SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 221
COMPARISON OF THE PERFORMANCE OF TRSAODV WITH AODV
UNDER BLACKHOLE ATTACK IN MANETS
Gayathri. D1
, S. JanakiRaman2
1
Research Scholar, Bharathiar University, Coimbatore, Tamil Nadu, India.
gayathridhananjayan@gmail.com
2
Assistant Professor, Department of Banking Technology, Pondicherry University, Pondicherry, India.
jana3376@yahoo.co.in
Abstract
A MANET is a self configuring, decentralized network of mobile nodes with limited energy and bandwidth. They have dynamic
topology which means their topology keeps changing. These bring lot of challenges in routing. Since there is no central authority
the mobile nodes act both as hosts as well as routers. They provide great comfort due to their portability and ease of installation
with no infrastructure but their nature brings in security issues which could not be compromised which paves way for extensive
research. They are vulnerable to many attacks and one such attack, Black hole Attack is implanted and a Trust based AODV,
TRSAODV has been proposed to overcome the attack and a comparative analysis of proposed TRSAODV with AODV is done in
this paper.
KeyWords: MANET; Blackhole Attack; AODV; Trust; TRSAODV;
--------------------------------------------------------------------***----------------------------------------------------------------------
I. INTRODUCTION
MANETs are Mobile Ad-hoc Networks where the mobile
nodes come in to communication without a fixed
infrastructure. This indicates they can be formed and
resolved at any point of time or at anyplace. This nature
makes them ideal for military operations, rescue operations,
battle-field area and where ever infrastructure is severely
damaged are not present. This decentralized nature paves
way for various attacks in MANETs, where valuable
information is compromised. The attacks are by malicious
nodes or by active nodes which can be categorized in to
active attacks or passive attacks. While passive attacks just
listen to the channel, active attacks usually take place inside
the network. Some common and prevailing active attacks are
Rushing attack, Wormhole Attack, Jellyfish Attack, Black
hole Attack and Neighbor attack. Black hole attack has been
implemented in this simulated MANET and a comparison
analysis of proposed Trust based AODV, TRSAODV with
AODV is analyzed. This paper gives a overview of AODV
protocol and that of a Black hole attack. It then gives the
framework of trust implemented in the TRSAODV protocol.
Following is the simulation model details and discussion of
the result and the future extension of the work.
II. OVERVIEW OF AODV PROTOCOL
AODV is a protocol, finding the route to the destination only
on demand. This protocol maintains the routing table in the
nodes and not in the packets in order to reduce the memory
overhead. AODV makes use of the destination sequence
number for the route’s freshness which prevents looping. It
goes as follows. If the source node has the route to the
destination node then it forwards the packet via that route to
the destination. Destination sequence number of the sought
route in the recipient node’s routing table greater than the
destination sequence number in RREQ packet itself,
indicates the route is fresh route. Else the source starts
flooding the RREQ packets to its neighbor nodes. The
neighbor nodes checks if they are the destination. If they are
the destination they forward the RREP packets to the source
node else they forward the RREQ packets to their neighbor
nodes follow the same procedure. The neighbor nodes on
receiving the RREQ packets check if they have route to the
destination. If they have they send the RREP message with
the route to destination. This is possible because on receiving
the RREQ packets they cache route back to the originator of
RREQ. The RREP packet is checked for the destination
sequence number to be greater than that of the RREQ packet
by the sender. If it is, the sender establishes the route to the
destination.
Every node on receiving RREP packet also creates a route to
the destination in the routing table. Hence, at the time when
RREP packet reaches the source node, all the intermediate
nodes in the shortest route path will have routes to source as
well as destination. AODV uses HELLO messages to ensure
its presence to its neighbors periodically. It uses the RRER
packets about the link failure.
