest<strong>in</strong>ation <strong>of</strong> which the© 2010 ACADEMY PUBLISHERdoi:10.4304/jetwi.2.2.96-100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!