Sie sind auf Seite 1von 8

International Journal of Computer Networking,

Wireless and Mobile Communications (IJCNWMC)


ISSN(P): 2250-1568; ISSN(E): 2278-9448
Vol. 6, Issue 5, Oct 2016, 41-48
TJPRC Pvt. Ltd

SECURE ROUTING PROTOCOL DESIGN: AODV PROTOCOL VULNERABILITY


TO BLACK HOLE ATTACK IN COMPARISON OF OLSR PROTOCOL
NAJIYA SULTANA
Assistant Professor, Department of CS & IT, Taibah University, Saudi Arabia
ABSTRACT
In our research, with solution finding technique we have dissected the conduct and difficulties of security
dangers in versatile Ad-Hoc systems. The extent of this exploration is to concentrate on the impacts of Black gap assault
in MANET utilizing both Proactive directing convention i.e. Streamlined Link State Routing (OLSR) and Reactive
steering convention Ad-Hoc on Demand Distance Vector (AODV). For both conventions Comparative examination of
Black Hole assault is considered. On the execution of MANET the effect of Black Hole assault is assessed discovering
which convention is more helpless against the assault and what amount is the effect of the assault on both conventions.
In the light of throughput, end-to-end defer and organize load the estimations were taken. Recreation is done in
Optimized Network Engineering Tool (OPNET). In this paper our study concentrates on breaking down the impacts of
dark opening assault in the light of Network burden, throughput and end-to-end delay in MANET. We mimic the dark
and Reactive conventions to break down which of these two sorts of conventions are more helpless against Black Hole
assault. In spite of the fact that, there was a gigantic exploration work in past that has additionally focused on tending to
security issues in Mobile Ad hoc Network, yet greater part of the earlier studies are researched to establish different
specialized infeasibilities with regards to calculation, dependability, and a great deal more modern nature of study.
Calculation issues was found as dominant part of the earlier study has sent a solid utilizations of cryptography, while
unwavering quality issues was investigated while lion's share of the past work has pushed on planning Intrusion

Original Article

gap assault utilizing Proactive and Reactive directing conventions and we think about the after-effects of both Proactive

Detection/counteractive action framework that really don't consider much basic parameters like childish hub,
questionable conduct of portable hubs, minor ID of parts of narrow minded hub, mistaken hub, or pernicious hubs.
Along these lines, the proposed work is finished by considering all the previously mentioned issues that has not been
tended to much viably in the earlier studies. The proposed concentrate mostly tended to the security dangers and issues in
portable Ad hoc system directing conventions and the prime objectives of the proposed research work is to play out an
exhaustive examination about the different types of assaults and their accessible countermeasures in versatile specially
appointed system. It likewise means to detail a successful basic leadership model where reproduction for narrow minded
hub and vindictive hub can be performed to unlawful the concealed qualities of hub mis-conduct bringing on the root
wellspring of greater part of steering assaults in MANET.
KEYWORDS: Network, Black Hole, MANET, RREP, RREQ, Protocol & AODV

Received: Jul 16, 2016; Accepted: Aug 29, 2016; Published: Sep 15, 2016; Paper Id.: IJCNWMCOCT20165

INTRODUCTION
In Mobile Ad-Hoc Network Security is the most important concern for the basic functionality of network
[3, 7]. The accessibility of system administrations, privacy and respectability of the information can be
accomplished by guaranteeing that security issues have been met. Because of its features like open medium,
changing its topology variably, lack of central monitoring and management, cooperative algorithms and no clear

www.tjprc.org

editor@tjprc.org

42

Najiya Sultana

defence mechanism MANETs often suffer from security attacks. These factors have changed the battle field situation for
the MANETs against the security threats [1, 2]. On the basis of mutual trust the MANETs work without an incorporated
organization where the hubs speak with each other. This trademark makes MANETs more helpless against be misused by
an assailant inside the system. Remote connections additionally make the MANETs more defenceless to assaults, which
make it simpler for the aggressor to go inside the system and access the continuous correspondence. Versatile hubs present
inside the scope of remote connection can catch and even take an interest in the system. These components have changed
the front line circumstance for MANETs against security dangers [2]. At long last, the proposed study focuses to plan a
probabilistic model where different issues of assault in lion's share of steering convention are tended to in portable
specially appointed system. The proposal work will present all the above talked about objectives alongside delineation of
the exploration strategies embraced to perform it.