III. BLACKHOLE ATTACK
Black hole attack is a kind of Active attacks in MANET. In
this a malicious node uses its routing protocol in order to
advertise itself for having the shortest path to the destination
node or to the packet it wants to intercept. This hostile node
advertises its availability of fresh routes irrespective of
checking its routing table. In this way the attacker node will
always have the availability in replying to the route request
and thus intercept the data packet and retain it.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 222
In AODV Black hole attack the malicious node “X” first
finds the route which is active between the source node and
the destination node. Then it sends the RREP packet which
contains the spoofed destination address including small hop
count and large destination sequence number than normal to
the node “B” which is the actual destination. Node “Y”
forwards this RREP packet from the node “X” to the source
node “A”. Now the sender or the source node uses this route
to forward the data packet which is caught by the malicious
node and dropped. Hence there is no communication of the
sender and receiver in the black hole attack.
Malicious node (drops the packet)
DATA
RREP high DSN
RREP high DSN RREP low DSN Receiver
DATA
Sender
X
A
Y
B
C
Fig-1: Black Hole Attack
IV. TRSAODV-TRUST IMPLEMENTED AODV
Trust is a metric implemented in AODV in order to enhance
the security issues in MANETs. Many research work are
being carried out in order to have better performance of
MANETs. Here Trust has been quantized and implemented
to have better outcome. Trust is the reliability of one node
on another. Trust is dynamic, subjective, asymmetric,
context dependent, not necessarily transitive. Normal
AODV performs well in the absence of any attacks in the
network but in presence of Black hole attack its performance
decreases drastically and to overcome this Trust is being
introduced.
Framework TRSAODV
Trust is a metric implemented in AODV in very simple yet
effective way in order to overcome black hole attack. It is
done by monitoring the packets forwarded in promiscuous
mode. The detection is done by buffer of packets stored that
have been recently sent for forwarding. A cyclic buffer is
used for the packets storage. Two circular buffers have been
used one to store the general packets forwarded and another
to store the packets that are promiscuous watched. When the
packets delayed for forwarding or if they have not been
forwarded for a very long time the last element is erased thus
decreasing the trust value of that node which is expected to
actually forward the packet. If the packet has been
successfully forwarded that packet is removed from the
buffer, increasing the trust value of the node.
The promiscuous monitoring is implemented using tap
function as follows:
Void TRSAODV : : tap ( const packet *p)
The value is initialized to be zero. Then it is incremented that
are detected to forward packets and are decremented for
nodes that do not forward packets. Hence the route with
node’s trust value which is higher is taken for routing and the
malicious node whose trust value falls down is blacklisted
and avoiding them in packet forwarding.
Map<int, TrustNode*>
Node id : int Trust Node *
Node id : int Trust node *
N1
.
.
.
.
.
.
.
.
.
.
.
Node id : int
Trust value : double
…
Packet buffer :
circular buffer
General packet
buffer : circular
buffer
Fig-2: Trust Map
V. SIMULATION RESULT AND ANALYSIS
Under the Linux system in a virtual machine, NS2 has been
used to simulate the network environment carried on a
analysis of TRSAODV protocol and AODV. The examined
protocols are TRSAODV and AODV with black hole
implemented. The number nodes were from ten to hundred
and the number of black hole attackers were varied from one
to five. The traffic type is constant bit rate (CBR)
,transmission range of 250 meters with the MAC layer
802_11 implemented. The simulation time has been set to
100 seconds with area of 1500 * 1000. Here the packet
delivery ratio and throughput are the metrics considered for
the performance analysis of TRSAODV and AODV.
Table-1: Simulation Parameter Values
PARAMETER VALUES
EXAMINED PROTOCOLS AODV, TRSAODV
TRAFFICTYPE CONSTANT BIT RATE (UDP)
PACKET SIZE 1000 BYTES
SPEED 5M/S
SIMULATION TIME 100S
AREA 1500 * 1000
PROPAGATION TWO RAY GROUND
MAC LAYER 802_11
ANTENNA OMNI ANTENNA
The investigation had been carried out considering
throughput and packet delivery ratio with varying number of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 223
nodes where the number of attackers is kept constant and
with varying number of attackers where number of nodes is
kept constant.
