COMPARATIVE STUDY OF MULTIPLE BLACK HOLE...

26
COMPARATIVE STUDY OF MULTIPLE BLACK HOLE ATTACKS SOLUTION METHODS IN MANET USING AODV ROUTING PROTOCOL ELAHE FAZELDEHKORDI A thesis submitted in partial fulfilment of the requirements for the award of the degree of Master of Computer Science (Information Security) Faculty of Computing Universiti Teknologi Malaysia JANUARY 2014

Transcript of COMPARATIVE STUDY OF MULTIPLE BLACK HOLE...

Page 1: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

COMPARATIVE STUDY OF MULTIPLE BLACK HOLE ATTACKS

SOLUTION METHODS IN MANET USING AODV ROUTING PROTOCOL

ELAHE FAZELDEHKORDI

A thesis submitted in partial fulfilment of the

requirements for the award of the degree of

Master of Computer Science (Information Security)

Faculty of Computing

Universiti Teknologi Malaysia

JANUARY 2014

Page 2: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

iii

This thesis is dedicated to my beloved parents for their endless support and

encouragement.

Page 3: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

iv

ACKNOWLEDGEMENT

First and foremost, I would like to sincerely thank my lovely parents, Behjat

Kazemi and Manouchehr Fazel, my lovely brothers Peyman Fazel, Amin Fazel

and Pouya Fazel, my best friend Akanbi Oluwatobi Ayodeji and all friends for

their endless love, support and encouragement. I could not have done it without you!

There is no word I can find to thank you.

Next, I would like to express my heartfelt gratitude to my supervisor Prof.

Dr. Abdul Hanan Abdullah and Mr. Adnan Ahmed for their constant support

during this project. They inspired me greatly to work in this project. Their

willingness to motivate me contributed tremendously to the success of this project. I

have learned a lot from them and I could not have imagined having a better advisor

and mentor for my Master study. Many thanks to all my lecturers, I will forever be

grateful.

Besides, I would like to thank my examiners: Dr. Mohammad Abdur

Razzaque, and Dr. Ismail Fauzi Bin Isnin for their patience and insightful

comments.

Finally, I would like to thank Universiti Teknologi Malaysia for their kind

cooperation.

Page 4: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

v

ABSTRACT

Mobile Wireless Ad Hoc Networks (MANET) are non-centralized wireless

networks that can be formulated without the need for any pre-existing infrastructure in

which each node can act as a router. It must discover its local neighbours and through

them it will communicate to nodes that are out of its transmission range. Various

features like open medium, dynamic topology, lack of clear lines of defence, makes

MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing

(AODV) is one of the best and popular routing algorithms. AODV is severely affected

by well-known black hole attack in which a malicious node injects a faked route reply

message that it has a fresh route to destination. In this thesis, MANET performance

against single black hole attack has compared with its performance against multiple

black hole attacks by using Intrusion Detection System (IDSAODV) routing protocol

(Dokurer, 2006). The result are analysed using NS-2.35, through various network

parameter bases: total drop packets, end to end delay, packet delivery ratio and

routing request overhead. The results indicate IDSAODV solution method which is

presented for single black hole attack before, can be used effectively for decreasing

total drop packets and improving packet delivery ratio against multiple black hole

attacks, also. But, the method doesn’t have significant effect for improving end to end

delay and routing request overhead.

Page 5: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

vi

ABSTRAK

Rangkaian Tanpa Wayar Ad Hoc Bergerak (MANET) adalah rangkaian tanpa

wayar tidak berpusat yang boleh dirumuskan tanpa memerlukan sebarang

infrastruktur yang sedia ada dimana setiap nod boleh diguna sebagai penghala. Ia

perlu mengetahui jiran-jiran setempat dan melaluinya ia boleh berkomunikasi dengan

