A Details Survey on Black-hole and Denial of Service Attack over MANET Environment

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 03 Issue: 06 | June-2016

p-ISSN: 2395-0072

www.irjet.net

A Details Survey on Black-hole and Denial of Service Attack over MANET Environment Kamlesh Patel1, Abhishek Thoke2, Scholar, Department of Information Technology, Technocrat Institute of Technology, Bhopal, India. Assistant Professor, Department of Information Technology, Technocrat Institute of Technology, Bhopal, India. ---------------------------------------------------------------------***--------------------------------------------------------------------1

2

Abstract – Security is a major challenge in Mobile Ad hoc Network (MANET) due to their features of dynamically changing topologies, frequent host movement, Multi-hop wireless links and lack of clear line of defense. Protecting the network layer of a MANET from malicious attacks is an important and challenging issue. This paper analyzes the black hole and denial of service attack which is very severe type of possible attacks in Mobile Ad hoc Networks (MANETs). In a black hole attack, malicious nodes advertise itself by sending a false route reply packet to a source node that initiates a route discovery process and drops all packets whereas DDOS attacks target the resources of these services, lowering their ability to provide optimum usage of the network infrastructure. In this paper, we are investigating the effect of black-hole and dos attack on MANET environment and recommend practical defense mechanisms against blackhole and DOS attacks. The implementation of the proposed concept is provided using the Ad-hoc on Demand Distance Vector routing protocol modification in network simulator 2 i.e. NS-2. Keywords: Security, DOS, Black-hole, MANET, AODV, Routing

despite a Denial of Service (DOS) attack. On physical and media access control layer attacker can use jamming techniques to interfere with communication on physical channel. On network layer the attacker can disrupt the routing protocol. On higher layers, the attacker could bring down high level services. 1.3 Authentication: Assurance that an entity of concern or the origin of a communication is what it claims to be or from. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. 1.4 Integrity: Message being transmitted is never altered. Non-repudiation: Ensures that sending and receiving parties can never deny ever sending or receiving the message. 1.1 Security Attacks in Mantes Mobile Ad hoc networks are vulnerable to various attacks not only from outside but also from within the network itself. Ad hoc network are mainly subjected to two different levels of attacks. The first level of attack occurs on the basic mechanisms of the ad hoc network such as routing. Whereas the second level of attacks tries to damage the security mechanisms employed in the network. The attacks in MANETs are divided into two major types.

1. Introduction A MANET is a multi-hop temporary communication network of mobile nodes equipped with wireless transmitters and receivers without the aid of any current network infrastructure. A MANET is an emerging research area with practical applications. However, A MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Routing plays an important role in the security of the entire network. Thus operations in MANETs introduce some new security problems in addition to the ones already present in fixed networks [1]. There are five major security goals that need to be addressed in order to maintain a reliable and secure ad-hoc network environment. They are mainly [2]:

1.1.1 INTERNAL ATTACKS: Internal attacks are directly leads to the attacks on nodes presents in network and links interface between them. This type of attacks may broadcast wrong type of routing information to other nodes [4]. Internal attacks are sometimes more difficult to handle as compare to external Attacks, because an internal attack occurs due more trusted nodes. 1.1.2 EXTERNAL ATTACKS: These types of attacks try to cause congestion in the network, denial of services (DOS), and advertising wrong routing information etc. [4]. External attacks prevent the network from normal communication and producing additional overhead to the network. External attacks can classify into two categories:

1.1 Confidentiality: Protection of any information from being exposed to unintended entities. In ad hoc networks this is more difficult to achieve because intermediates nodes receive the packets for other recipients, so they can easily eavesdrop the information being routed.

1.1.3 PASSIVE ATTACKS MANETs: are more susceptible to passive attacks. A passive attack does not alter the data

1.2Availability: Services should be available whenever required. There should be an assurance of survivability

Š 2016, IRJET

|

Impact Factor value: 4.45

|

ISO 9001:2008 Certified Journal

|

Page 1377


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.