WIRELESS NETWORKS
In Wireless systems, PC gadgets speak with each other with no wire. The correspondence medium between the
PC gadgets is remote. At the point when a PC gadget needs to speak with another gadget, the goal gadget must lays inside
the radio scope of each other. In remote systems Users transmit and receive data using electromagnetic waves. Due to its
mobility, simplicity and very affordable and cost saving installation, remote systems are more and more popular. (WWAN)
Wireless wide area network cover geographically bigger area than local area network. The wide area networks almost
consist of one or two local area networks. Satellite Systems, Paging Networks, 2G and 3G Mobile Cellular are the
Examples of WWAN [6, 4].
Versatile Ad-hoc system is an arrangement of remote gadgets named as hubs that powerfully interface and
exchange advanced message. The hubs are frequently PCs or desktop or portable workstations with remote LAN cards,
Personal Digital Assistants, or various types of remote or versatile correspondence types of gear [1]. It might be expected
as self designing system, with none framework, of versatile hubs associated by remote connections. Portable impromptu
system has a routable systems administration surroundings on top of a connection layer specially appointed system. Each
gadget in versatile specially appointed system is unengaged to move autonomously in any bearing and can consequently
adjust its connections to various gadgets intermittently. The premier key test in building a MANET [2] is preparing each
gadget to constantly safeguard the learning expected to precisely course activity. Such systems may work without anyone
else or is additionally associated with the bigger scale system.

MANETS ROUTING PROTOCOLS


To be performed and to provide efficient better end-to-end communication MANETs created a new set of
demands. To give the method for correspondence between conveying work stations MANETs works on TCP/IP structure.
In order to counterbalance the MANETs mobility to provide efficient functionality Work stations are portable and they
have restricted assets, in this way the conventional TCP/IP display should be renovated or changed [8, 5]. In this way, the
key examination region for the scientists is directing in any system. In MANETs Routing protocols are stimulating and
attractive tasks [9].

Impact Factor (JCC): 6.2143

NAAS Rating: 3.27

Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol

43

AD-HOC ON DEMAND DISTANCE VECTOR PROTOCOL (AODV)


AODV is described in RFC 3561 [5]. It is reactive protocol, it has no route when a node wishes to start
transmission with another node in the network to which; for the node AODV will provide topology information. In the
network AODV use control messages to find a way to the destination node.
Route Discovery Mechanism in AODV
At the point when a hub "A" needs to start transmission with another hub "G" as appeared in the figure, it will
produce a Route Request message (RREQ) [10]. This message is proliferated through a restricted flooding to different
hubs. This control message is sent to the neighbours, and those hub forward the control message to their neighbours hubs.
This procedure of discovering goal hub goes ahead until it finds a hub that has a sufficiently new course to the goal or goal
hub is found itself. Once the goal hub is found or a moderate hub with enough crisp courses is found, they create control
message course answer message (RREP) to the source hub [11]. At the point when RREP achieves the source hub, a course
is set up between the source hub "An" and goal hub "G". Once the course is built up amongst "An" and "G", hub "An" and
"G" can speak with each other. At the point when there is a connection down or a connection between goals is broken that
causes one or more than one connections inaccessible from the source hub or neighbours hubs, the RERR message is sent
to the source hub. At the point when RREQ message is communicated for finding the goal hub i.e. from the hub "A" to the
neighbours hubs, at hub "E" the association is broken amongst "E" and "G", so a course mistake RERR message is
produced at hub "E" and transmitted to the source hub educating the source hub a course blunder, where "An" is source
hub and "G" is the goal hub [14]. The scheme is shown in the Figure 1 below.