nod-nod yang luar dari lingkungan transmisinya. Pelbagai ciri-ciri seperti media

terbuka, topologi dinamik, kekurangan pada garisan pertahanan, membuat MANET

terdedah kepada serangan-serangan keselamatan. Penghala Vektor Jarak Ad-hoc atas

Permintaan (AODV) adalah salah satu yang terbaik dan popular diantara algoritma-

algoritma penghala. AODV terjejas dengan teruk oleh serangan lubang hitam yang

terkenal dimana nod yang bahaya menyuntik mesej balas yang palsu yang

mempunyai laluan yang segar kepada destinasinya. Di dalam kajian ini, prestasi

MANET terhadap satu serangan lubang hitam telah disbanding dengan prestasinya

terhadap serangan lubang hitam yang banyak dengan menggunakan protokol laluan

(Dokurer, 2006) Sistem Pengesanan Pencerobohan (IDSAODV). Hasilnya dianalisis

dengan menggunakan NS-2.35, menerusi pelbagai pengakalan parameter rangkaian:

jumlah paket-paket yang jatuh, penangguhan hujung ke hujung, nisbah penghantaran

paket dan permintaan penghala atas. Hasil menunjukkan bahawa kaedah

penyelesaian IDSAODC yang telah dikemukakan sebelumnya dengan satu serangan

lubang hitam, boleh digunakan dengan berkesan untuk mengurankan jumlah paket-

paket yang jatuh dan mempertingkatkan nisbah penghantaran paket terhadap

serangan lubang hitam yang banyak. Akan tetapi, kaedah ini tidak mempunyai kesan

yang ketara dalam mempertingkatkan penangguhan hujung ke hujung dan

permintaan laluan atas.