A. Packet Delivery Ratio
Packet Delivery Ratio is the ratio of data packets delivered to
the destination to those generated by the source. In the first
scenario of varying number of attackers the Packet Delivery
Ratio of both AODV and TRSAODV tend to decrease
gradually. However, the TRSAODV’s Packet Delivery Ratio
remains considerably higher than that of the AODV where it
becomes negligible for higher number of attackers.
In the case of varying number of nodes the Packet Delivery
Ratio of TRSAODV increases gradually and remarkably but
for the AODV the increase is negligible and for more dense
network there is a raise in the Packet Delivery Ratio which
speaks about the fairness of TRSAODV.
Fig-3: Packet Delivery Ratio versus Number of Attackers
Fig-4: Packet Delivery Ratio versus Number of Nodes
B. Throughput
Throughput is the number of bytes received successfully. In
case of varying number of attackers the dip is very drastic for
AODV and becomes negligible for higher number of
attackers but stands remarkably high for TRSAODV and
manages even with higher number of attackers.
In case of varying number of nodes the TRSAODV keeps its
efficiency increasing with higher number of nodes where as
the AODV is able to deliver a small amount only when the
node density is high.
Fig- 5: Throughput versus Number of Attackers
Fig- 6: Throughput versus Number of Nodes
The above investigation clearly states the remarkable fairness
of TRSAODV for MANETs over AODV.
V. CONCLUSION AND FUTURE EXTENSION
Securing MANETs from vulnerable attacks is one of the
most challenging area of research. This research paper has
given a fair solution TRSAODV to overcome Black Hole
attack in AODV. In addition to the Trust factor cryptographic
measures, energy efficient strategy can be combined to give a
more robust protocol. Moreover the type of attack
implemented is Black hole where this can substituted with
other active attacks for investigation.
REFERENCES
[1] S.Corson, J.Marker,”Mobile Ad hoc Networking”,RFC-
3651.
[2] C.Perkins, E.Royer and S.Das,”Ad hoc On demand
DistanceVector Routing”,RFC-3651.
[3] Hoang Lan Nguyen, Uyen Trang Nguyen, “A Study of
Different Types of Attacks on MANETs” Elsevier – Ad
hoc Networks 6(2008)32-46.
[4] Mohammed AL-shurman and Seong_Moo yoo,
“Blachhole Attack in Mobile Ad Hoc Networks”
ACMSE’04, April2-3,2004.
[5] Fan-Hsun Tseng, Li-Derchou, Han-chieh Chao, “A
Survey of Blackhole Attacks in wireless mobile ad hoc
Networks” human centric Computing and Information
Sciences, a Springer open journal.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 224
[6] Monika Roopa K, Prof. BVR Reddy, “Blackhole
implementation in AODV Routing Protocol”
International Journal of scientific and Engineering
Research, vol 4, Issue 5, May-2013 ISSN 2229-5518.
[7] P.Manikam, T.GuruBaskar, M.Girija,
Dr.D.Manimegalai, “Performance Comparisons of
Routing Protocols in MANETs” International Journal
of wireless and Mobile networks (IJWMN) vol.3, No.1,
February 2011.
[8] Xing, F., wang, w., “Understanding Dynamic Denial of
Service Attacks in Mobile Ad hoc networks” in IEEE
MilitaryCommunication Conference,MICCOM (2006).
[9] Dr.Aditya Goel, Ajaii Sharma, “Performance Analysis
of MANET using AODV protocol” international
Journal of Computer Science and Security (IJCSS),
volume 3: Issue 5.
[10]Kamarularifin abd.Jalil, Zaid Ahmad, Jamalul-Lail Ab
Manan, “Mitigation of Blackhole Attacks for AODV
Routing Protocol” International Journal of New
Computer Architecture and their Applications.
(IJNCAA)ISSN :2220-9085.
[11]Mangesh Ghonge, Prof.S.u.Nimbhorkar, “Simulation of
AODV under Blackholen Attack in MANETs”
International Journal of Advanced Computer science
and Engineering ,ISSN : 2277-1287.
