Blackhole Attck detection in AODV Protocol

12
Black Hole Attack Detection in AODV By : BIRJU TANK(141060753017) M.E 3 rd Sem WiMC GTU PG School, BISAG-CDAC, Gandhinagar [email protected]

Transcript of Blackhole Attck detection in AODV Protocol

Page 1: Blackhole Attck detection in AODV Protocol

Black Hole Attack Detection in AODV

By : BIRJU TANK(141060753017)M.E 3rd Sem WiMC

GTU PG School, BISAG-CDAC, Gandhinagar

[email protected]

Page 2: Blackhole Attck detection in AODV Protocol

[email protected]

Ad-hoc On-Demand Distance Vector• Reactive Protocol

• On-Demand

• Low processing power

• Low network utilization

Page 3: Blackhole Attck detection in AODV Protocol

[email protected]

Black hole attack in AODV

• Malicious node send a RREP packet to source node

• Some times a chain of black nodes perform this attack(Cooperative black hole attack)

Page 4: Blackhole Attck detection in AODV Protocol

[email protected]

Black hole Attack Detection

• Maintain a backbone network which operates at a level above the ad-hoc network.

• This Algorithm nodes are divided in three parts:• Regular Node (RN): low power and low transmission range, not

trustworthy.• Back Bone Node (BN): Have high transmission range and form a

core that monitors the nodes• Backbone core node (BCN) : Similar power as BN, these nodes

can be elevated to BN nodes for increasing connectivity and coverage of the network

Page 5: Blackhole Attck detection in AODV Protocol

[email protected]

Cont’d

•This algorithm is having mainly two parts.1. Core Formation and maintenance2. Detection of Black/malicious nodes.

• Core Formation and maintenance: Core formation progresses incrementally. During this BCN node perform some tasks those areI. Detect RN in its neighbourhood, if found broadcast “invitation”

message.II. On receiving Join request from RN, check if it is reachable in

specified number of hops, if yes add in associated node list else in unassociated list.

III. if no other request go to next grid.

Page 6: Blackhole Attck detection in AODV Protocol

[email protected]

Cont’d

IV. If BCN detects any BN in its vicinity then this node sends a coordination message to BN and waits for reply.

V. BCN on receiving reply to coordination message, it executes action which is specified in the reply.

•Action of a Regular node:I. Every Regular node first check if it is associated with some

BCN or BN, if yes then terminate its actions.II. On receiving invitation message send a join request, and after

getting reply for its join request from BN or BCN send “accept” to BN or BCN.

Page 7: Blackhole Attck detection in AODV Protocol

[email protected]

Cont’d

• Detection of Black/malicious nodes : The key idea is that source node, after every block of data packets, asks the backbone network to perform end-to-end check with the destination, whether the packets have reached it.

• If destination did not receive a block of data packets, then backbone network initiates the detection of the chain of malicious nodes.

Page 8: Blackhole Attck detection in AODV Protocol

[email protected]

Cont’d

•Let Suppose here : • S : Source node,• D: Destination node,• N1:Backbone node, to which S

is associated • N2:Backbone node, to which D

is associated V : Regular Node• Nr: is the node which send

RREP to S (For the RREQ for S to D route)

Page 9: Blackhole Attck detection in AODV Protocol

[email protected]

Cont’d

• Actions of S• Divide the data into k equal parts let say Data[1..k].• end a prelude message to D with shared key k.• Sends the data to D and after that send a message check having Nr,

to N1.• If an “ok” is received from N1 the continue data sending.• if a “not ok” is received from N1 then sets a timer for malicious

removal. If before timeout receive the “removed ok” from N1 then go to step 2, else terminate.

• D on receiving prelude from S. Wait for data packet and after receiving data send a postulate message from N1 and S stating the number of packets received from S.

Page 10: Blackhole Attck detection in AODV Protocol

[email protected]

Conclusion

• Using this Algorithm the Simple black hole attack, Cooperative black hole attack can be removed, and also to some extent Gray hole attack can also be removed.

• This algorithm takes O(md) number of hops to detect black nodes. Where m is the number of malicious nodes and d is the diameter of the network.

Page 11: Blackhole Attck detection in AODV Protocol

[email protected]

References

• Izhak Ruhin,Arash Behzad, Runlie Zhang, Iluiyu Luo,Eric Caballero : TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks.

• H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc network. IEEE Communications Magzine, pages 70 - 75, 2002.

• Kishor Jyoti Sarma, Rupam Sharma, Rajdeep Das. A Survey of Black Hole Attack Detection in Manet. 978-1-4799-2900-9/14/$31.00 ©2014 IEEE

• Nidhi Sharma, Alok Sharma. The Black-hole node attack in MANET. 2012 Second International Conference on Advanced Computing & Communication Technologies. 978-0-7695-4640-7/12 $26.00 © 2012 IEEE