Page 6: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

vii

TABLE OF CONTENTS

CHAPTER TITLE PAGE

DEDICATION iii

ACKNOWLEDGEMENT iv

ABSTRACT v

ABSTRAK vi

TABLE OF CONTENT vii

LIST OF TABLES xi

LIST OF FIGURES xii

LIST OF APPENDICES xv

1 INTRODUCTION

1.1 Introduction 1

1.2 Problem Background 2

1.3 Problem Statement 4

1.4 Purpose of Study 4

1.5 Project Objectives 5

1.6 Scope of Study 5

1.7 The Significant of Study 6

1.8 Organization of Report 7

2 LITERATURE REVIEW

2.1 Introduction 8

2.2 Wireless Networks 9

Page 7: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

viii

2.2.1 Classification of Wireless Networks 10

2.2.1.1 Infrastructure Networks 10

2.2.1.2 Infrastructure-less Networks 11

2.2.2 Advantages of Wireless Networks 11

2.2.3 Disadvantages of Wireless Networks 12

2.3 Ad-Hoc Networks 12

2.3.1 Static Ad-Hoc Networks 14

2.3.2 Mobile Ad-Hoc Networks 15

2.3.2.1 Characteristics of MANET 18

2.3.2.2 Applications of MANET 19

2.3.2.3 Advantages of MANET 20

2.3.2.4 Limitation of MANET 20

2.4 Routing 21

2.5 Ad Hoc Network Routing Protocols 21

2.5.1 Classification of Routing Protocols 22

2.6 AODV Routing Protocol 27

2.6.1 Routing in AODV 28

2.6.1.1 Route Discovery Mechanism in

AODV

30

2.6.1.2 Route Maintenance Mechanism in

AODV

31

2.6.2 Characteristics of AODV 31

2.6.3 Advantage and Disadvantage of AODV 32

2.7 Classifications of MANET Attacks 33

2.8 Black Hole Attack 40

2.9 Related Studies 41

2.10 Studied Solutions 45

2.11 IDSAODV 45

2.12 Evaluation Metrics 46

2.13 Summary

47

Page 8: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

ix

3 RESEARCH METHODOLOGY

3.1 Introduction 48

3.2 Research Framework 48

3.2.1 Phase 1: Investigating the Existing Solutions 51

3.2.2 Phase 2 51

3.2.2.1 Phase 2a: Determining Efficient

Solution

51

3.2.2.2 Phase 2b: Implementing the Existed

Solution

51

3.2.2.2.1 Simulation: The Formal

Definition

52

3.2.2.2.2 NS (Network Simulator) 52

3.2.2.2.3 Tcl Language in NS 54

3.2.3 Phase 3: Comparing the Effects of Proposed

Solution on MANET Performance

55

3.3 Summary 55

4 INVESTIGATION AND SELECTION PROCETURE

4.1 Introduction 56

4.2 Implementing a New Routing Protocol in NS to

Simulate Black Hole Behavior

56

4.3 Testing the Black Hole AODV 61

4.3.1 Simulation Parameters and Measured Metrics 61

4.3.2 Evaluation of the Simulation 62

4.4 Simulation of Black Hole Attack 66

4.4.1 Simulation Parameters and Measured Metrics 66

4.4.2 Examining the Trace File and Getting the

Results

71

4.4.3 Evaluation of Results 72

4.5 Summary

77

5 SOLUTION IMPLEMENTATION AND RESULT

Page 9: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

x

5.1 Introduction 78

5.2 An Overview of Investigation 78

5.3 Implementing the Solution in NS-2 79

5.4 Testing the IDSAODV 82

5.5 Simulation of IDSAODV and Evaluation of Results 83

5.6 Summary 91

6 CONCLUSION AND FUTURE WORK

6.1 Overview 92

6.2 Contribution 93

6.3 Future Work 93

REFERENCES 94

Appendices A - C 99-110

Page 10: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

xi

LIST OF TABLES

TABLE NO. TITLE PAGE

2.1 Layered attacks 37

2.2 Related studies 42

4.1 Total drop packets comparison 73

4.2 End to end delay comparison 74

4.3 Routing overhead comparison 75

4.4 Packet delivery ratio comparison 76

5.1 Total drop packets comparison 83

5.2 Total drop packets comparison 84

5.3 End to end delay comparison 85

5.4 End to end delay comparison 86

5.5 Routing overhead comparison 87

5.6 Routing overhead comparison 88

5.7 Packet delivery ratio comparison 89

5.8 Packet delivery ratio comparison 90

Page 11: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

xii

LIST OF FIGURES

FIGURE

NO. TITLE PAGE

2.1 Infrastructure based network 10

2.2 Infrastructure-less network 11

2.3 Simple ad hoc network 13

2.4 Mobile ad-hoc network 16

2.5 MANET routing protocols 23

2.6 Another classification of MANET routing protocols 27

2.7 AODV mechanisms 29

2.8 Flooding RREQ in AODV 29

2.9 Route reply in AODV 29

2.10 Classification of MANET attacks 34

2.11 Different types of attacks on MANET 40

2.12 Black hole attack 41

3.1 Research framework 50

3.2 NS-2 schema 54

4.1 “blackholeaodv” protocol agent is added in “\tcl\lib\

ns-lib.tcl”