[12]XiaoQiLi, Michael R.Lyu, and JiangehuanLiu, “trust
Model Based Routing Protocol for Secure Ad hoc
Networks”, IEEEAC paper# 1150.
[13]R.S.Mangrulkar, Pallavi V Chavan, S.N.Dagalkar,
“Improving Routing Selection Mechanism Using Trust
Factor in AODV Routing Protocol for MANET”
International Journal opf Computer Applications (0975-
8887) Vol:7-No.10, October 2010.
[14]Dalip Kamboj and Pankaj Kumar Sehgal, “A
Comparative Study of various Secure Routing protocol
based on AODV” International journal of Advanced
Computer Science and Applications, vol.2, no.7, 2011,
pp 80-85.

More Related Content

PDF
Ab26180184
PDF
A novel approach for preventing black hole
PDF
E0392031034
PDF
B43040610
PDF
Id2414301437
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
PDF
C0331215
Ab26180184
A novel approach for preventing black hole
E0392031034
B43040610
Id2414301437
Elimination of wormhole attacker node in manet using performance evaluation m...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
C0331215

What's hot (20)

PDF
A43030104
PDF
K1803036872
PDF
An Approach to Detect Packets Using Packet Sniffing
PDF
Performance Comparison of Cluster based and Threshold based Algorithms for De...
PDF
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
PDF
Performance investigation of re shuffling packet attack on transport layer pr...
PDF
Performance investigation of re shuffling packet
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
PDF
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
PDF
An4101227230
PDF
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
PDF
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDF
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
PDF
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
PDF
Ijcatr04041022
PDF
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
PDF
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
PDF
Defending against collaborative attacks by
A43030104
K1803036872
An Approach to Detect Packets Using Packet Sniffing
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet
Adopting hybrid cryptography technique for reduction of network overhead in m...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
An4101227230
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
Ijcatr04041022
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
Defending against collaborative attacks by
Ad

Similar to Comparison of the performance of trsaodv with aodv under blackhole attack in manets (20)

PDF
Impact of black hole attack on aodv routing protocol
PDF
Impact of Black Hole Attack on AODV Routing Protocol
PDF
Impact of Black Hole Attack on AODV Routing Protocol
PDF
Impact of Black Hole Attack on AODV Routing Protocol
PDF
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
PDF
Vol 15 No 2 - March 2015
PDF
A survey on mitigation methods to black hole attack on aodv routing protocol
PDF
Analysis of Blackhole Attack in AODV and DSR
PDF
Dt36717722
PDF
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
PDF
Hu3114871491
PDF
Performance Evaluation of Wormhole Attack In AODV
PPT
Master_Research_Proposal_v2.ppt
PDF
560 229-237
PDF
Ijarcet vol-2-issue-4-1318-1321
PPTX
AODV Protocol
PDF
International Journal of Computer Science, Engineering and Applications (IJCSEA)
PDF
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
PDF
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
PDF
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
Impact of black hole attack on aodv routing protocol
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
Vol 15 No 2 - March 2015
A survey on mitigation methods to black hole attack on aodv routing protocol
Analysis of Blackhole Attack in AODV and DSR
Dt36717722
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Hu3114871491
Performance Evaluation of Wormhole Attack In AODV
Master_Research_Proposal_v2.ppt
560 229-237
Ijarcet vol-2-issue-4-1318-1321
AODV Protocol
International Journal of Computer Science, Engineering and Applications (IJCSEA)
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
Ad

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Welding lecture in detail for understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
web development for engineering and engineering
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPT on Performance Review to get promotions
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Welding lecture in detail for understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mechanical Engineering MATERIALS Selection