Figure 1: Route Error Message in AODV

OPTIMIZED LINK STATE ROUTING PROTOCOL (OLSR)


Route packets are broadcast by MPR nodes only. The hubs inside the system keep a rundown of MPR hubs. MPR
hubs are chosen within the region of the source hub. The determination of MPR depends on HELLO message sent between
the neighbour hubs. The determination of MPR is with the end goal that, a way exists to each of its 2 bounce neighbours
through MPR hub. Courses are set up, once it is done the source hub that needs to start transmission can begin sending
information [12, 13].

www.tjprc.org

editor@tjprc.org

44

Najiya Sultana

Figure 2

BLACK HOLE ATTACK


Above Figure shows the working rule of MANETs. In like manner, a remote versatile hub is any figuring gadget
that uses the air as a medium of correspondence. As highlighted, the remote portable hub could likewise be really
connected up to an individual, a vehicle, or a plane, to encourage remote correspondence amongst them.
The technique how malevolent hub fits in the information courses fluctuates. Figure 3 indicates how dark opening
issue emerges, here hub "A" need to send information bundles to hub "D" and start the course disclosure process. So if hub
"C" is a pernicious hub then it will assert that it has dynamic course to the predetermined goal when it gets RREQ bundles.
It will then send the reaction to hub "A" preceding whatever other hub. Along these lines hub "A" will imagine this is the
dynamic course and subsequently dynamic course revelation is finished. Hub "A" will disregard all different answers and
will begin seeding information bundles to hub "C". Along these lines every one of the information parcel will be lost
devoured or lost [14].

Figure 3: Black Hole Problem


Black Hole Attack in OLSR
In this, a malignant hub powerfully chooses itself as MPR. Malevolent hub keep its readiness field to Will
dependably always in its HELLO message. So for this situation, neighbours of malignant hub will constantly choose it as
MPR. Along these lines, the noxious hub gains a special position in the system which it adventures to complete the

Impact Factor (JCC): 6.2143

NAAS Rating: 3.27

Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol

45

foreswearing of administration assault. Near the sender and destination nodes, the impact of this assault is much helpless
when more than one pernicious hub is available The IEEE 802.11 Physical Layer uses Radio Frequency (RF) energy to
transmit or to receive data through the air. Spread-spectrum modulation is a physical layer function that spreads the digital
signal that a network interface card (NIC) transmits. This spreading process makes the data signal much less susceptible to
electrical noise. Two methods are used to spread the signal: frequency hopping or direct sequence. The hopping code
determines the order of frequencies over which the radio transmits. The time spent at a particular frequency during any
single hop is called the dwell time. According to the standard, seventy five or more frequency per transmission channels
with a maximum dwell time of 400ms should be used to implement FHSS systems.

Figure 4: Wormhole Attack


In wormhole assault, the aggressor gets themselves in solid vital area in the system. They have brief path between
the nodes as shown in the Figure 4 above i.e. they make the use of their location. Giving alternate hubs access the system
to know they have the most limited way for the transmitting their information they advertise their path. In the network the
wormhole assailant makes a passage to records the progressing correspondence and activity at one system position and
channels them to another position [12]. When the attackers are occupied in such kind the attack is known as out of band
wormhole. The other type of wormhole attack is known as in band wormhole attack. In this kind of assault the assailant
fabricates an overlay burrow over the current remote medium. For the aggressor this assault is possibly especially unsafe
and is the most favoured decision. In case of black hole attack, our goal was to determine the protocol which shows less
vulnerability. We pick AODV and OLSR directing convention which are receptive and proactive conventions individually.
Malicious node buffer size is reduced to a level which increase packet drop in both case AODV and OLSR. The simulation
parameters are given in following table1.

www.tjprc.org

editor@tjprc.org

46

Najiya Sultana

Table 1
Simulation Parameters
Examined protocols
AODV and OLSR
Simulation time
1000 seconds
Simulation area (m x m)
1000 x 1000
Number of Nodes
16 and 30
Traffic Type
TCP
Performance Parameter
Throughput, delay, Network Load
Pause time
100 seconds
Mobility (m/s)
10 meter/second
Packet Inter-Arrival Time (s) exponential(1)
Packet size (bits)
exponential(1024)
Transmit Power(W)
0.005
Date Rate (Mbps)
11 Mbps
Mobility Model
Random waypoint

CONCLUSIONS
Black Hole attack is simulated and with three performing matrices i.e. End-to-End delay, Network Load and
Throughput, its impact on the MANETs is analyzed. In order to draw the final conclusion the results obtained from
simulation are analyzed deeply. We conclude that AODV protocol is more vulnerable to Black Hole attack than that of
OLSR protocol from our research. Many solutions have been studied through extensive literature review. Many of the
proposed solution claimed to be the best solution but still these solutions are not perfect in terms of effectiveness and
efficiency. On the off chance that any arrangement functions admirably within the sight of single malignant hub, it cannot
be applicable in case of multiple malicious nodes. The middle of the road answer messages if crippled prompts the
conveyance of message to the goal hub won't just enhance the execution of system, yet it will likewise secure the system
from Black Hole assault. From our research and analysis of simulation result we make the conclusion that AODV is more
vulnerable to Black Hole attack than OLSR.