58

4.2 Addition to the “\makefile” 58

4.3 “If” statement for dropping or accepting the packets 59

4.4 Case statement for choosing the AODV control

message types

60

4.5 False RREP message of black hole attack 61

4.6 Data flow between node 0 and node 4 via node 1 with

6 mobility nodes

63

Page 12: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

xiii

4.7 Data flow between node 0 and node 4 via node 3

after mobility

63

4.8 Data flow between node 0 and node 4 via nodes 13,

12 and 6 with 20 mobility nodes

64

4.9 Data flow between node 0 and node 4 via nodes 8,

17, 11 and 2 after mobility

65

4.10 Data flow between node 0 and node 4 via nodes 18,

2 and 12 with 30 mobility nodes

65

4.11 Data flow between node 0 and node 4 via nodes 5,

28 and 10 after mobility

66

4.12 The statements for creating mobile nodes 67

4.13 Mobile node configurations 68

4.14 Node 5 (black hole node) attracts the connection

between nodes 0 and 3

69

4.15 Node 19 (black hole node) attracts the connection

between nodes 0 and 4

70

4.16 Node 29 (black hole node) attracts the connection

between nodes 0 and 4

70

4.17 Total drop packets comparison 73

4.18 End to end delay comparison 74

4.19 Routing overhead comparison 75

4.20 Packet delivery ratio comparison 76

5.1 RREP caching mechanism 80

5.2 Receive RREP function of the IDSAODV 81

5.3 CBR packet are reached to destination node properly 82

5.4 Total drop packets comparison 84

5.5 Total drop packets comparison 85

5.6 End to end delay comparison 86

5.7 End to end delay comparison 87

5.8 Routing overhead comparison 88

5.9 Routing overhead comparison 89

Page 13: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

xiv

5.10 Packet delivery ratio comparison 90

5.11 Packet delivery ratio comparison 91

Page 14: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

xv

LIST OF APPENDICES

APPENDIX TITLE PAGE

A Blackholeaodv TCL file 99

B Trace file example 104

C Trace file field types 109

Page 15: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

CHAPTER 1

INTRODUCTION

1.1 Introduction

Mobile Ad-Hoc Networks are independent and non-centralized wireless

techniques. MANETs involve mobile nodes which are free in shifting in and out in

the network. Nodes are the techniques or gadgets i.e. cell phone, laptop computer,

individual electronic support, MP3 gamer and pc that are playing the network and are

mobile. These nodes can work like host/router or both at the similar time. They can

type irrelevant topologies based on their connection with each other in the network.

These nodes have the capability to set up them and because of their self-settings

capability, they can be implemented quickly out of need to any infrastructure (Ullah

and Rehman, 2010).

Security in Mobile Ad-Hoc Network is the most serious issue for the primary

performance of network. The accessibility to network services, privacy and

reliability of the details can be carried out by guaranteeing which protection

problems have been met (Ullah and Rehman, 2010). MANETs generally is affected

from protection attacks for the sake of its functions like open medium, modifying its

topology dynamically, deficiency of main monitoring and control, cooperative

methods and no obvious protection procedure (Ullah and Rehman, 2010). These

aspects have modified the fight area scenario for the MANETs versus the protection

risks.

Page 16: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

2

Routing protocols have created that determine how routers communicate with

each other and how to select routes between any two nodes on a computer network.

In general, routing methods is one of the complicated and exciting analysis places.

Many routing methods have been designed for MANETS, i.e. AODV, OLSR, DSR

etc. (Ullah and Rehman, 2010).

AODV is one of the well-known On-Demand Routing techniques (Das et al.,

2003). Some scientists (Deng et al., 2002, Ramaswamy et al., 2003) investigated on

this routing protocol and discussed the weaknesses in Ad hoc routing protocols and

the attacks which can be installed. Recording to a research carried out by (Usha and

Bose, 2012) AODV technique is most unprotected versus the black hole attacks.

1.2 Problem Background

MANET is so much well-known due to the point which these networks are

powerful, facilities less and scalable. Despite the truth of reputation of MANET,

these networks are so much revealed to attacks (Lu et al., 2009, Ullah and Rehman,

2010). Wi-Fi hyperlinks also create the MANET more vulnerable to attacks which

create it simpler for the enemy to go within the network and capture accessibility the

continuous interaction. Different types of attacks have been examined in MANET

and their impact on the network. Attack such as greyish opening, where the enemy

node acts maliciously for enough time until the packages are decreased and then

change to their regular actions. MANETs routing methods are also being utilized by

the assailants by means of surging attack, which is done by the enemy either by using

RREQ or details surging (Ullah and Rehman, 2010).

In any network, the sender wants its details to be sent as soon as possible in a

protected and quick way, many assailants promote themselves to have the quickest

and great data transfer usage available for the transmitting similarly in wormhole

attack, and the enemy captures themselves in powerful ideal place in the network.

Page 17: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

3

They create the use of their place i.e. they have quickest direction between the nodes

(Mahajan et al., 2008, Shanthi et al., 2009). One of the most coming up problems in

MANET is the restricted power supply, assailants take a benefit of this defect and

attempts to keep the nodes conscious until all its power is missing and the node go

into long lasting rest. Many other attacks MANET for instance jellyfish attack,

modification attack, misrouting attack and Routing Table Overflow have been

analyzed and revealed (Ullah and Rehman, 2010).

In black hole attack, a harmful node uses its routing technique to be able to

promote itself for having the quickest direction to the place node or to the bundle it

wants to identify. Furthermore, this aggressive node promotes its accessibility to

clean tracks regardless of verifying its routing table. In this way enemy node

regularly will have the provision in responding to the direction demand and thus

identify the details bundle and maintain it (Ullah and Rehman, 2010).