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
web development for engineering and engineering

Comparison of the performance of trsaodv with aodv under blackhole attack in manets

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 221 COMPARISON OF THE PERFORMANCE OF TRSAODV WITH AODV UNDER BLACKHOLE ATTACK IN MANETS Gayathri. D1 , S. JanakiRaman2 1 Research Scholar, Bharathiar University, Coimbatore, Tamil Nadu, India. gayathridhananjayan@gmail.com 2 Assistant Professor, Department of Banking Technology, Pondicherry University, Pondicherry, India. jana3376@yahoo.co.in Abstract A MANET is a self configuring, decentralized network of mobile nodes with limited energy and bandwidth. They have dynamic topology which means their topology keeps changing. These bring lot of challenges in routing. Since there is no central authority the mobile nodes act both as hosts as well as routers. They provide great comfort due to their portability and ease of installation with no infrastructure but their nature brings in security issues which could not be compromised which paves way for extensive research. They are vulnerable to many attacks and one such attack, Black hole Attack is implanted and a Trust based AODV, TRSAODV has been proposed to overcome the attack and a comparative analysis of proposed TRSAODV with AODV is done in this paper. KeyWords: MANET; Blackhole Attack; AODV; Trust; TRSAODV; --------------------------------------------------------------------***---------------------------------------------------------------------- I. INTRODUCTION MANETs are Mobile Ad-hoc Networks where the mobile nodes come in to communication without a fixed infrastructure. This indicates they can be formed and resolved at any point of time or at anyplace. This nature makes them ideal for military operations, rescue operations, battle-field area and where ever infrastructure is severely damaged are not present. This decentralized nature paves way for various attacks in MANETs, where valuable information is compromised. The attacks are by malicious nodes or by active nodes which can be categorized in to active attacks or passive attacks. While passive attacks just listen to the channel, active attacks usually take place inside the network. Some common and prevailing active attacks are Rushing attack, Wormhole Attack, Jellyfish Attack, Black hole Attack and Neighbor attack. Black hole attack has been implemented in this simulated MANET and a comparison analysis of proposed Trust based AODV, TRSAODV with AODV is analyzed. This paper gives a overview of AODV protocol and that of a Black hole attack. It then gives the framework of trust implemented in the TRSAODV protocol. Following is the simulation model details and discussion of the result and the future extension of the work. II. OVERVIEW OF AODV PROTOCOL AODV is a protocol, finding the route to the destination only on demand. This protocol maintains the routing table in the nodes and not in the packets in order to reduce the memory overhead. AODV makes use of the destination sequence number for the route’s freshness which prevents looping. It goes as follows. If the source node has the route to the destination node then it forwards the packet via that route to the destination. Destination sequence number of the sought route in the recipient node’s routing table greater than the destination sequence number in RREQ packet itself, indicates the route is fresh route. Else the source starts flooding the RREQ packets to its neighbor nodes. The neighbor nodes checks if they are the destination. If they are the destination they forward the RREP packets to the source node else they forward the RREQ packets to their neighbor nodes follow the same procedure. The neighbor nodes on receiving the RREQ packets check if they have route to the destination. If they have they send the RREP message with the route to destination. This is possible because on receiving the RREQ packets they cache route back to the originator of RREQ. The RREP packet is checked for the destination sequence number to be greater than that of the RREQ packet by the sender. If it is, the sender establishes the route to the destination. Every node on receiving RREP packet also creates a route to the destination in the routing table. Hence, at the time when RREP packet reaches the source node, all the intermediate nodes in the shortest route path will have routes to source as well as destination. AODV uses HELLO messages to ensure its presence to its neighbors periodically. It uses the RRER packets about the link failure. III. BLACKHOLE ATTACK Black hole attack is a kind of Active attacks in MANET. In this a malicious node uses its routing protocol in order to advertise itself for having the shortest path to the destination node or to the packet it wants to intercept. This hostile node advertises its availability of fresh routes irrespective of checking its routing table. In this way the attacker node will always have the availability in replying to the route request and thus intercept the data packet and retain it.