FUTURE WORK
Due to their flexible nature i.e. easy to deploy regardless of geographic constraints Wireless Ad-Hoc networks are
widely used networks. In this area a lot of research work is still need. In MANETs using AODV and OLSR protocols we
tried to discover and analyze the impact of Black Hole attack. There is a need to dissect Black Hole assault in different
MANETs steering conventions, for example, DSR, TORA and GRP. Different sorts of assaults, for example, Wormhole,
Jellyfish and Sybil assaults are should have been concentrated on in examination with Black Hole assault. On the basis of
how much they affect the performance of the network they can be categorized. The location of this conduct of Black Hole
assault and also the end technique for such conduct must be completed for further research.
REFERENCES
1.

C.E. Perkins and E.M. Royer (1999). Ad-Hoc on Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop
on Mobile Computing Systems and Applications, pp.90-100.

2.

C.M barushimana, A .Shahrabi (2003). Comparative Study of Reactive and Proactive Routing Protocols Performance in
Mobile Ad-Hoc Networks, Workshop on Advance Information Networking and Application, Vol. 2, pp. 679-684.

Impact Factor (JCC): 6.2143

NAAS Rating: 3.27

Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol
3.

47

C.Jiwen, Y.Ping, C.Jialin, W.Zhiyang, L.Ning (2010). An Adaptive Approach to Detecting Black and Gray Hole Attacks in
Ad Hoc Network,24th IEEE International Conference on Advance Information Networking and Application (AINA 2010), pp.
775-780.

4.

Y.F.Alem, Z.C.Xuan (2010). Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection,2nd
International Conference on Future Computer and Communication (ICFCC 2010), Vol. 3, pp. 672-676.

5.

C.Parkins, E.B.Royer, S.Das, A hoc On-Demand Distance Vector (AODV) Routing. (2003). [Online]. Available:
http://www.faqs.org/rfcs/rfc3561.html. [Accessed: April. 10, 2010].

6.

M.Abolhasan, T.Wysocki, E.Dutkiewicz (2003). A Review of Routing Protocols for Mobile Ad-Hoc Networks,
Telecommunication and Information Research Institute University of Wollongong, Australia.

7.

T.Clausen, P.Jacquet (2003). Optimized Link State Routing Protocol (OLSR), RFC 3626.

8.

Z.J.Hass, M.R.Pearlman, P.Samar (2002). The Zone Routing Protocol (ZRP) for Ad Hoc Networks, 55th Proceeding of
International task force.

9.

P.V.Jani (2002). Security within Ad-Hoc Networks, Position Paper, PAMPAS Workshop.

10. M.Parsons, P.Ebinger (2003). Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks, [Online].
Available: www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].
11. D.B.Roy, R.Chaki and N.Chaki (2009). A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1.
12. H.L.Nguyen, U.T.Nguyen (2006). Study of Different Types of

Attacks on Multicast in Mobile Ad Hoc Networks,

International Conference on System and Networks and International Conference on Mobile Communications and Learning
Technologies (ICN/ICONS/MCL 2006), pp.149-149.
13. C.Wei, L.Xiang, B.yuebin and G.Xiaopeng (2007). A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc
Networks, Second International Conference on Communications and Networking in china, pp.366-370.
14. S.Marti, T.J.Giuli, K.Lai, M.Baker (2013). Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks, Proceedings of the
6th annual international conference on Mobile computing and networking, united states, pp. 255-265, Zhu, C. Lee,
M.J.Saadawi, T., RTT-Based Optimal Waiting time for Best Route Selection in Ad-Hoc Routing Protocols, IEEE Military
Communications Conference, Vol. 2, pp. 1054-1059.

www.tjprc.org

editor@tjprc.org

Das könnte Ihnen auch gefallen