Researchers have suggested alternatives to recognize and remove black hole

nodes (Deng et al., 2002, Ramaswamy et al., 2003). Deng et al. (2002) suggested a

remedy for personal dark gaps. But they have not regarded the supportive black hole

attacks. As stated in their method, details about the next hop to place should be

involved in the RREP bundle when any advanced node responses for RREQ. Then

the resource node delivers a further demand (FREQ) to next hop of responded node

and requests about the responded node and direction to the place. By using this

technique we can recognize standing of the responded node only if the next hop is

reliable. However, this remedy cannot avoid supportive black hole attacks on

MANETs. For instance, if the next hop cooperates with the responded node, as well,

the response for the FREQ will be basically “yes” for both concerns. Then the

resource will believe in on next hop and deliver details through the responded node

which is a black hole node.

Ramaswamy et al. (2003) suggested a remedy to protecting versus supportive

black hole attacks. Also, they claimed that no models or performance assessments

Page 18: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

4

have been done. Therefore, this project focuses on assessment of the performance of

the suggested plan in protecting versus the supportive black hole attack.

1.3 Problem Statement

Based on researches carried out by Sharma and Gupta (2009) shows that

AODV greatly suffers from multiple black holes in terms of packet delivery ratio,

drop packets, average end-to-end delay and route request overhead. Besides, the

most common techniques used are inefficient in responding to multiple black hole

attacks and just can prevent of single black hole attack (Lee et al., 2002, Deng et al.,

2002, Sun et al., 2003). So little attention has been given examine and implementing

existing methods for prevention of multiple black hole attacks. There is a need to

analyze these methods on multiple black hole attacks. Therefore, this study will

address the following questions:

i. How to detect single and multiple black hole attack?

ii. How to mitigate single black hole attack using the most efficient solution?

iii. How to mitigate multiple black hole attack using the methods in (ii)

iv. How to determine the efficiency of the solution used in black hole attack

by comparing ids aodv with black hole aodv using the following metrics:

packet delivery ratio, packet loss percentage, average end-to-end delay

and route request overhead?

1.4 Purpose of Study

In this research, performance of one of the most efficient solutions for

preventing single black hole attack in MANET using AODV routing protocol will be

investigated in terms of packet delivery ratio, packet loss percentage, average end-to-

end delay and route request overhead. Then will examine MANET performance

Page 19: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

5

under multiple black hole attacks with proposed solution. At the end of this

investigation, it will be highlighted if the solution which shows good performance in

terms of high packet delivery ratio, low packet loss percentage, low average end-to-

end delay and reduce route request overhead for single black hole attack can also be

useful face with multiple black hole attacks.

1.5 Project Objectives

There are four objectives for this project. They are:

i. To investigate the existing solutions for preventing single black hole

attack in MANET using AODV routing protocol.

ii. To determine one of the efficient existing solutions above using four

metrics: packet delivery ratio, packet loss percentage, average end-to-

end delay and route request overhead.

iii. To implement the existed solution (IDSAODV (Dokurer, 2006) which

has presented for single black hole attack before), for multiple black

hole attacks.

iv. To compare the effects of above solution on MANET performance with

single black hole attack and multiple black hole attacks.

1.6 Scope of Study

The scopes of this research are as follow:

i. The project will study the effects of multiple black hole attacks in

MANET using (AODV Ad-Hoc on Demand Distance Vector) routing

protocol.

Page 20: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

6

ii. Analysis of solutions for preventing single black hole attack is taken into

account.

iii. The impact of solutions for preventing multiple black hole attacks on the

performance of MANET is evaluated, finding out if solutions for single

black hole attack are also useful for multiple black hole attacks.

iv. Simulation will be done in NS-2.35 (Network Simulator).

v. Simulation will examine on MANET without black hole attack, MANET

with 1 black hole node, MANET with 2 black hole nodes and MANET

with 3 black hole nodes. And in each scenario will work on networks with

6 nodes, 20 nodes and 30 nodes separately.

vi. Simulation parameters will be obtained from authors of proposed solution

(Arya and Jain, 2011, Ahmad et al., 2012).

vii. The measurements will be obtained using packet delivery ratio, packet

loss percentage, average end-to-end delay and route request overhead.

