Energy Efficient Way to Detect Black Hole Attack in MANETs

Page 1

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 3 | Issue 10 | March 2017 ISSN (online): 2349-6010

Energy Efficient Way to Detect Black Hole Attack in MANETs Harsimran Kaur Student Department of Computer Science Punjabi university, Punjab, India

Kamaljeet Mangat Assistant Professor Department of Computer Science Punjabi university, Punjab, India

Abstract Mobile Ad hoc Networks(MANETs) consists of mobile nodes that are interconnected by wireless network interfaces to create a temporary network, each node among the MANET works as a host as well as a router while receiving data nodes help other nodes to forward packets. The wireless nature of the communication makes these networks susceptible to various kinds of security threats. Since these networks lack any central authority, so any intruder can steal the information from the network. Black hole is one such attack which intends to claim shortest path to the destination and then drops the data packets received by it. This paper presents the technique to detect the black hole attack but also in an energy efficient way. The proposed scheme has been compared on the basis of the remaining energy, throughput as well as packet delivery ratio. These parameters have showed an improvement over the existing scheme. Keywords: MANETs, Black Hole, Throughput, Packet delivery ratio _______________________________________________________________________________________________________ I.

INTRODUCTION

A Mobile Ad hoc network (MANET) is wireless self-configuring network composed of different nodes communicate with each other in ad hoc manner without having to create any fixed infrastructure for deploying as well as for centralized administration. The communication among these mobile nodes depends on the kind of routing mechanism used called multi hop routing protocols and connection is maintained in decentralized manner, routing protocols are designed to guarantee efficient packet delivery in network. Mobile Ad hoc networks(MANETs) are the self-organizing and Dynamic network having the capabilities for random motion of nodes to move in any direction to join or leave the network frequently in any direction or change their links by self-configuration of real time network. MANET can easily set up in situation where it is not possible to set up any infrastructure. In MANETs terminals nodes are not able to communicate directly with each other and they have to rely upon some other nodes, so that message should be delivered to destination such networks are often referred to as multi hop network. Black hole attack is dangerous active attacks in denial of service attack category present in MANETs. MANET usually uses reactive routing protocols such as DSR OR AODV for the routing of data packets, the routing protocol is used to discover the routes this is performed by two types of packets as Route Request (RREQ) packet and Route Reply (RREP) packet. When the source node wants to exchange information or sends data to destination node then it checks its routing table if there is no route available in routing table then source node starts its initiation process by sending RREQ message to its neighboring nodes in network to find the shortest route between the source and destination in the network. If Black hole node is present in network, it will send False route reply(RREP) in exchange to this route request message claiming to have the shortest optimum path with minimum hop count to the destination or itself is destination node. Upon sending the fake reply packet, the malicious node can able to place itself in the communicating environment and drops or consumes packets when received it means that the transmitting packets must be passed by this malicious node only. After sending the RREP packet, the malicious node receives the data packets from source node and does not forward these packets to neighboring nodes and these packets are either dropped or consumed by this node. This paper presents related work done by the various authors in past regarding detection or prevention of the black hole attack in the network, section 3 present existing problem, finally the proposed scheme has been presented in section with the results shown at the end. II. LITERATURE SURVEY Shivani Uyyala et al. (2014), In this paper, the authors have proposed mechanism to detect and isolate these attacks in network. MANETs are more susceptible to security attacks due to their unique characteristics such as dynamic topology, no fixed infrastructure, resource limitations and multi-hop scenario[1]. Golok et al. (2012) presents an approach which leads to prevent the black hole node [2]. Nobody will pay attention to malicious node’s Hello message packet. The various authors have given various proposals for detection and prevention of black hole attack in MANET but every suggestion has some limitations and their respected solutions. It is clear that malicious node is the main security threat that affects the performance of the AODV routing protocol. Every parameter has shown incredible

All rights reserved by www.ijirst.org

143


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.