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 222 In AODV Black hole attack the malicious node “X” first finds the route which is active between the source node and the destination node. Then it sends the RREP packet which contains the spoofed destination address including small hop count and large destination sequence number than normal to the node “B” which is the actual destination. Node “Y” forwards this RREP packet from the node “X” to the source node “A”. Now the sender or the source node uses this route to forward the data packet which is caught by the malicious node and dropped. Hence there is no communication of the sender and receiver in the black hole attack. Malicious node (drops the packet) DATA RREP high DSN RREP high DSN RREP low DSN Receiver DATA Sender X A Y B C Fig-1: Black Hole Attack IV. TRSAODV-TRUST IMPLEMENTED AODV Trust is a metric implemented in AODV in order to enhance the security issues in MANETs. Many research work are being carried out in order to have better performance of MANETs. Here Trust has been quantized and implemented to have better outcome. Trust is the reliability of one node on another. Trust is dynamic, subjective, asymmetric, context dependent, not necessarily transitive. Normal AODV performs well in the absence of any attacks in the network but in presence of Black hole attack its performance decreases drastically and to overcome this Trust is being introduced. Framework TRSAODV Trust is a metric implemented in AODV in very simple yet effective way in order to overcome black hole attack. It is done by monitoring the packets forwarded in promiscuous mode. The detection is done by buffer of packets stored that have been recently sent for forwarding. A cyclic buffer is used for the packets storage. Two circular buffers have been used one to store the general packets forwarded and another to store the packets that are promiscuous watched. When the packets delayed for forwarding or if they have not been forwarded for a very long time the last element is erased thus decreasing the trust value of that node which is expected to actually forward the packet. If the packet has been successfully forwarded that packet is removed from the buffer, increasing the trust value of the node. The promiscuous monitoring is implemented using tap function as follows: Void TRSAODV : : tap ( const packet *p) The value is initialized to be zero. Then it is incremented that are detected to forward packets and are decremented for nodes that do not forward packets. Hence the route with node’s trust value which is higher is taken for routing and the malicious node whose trust value falls down is blacklisted and avoiding them in packet forwarding. Map<int, TrustNode*> Node id : int Trust Node * Node id : int Trust node * N1 . . . . . . . . . . . Node id : int Trust value : double … Packet buffer : circular buffer General packet buffer : circular buffer Fig-2: Trust Map V. SIMULATION RESULT AND ANALYSIS Under the Linux system in a virtual machine, NS2 has been used to simulate the network environment carried on a analysis of TRSAODV protocol and AODV. The examined protocols are TRSAODV and AODV with black hole implemented. The number nodes were from ten to hundred and the number of black hole attackers were varied from one to five. The traffic type is constant bit rate (CBR) ,transmission range of 250 meters with the MAC layer 802_11 implemented. The simulation time has been set to 100 seconds with area of 1500 * 1000. Here the packet delivery ratio and throughput are the metrics considered for the performance analysis of TRSAODV and AODV. Table-1: Simulation Parameter Values PARAMETER VALUES EXAMINED PROTOCOLS AODV, TRSAODV TRAFFICTYPE CONSTANT BIT RATE (UDP) PACKET SIZE 1000 BYTES SPEED 5M/S SIMULATION TIME 100S AREA 1500 * 1000 PROPAGATION TWO RAY GROUND MAC LAYER 802_11 ANTENNA OMNI ANTENNA The investigation had been carried out considering throughput and packet delivery ratio with varying number of