1.7 The Significance of Study

Nowadays, there is an increasing need to preventing multiple black hole

attacks due to the adverse effect they can have on their victims. Lots of work has

been done on single black hole prevention using several techniques to achieve the

same goal, but the question is if these techniques can be useful for multiple black

hole attacks? This study evaluates the performance one of the most efficient of these

techniques as regards to packet delivery ratio, packet loss percentage, average end-

to-end delay and route request overhead for preventing of single black hole attack

and multiple black hole attacks on MANET using AODV routing protocol by

studying each of those metrics individually and will carry out by MANET

performance with multiple black hole attacks under single black hole attack

prevention solutions.

Page 21: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

7

1.8 Organization of Report

The thesis consists of six chapters. Chapter one describes the introduction,

background of the study, research objectives and questions, the scope of the study

and its primary objectives. The second chapter reviews available and related

literature on black hole attack detection. Chapter three describes the study

methodology along with the appropriate framework for the study. Chapter four

describes the effects of the single black hole and multiple black hole attacks on

MANT performance. Chapter 5 discusses the implementation, result and analysis

based on research framework. Finally, Chapter 6 concludes the thesis with a closing

remark, recap of objectives, contribution and future work.

Page 22: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

94

REFERENCES

Ahmad, Z., Manan, J.-L. A. and Jalil, K. A., 2012. Performance Evaluation On

Modified Aodv Protocols. Applied Electromagnetics (Apace), 2012 IEEE

Asia-Pacific Conference On, 2012. IEEE, 158-163.

Arunmozhi, S. and Venkataramani, Y., 2012. Black Hole Attack Detection And

Performance Improvement In Mobile Ad-Hoc Network. Information Security

Journal: A Global Perspective, 21, 150-158.

Arya, M. and Jain, Y. K., 2011. Grayhole Attack And Prevention In Mobile Adhoc

Network. International Journal Of Computer Applications, 27.

Bakshi, A., Sharma, A. and Mishra, A., 2013. Significance Of Mobile Ad-Hoc

Networks (Manets).

Begam, U. S. and Murugaboopathi, G., 2013. A Recent Secure Intrusion Detection

System For Manets.

Bessire, M. L., 2006. System And Method For Ensuring The Availability Of A

Storage System. Google Patents.

Bhardwaj, P. K., Sharma, S. and Dubey, V., 2012. Comparative Analysis Of

Reactive And Proactive Protocol Of Mobile Ad-Hoc Network. International

Journal, 4.

Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H. N. and Bhattacharya, D., 2011.

Different Types Of Attacks In Mobile Adhoc Network. Arxiv Preprint

Arxiv:1111.4090.

Bhushan, B., Gupta, S. and Nagpal, C., 2013. Comparison Of On Demand Routing

Protocols. International Journal Of Information Technology, 5.

Chavda, K. S. and Nimavat, A. V., 2013. Comparative Analysis Of Detection And

Prevention Techniques Of Black Hole Attack In Aodv Routing Protocol Of

Manet.

Page 23: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

95

Cheng, H., 2012. Genetic Algorithms With Hyper-Mutation For Dynamic Load

Balanced Clustering Problem In Mobile Ad Hoc Networks. Natural

Computation (Icnc), 2012 Eighth International Conference On, 2012. IEEE,

1171-1176.

Chun, J., Shioura, A., Tien, T. M. and Tokuyama, T., 2013. A Unified View To

Greedy Geometric Routing Algorithms In Ad Hoc Networks. Algorithms For

Sensor Systems. Springer.

Dadhania, P. and Patel, S., 2013. Performance Evaluation Of Routing Protocol Like

Aodv And Dsr Under Black Hole Attacks. Performance Evaluation, 3, 1487-

1491.