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 223 nodes where the number of attackers is kept constant and with varying number of attackers where number of nodes is kept constant. A. Packet Delivery Ratio Packet Delivery Ratio is the ratio of data packets delivered to the destination to those generated by the source. In the first scenario of varying number of attackers the Packet Delivery Ratio of both AODV and TRSAODV tend to decrease gradually. However, the TRSAODV’s Packet Delivery Ratio remains considerably higher than that of the AODV where it becomes negligible for higher number of attackers. In the case of varying number of nodes the Packet Delivery Ratio of TRSAODV increases gradually and remarkably but for the AODV the increase is negligible and for more dense network there is a raise in the Packet Delivery Ratio which speaks about the fairness of TRSAODV. Fig-3: Packet Delivery Ratio versus Number of Attackers Fig-4: Packet Delivery Ratio versus Number of Nodes B. Throughput Throughput is the number of bytes received successfully. In case of varying number of attackers the dip is very drastic for AODV and becomes negligible for higher number of attackers but stands remarkably high for TRSAODV and manages even with higher number of attackers. In case of varying number of nodes the TRSAODV keeps its efficiency increasing with higher number of nodes where as the AODV is able to deliver a small amount only when the node density is high. Fig- 5: Throughput versus Number of Attackers Fig- 6: Throughput versus Number of Nodes The above investigation clearly states the remarkable fairness of TRSAODV for MANETs over AODV. V. CONCLUSION AND FUTURE EXTENSION Securing MANETs from vulnerable attacks is one of the most challenging area of research. This research paper has given a fair solution TRSAODV to overcome Black Hole attack in AODV. In addition to the Trust factor cryptographic measures, energy efficient strategy can be combined to give a more robust protocol. Moreover the type of attack implemented is Black hole where this can substituted with other active attacks for investigation. REFERENCES [1] S.Corson, J.Marker,”Mobile Ad hoc Networking”,RFC- 3651. [2] C.Perkins, E.Royer and S.Das,”Ad hoc On demand DistanceVector Routing”,RFC-3651. [3] Hoang Lan Nguyen, Uyen Trang Nguyen, “A Study of Different Types of Attacks on MANETs” Elsevier – Ad hoc Networks 6(2008)32-46. [4] Mohammed AL-shurman and Seong_Moo yoo, “Blachhole Attack in Mobile Ad Hoc Networks” ACMSE’04, April2-3,2004. [5] Fan-Hsun Tseng, Li-Derchou, Han-chieh Chao, “A Survey of Blackhole Attacks in wireless mobile ad hoc Networks” human centric Computing and Information Sciences, a Springer open journal.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 224 [6] Monika Roopa K, Prof. BVR Reddy, “Blackhole implementation in AODV Routing Protocol” International Journal of scientific and Engineering Research, vol 4, Issue 5, May-2013 ISSN 2229-5518. [7] P.Manikam, T.GuruBaskar, M.Girija, Dr.D.Manimegalai, “Performance Comparisons of Routing Protocols in MANETs” International Journal of wireless and Mobile networks (IJWMN) vol.3, No.1, February 2011. [8] Xing, F., wang, w., “Understanding Dynamic Denial of Service Attacks in Mobile Ad hoc networks” in IEEE MilitaryCommunication Conference,MICCOM (2006). [9] Dr.Aditya Goel, Ajaii Sharma, “Performance Analysis of MANET using AODV protocol” international Journal of Computer Science and Security (IJCSS), volume 3: Issue 5. [10]Kamarularifin abd.Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan, “Mitigation of Blackhole Attacks for AODV Routing Protocol” International Journal of New Computer Architecture and their Applications. (IJNCAA)ISSN :2220-9085. [11]Mangesh Ghonge, Prof.S.u.Nimbhorkar, “Simulation of AODV under Blackholen Attack in MANETs” International Journal of Advanced Computer science and Engineering ,ISSN : 2277-1287. [12]XiaoQiLi, Michael R.Lyu, and JiangehuanLiu, “trust Model Based Routing Protocol for Secure Ad hoc Networks”, IEEEAC paper# 1150. [13]R.S.Mangrulkar, Pallavi V Chavan, S.N.Dagalkar, “Improving Routing Selection Mechanism Using Trust Factor in AODV Routing Protocol for MANET” International Journal opf Computer Applications (0975- 8887) Vol:7-No.10, October 2010. [14]Dalip Kamboj and Pankaj Kumar Sehgal, “A Comparative Study of various Secure Routing protocol based on AODV” International journal of Advanced Computer Science and Applications, vol.2, no.7, 2011, pp 80-85.