Dangore, M. M. Y. and Sambare, M. S. S., 2013. A Survey On Detection Of

Blackhole Attack Using Aodv Protocol In Manet.

Das, S. R., Belding-Royer, E. M. and Perkins, C. E., 2003. Ad Hoc On-Demand

Distance Vector (Aodv) Routing.

Deng, H., Li, W. and Agrawal, D. P., 2002. Routing Security In Wireless Ad Hoc

Networks. Communications Magazine, Ieee, 40, 70-75.

Dokurer, S., 2006. Simulation Of Black Hole Attack In Wireless Ad-Hoc Networks,

Atılım University.

Gupta, N. and Shrivastava, M., 2013. An Evaluation Of Manet Routing Protocol.

International Journal.

Hassnawi, L., Ahmad, R., Yahya, A., Aljunid, S. and Elshaikh, M., 2012.

Performance Analysis Of Various Routing Protocols For Motorway

Surveillance System Cameras’ Network. International Journal Of Computer

Science, 9.

Issariyakul, T., 2012. Introduction To Network Simulator Ns2, Springer Science+

Business Media.

Issariyakul, T. and Hossain, E., 2012. An Introduction To Network Simulator Ns2,

Springer.

Jawandhiya, P. M., Ghonge, M. M., Ali, M. and Deshpande, J., 2010. A Survey Of

Mobile Ad Hoc Network Attacks. International Journal Of Engineering

Science And Technology, 2, 4063-4071.

Kaur, D. and Kumar, N., 2013. Comparative Analysis Of Aodv, Olsr, Tora, Dsr And

Dsdv Routing Protocols In Mobile Ad-Hoc Networks. International Journal,

5.

Page 24: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

96

Kaur, R. and Rai, M. K., 2012. A Novel Review On Routing Protocols In Manets.

Undergraduate Academic Research Journal (Uarj), Issn, 2278-1129.

Koyama, A. and Suzuki, H., 2013. Real Object-Oriented Communication Method

For Ad Hoc Networks. Journal Of Computer And System Sciences.

Lee, S., Han, B. and Shin, M., 2002. Robust Routing In Wireless Ad Hoc Networks.

Parallel Processing Workshops, 2002. Proceedings. International Conference

On, 2002. IEEE, 73-78.

Liu, W., Nishiyama, H., Ansari, N., Yang, J. and Kato, N., 2013. Cluster-Based

Certificate Revocation With Vindication Capability For Mobile Ad Hoc

Networks. Parallel And Distributed Systems, IEEE Transactions On, 24, 239-

249.

Lu, S., Li, L., Lam, K.-Y. and Jia, L., 2009. Saodv: A Manet Routing Protocol That

Can Withstand Black Hole Attack. Computational Intelligence And Security,

2009. Cis'09. International Conference On, 2009. Ieee, 421-425.

Mahajan, V., Natu, M. and Sethi, A., 2008. Analysis Of Wormhole Intrusion Attacks

In Manets. Military Communications Conference, 2008. Milcom 2008. IEEE,

2008. IEEE, 1-7.

Menon, V. G., Johny, V., Tony, T. and Alias, E., 2013. Performance Analysis Of

Traditional Topology Based Routing Protocols In Mobile Ad Hoc Networks.

International Journal Of Computer Science, 2.

Mistry, N., Jinwala, D. C. and Zaveri, M., 2010. Improving Aodv Protocol Against

Blackhole Attacks. Proceedings Of The International Multiconference Of

Engineers And Computer Scientists, 2010. 17-19.

Murthy, C. S. R. and Manoj, B., 2004. Ad Hoc Wireless Networks: Architectures And

Protocols, Prentice Hall.

Natarajan, K. and Mahadevan, G., 2013. A Succinct Comparative Analysis And

Performance Evaluation Of Manet Routing Protocols. Computer

Communication And Informatics (ICCCI), 2013 International Conference

On, 2013. IEEE, 1-6.

Rafsanjani, M. K., Movaghar, A. and Koroupi, F., 2008. Investigating Intrusion

Detection Systems In Manet And Comparing Idss For Detecting Misbehaving

Nodes. World Academy Of Science, Engineering And Technology, 44, 351-

355.

Page 25: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

97

Raj, P. N. and Swadas, P. B., 2009. Dpraodv: A Dyanamic Learning System Against

Blackhole Attack In Aodv Based Manet. Arxiv Preprint Arxiv:0909.2371.

Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J. and Nygard, K. E., 2003.

Prevention Of Cooperative Black Hole Attack In Wireless Ad Hoc Networks.

International Conference On Wireless Networks, 2003.

Ros, F. J. and Ruiz, M., 2004. Implementing A New Manet Unicast Routing Protocol

In Ns2. Sun Microsystems Inc.

Ruzgar, E. and Dagdeviren, O., 2013. Performance Evaluation Of Distributed

Synchronous Greedy Graph Coloring Algorithms On Wireless Ad Hoc And

Sensor Networks. International Journal.

Saha, H. N., Bhattacharyya, D., Banerjee, P., Bhattacharyya, A., Banerjee, A. and

Bose, D., 2012. Study Of Different Attacks In Manet With Its Detection and

Mitigation Schemes.

Sen, J., 2013. Detection Of Cooperative Black Hole Attack In Wireless Ad Hoc

Networks. Arxiv Preprint Arxiv:1302.4882.

Shanthi, N., Lganesan, D. and Ramar, D. K., 2009. Study Of Different Attacks On

Multicast Mobile Ad-Hoc Network. Journal Of Theoretical And Applied

Information Technology, 9, 45-51.

Sharma, S. and Gupta, R., 2009. Simulation Study Of Blackhole Attack In The

Mobile Ad Hoc Networks. Journal Of Engineering Science And Technology,

4, 243-250.

Singh, P. K. and Sharma, G., 2012. An Efficient Prevention Of Black Hole Problem

In Aodv Routing Protocol In Manet. Trust, Security And Privacy In

Computing And Communications (Trustcom), 2012 IEEE 11th International

Conference On, 2012. IEEE, 902-906.

Singh, T. P., Dua, S. and Das, V., 2012. Energy-Efficient Routing Protocols In

Mobile Ad-Hoc Networks. International Journal Of Advanced Research In

Computer Science And Software Engineering, 5.

Srivastava, M., 2012. A Performance Analysis Of Routing Protocols In Mobile Ad-

Hoc Networks. International Journal Of Engineering, 1.

Student, V. R. P. and Dhir, R., 2013. A Study Of Ad-Hoc Network: A Review.

International Journal, 3.

Page 26: COMPARATIVE STUDY OF MULTIPLE BLACK HOLE …eprints.utm.my/id/eprint/41602/1/ElaheFazeldehKordiMFSKSM2014.pdf · Di dalam kajian ini, prestasi MANET terhadap satu serangan lubang

98

Sun, B., Guan, Y., Chen, J. and Pooch, U. W., 2003. Detecting Black-Hole Attack In

Mobile Ad Hoc Networks. Personal Mobile Communications Conference,

2003. 5th European (Conf. Publ. No. 492), 2003. Iet, 490-495.

Tamilselvan, L. and Sankaranarayanan, V., 2006. Solution To Prevent Rushing

Attack In Wireless Mobile Ad Hoc Networks. Ad Hoc And Ubiquitous

Computing, 2006. Isauhc'06. International Symposium On, 2006. IEEE, 42-

47.

Tamilselvan, L. and Sankaranarayanan, V., 2008. Prevention Of Co-Operative Black

Hole Attack In Manet. Journal Of Networks, 3, 13-20.

Ullah, I. and Rehman, S. U., 2010. Analysis Of Black Hole Attack On Manets Using

Different Manet Routing Protocols. A Mater Thesis, Electrical Engineering,

Thesis No. Mee, 10, 62.

Usha, U. and Bose, B., 2012. Comparing The Impact Of Black Hole And Gray Hole

Attacks In Mobile Adhoc Networks. Journal Of Computer Science, 8, 2012.

Vincent, S. S. M. and Meshach, W. T., 2012. Preventing Black Hole Attack In

Manets Using Randomized Multipath Routing Algorithm.