• Nenhum resultado encontrado

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

N/A
N/A
Protected

Academic year: 2017

Share "Guard against cooperative black hole attack in Mobile Ad-Hoc Network"

Copied!
6
0
0

Texto

(1)

Guard against cooperative black hole

attack in Mobile

Ad-Hoc Network

Harsh Pratap Singh Sanjeev Sharma

School of IT, Rajiv Gandhi Proudhyogiki HOD, School of IT, Rajiv Gandhi Proudhyogiki

Vishwavidyalaya, Bhopal (M.P.) Vishwavidyalaya, Bhopal (M.P.)

singhharshpratap@gmail.com sanjeev@rgtu.net

ABSTRACT

A mobile ad-hoc network is an autonomous network that consists of nodes which communicate with each other with wireless channel. Due to its dynamic nature and mobility of nodes, mobile ad hoc networks are more vulnerable to security attack than conventional wired and wireless networks. One of the principal routing protocols AODV used in MANETs. The security of AODV protocol is influence by the particular type of attack called Black Hole attack. In a black hole attack, a malicious node injects a faked route reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. To preventing black hole attack, this paper presents RBS (Reference Broadcast Synchronization) & Relative velocity distance method for clock synchronization process in Mobile ad-hoc Network for removal of cooperative black hole node. This paper evaluates the performance in NS2 network simulator and our analysis indicates that this method is very suitable to remove black hole attack.

Keyword

Black hole attack, Routing Protocol, AODV, Mobile ad hoc network, RBS technique, Relative Velocity Distance.

1. INTRODUCTION

A mobile ad-hoc network [1] [2] is a self organizing network that consists of mobile nodes that are capable of communicating with each other without the help of fixed infrastructure. On the contrary to traditional wired networks that use copper wire as a communication channel, ad-hoc networks use radio waves to transmit signals. Mobility, an advantage of wireless communication, gives a freedom of moving around while being connected to a network environment. Ad-hoc networks are so flexible that nodes can join and leave a network easily. But this flexibility of mobile nodes results in a dynamic topology, open medium, distributed cooperation and constrained capability that makes it very difficult in developing secure ad-hoc routing protocols. Security being a serious issue, the nature of ad-hoc networks makes them extremely vulnerable to adversary’s malicious attacks. First of all, the use of wireless links renders a mobile ad-hoc network to be vulnerable to attacks of various types - black hole attack being one of them.

(2)

In black hole attack, black hole node acts like black hole in the universe. In this attack black hole node absorbs all the traffic towards itself and doesn't forward to other nodes whenever, source node wants to send packet to the destination node. To attract all the packet towards it, this malicious node advertise that it has shortest path through it to the destination node. There are two types of black hole attack-

• Black hole attack with single malicious node- Zone with single black hole node.

• Black hole attack with multiple malicious node- Zone with multiple black hole nodes.

To understand the functioning of the black hole node and for more details see [4, 5].

(a) RREQ Flooding

Figure 1. Diagram of a black hole attack.

2. AD-HOCROUTINGPROTOCOLSANDBLACKHOLEATTACK

AODV is one of the most common ad-hoc routing protocols used for mobile ad-hoc networks. As its name indicates AODV is an on-demand routing protocol that discovers a route only when there is a demand from mobile nodes in the network.

In an ad-hoc network that uses AODV as a routing protocol, a mobile node that wishes to communicate with other node first broadcasts an RREQ[6] (Route Request) message to find a fresh route to a desired destination node. This process is called route discovery. Every neighbouring node that receives RREQ broadcast first saves the path the RREQ was transmitted along to its routing table. It subsequently checks its routing table to see if it has a fresh enough route to the destination node provided in the RREQ message. The freshness of a route is indicated by a destination sequence number that is attached to it. If a node finds a fresh enough route, it unicast an RREP (Route Reply) message back along the saved path to the source node or it re-broadcasts the RREQ message otherwise. The same process continues until an RREP message from the destination node or an intermediate node that has fresh route to the destination node is received by the source node.

Route discovery is a vulnerability of on-demand ad-hoc routing protocols, especially AODV, which an adversary can exploit to perform a black hole attack [4] on mobile ad-hoc networks. A malicious node in the network receiving an RREQ message replies to source nodes by sending a fake RREP message that contains desirable parameters to be chosen for packet delivery to destination nodes. After promising (by sending a fake RREP to confirm it has a path to a destination node) to source nodes that it will forward data, a malicious node starts to drop all the network traffic it receives from source nodes. This deliberate dropping of packets by a malicious node is what we call a black hole attack.

E

Floodin

g

RREQ

Node x

S

G

B

C

J

D

A

I

H

S

S

A

H

C

E

G

D

J

I

B

Replying RREP

(3)

A malicious node sends RREP messages without checking its routing table for a fresh route to a destination. As shown in Fig. 1 above, source node 0 broadcasts an RREQ message to discover a route for sending packets to destination node 2. An RREQ broadcast from node 0 is received by neighbouring nodes 1, 3 and 4. However, malicious node 4 sends an RREP message immediately without even having a route to destination node 2. An RREP message from a malicious node is the first to arrive at a source node. Hence, a source node updates its routing table for the new route to the particular destination node and discards any RREP message from other neighbouring nodes even from an actual destination node. Once a source node saves a route, it starts sending buffered data packets to a malicious node hoping they will be forwarded to a destination node. Nevertheless, a malicious node (performing a black hole attack) drops all data packets rather than forwarding them on.

D

RREP

RREQ

RREP

RREQ

S RREP

RREQ

M

RREQ RREP

S – Source D-Destination M-Malicious Node

Figure 2. RREQ Broadcast

3. RELATED RESEARCH

Although various methodologies have been proposed to tackle the problem of black hole attacks. We survey them in the following:

Hesiri Weerasinghe [7] proposed the solution which discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. This solution adds on some changes in the solution proposed by the S. Ramaswamy to improve the accuracy. This algorithm uses a methodology to identify multiple black hole nodes working collaboratively as a group to initiate cooperative black hole attacks. This protocol is a slightly modified version of AODV protocol by introducing Data Routing Information (DRI) table and cross checking using Further Request (FREQ) and Further Reply (FREP). Most of the papers have addressed the black hole problem on the protocol such as AODV.

Chen Hongsong et al [8] proposes a security agent scheme for AODV routing protocol based on thread state transition utilizing network processor (NP) with architectural parallel features and special circuit for packet processing. In it one thread of NP is used as a security agent. It also requires the construction of the trace link list having the complete information about the source, destination, sequence numbers, RREQ count, Papadimitratos et al proposed Secure Routing Protocol based on the security association between the source node S and the destination node D utilizing the concept of MAC and the shared secret keys. The number of replies and the time – window the destination allocates for replies to a specific query are the design parameters. More over the source could provide an indicator of the required diversity so that D can regulate the number of replies. In it the intermediate nodes provide feedback in the event of a path breakage, and in some cases they may provide route replies [9].

Chen and U. W. Pooch [10] Proposes a neighbourhood based method to defend against black hole attack. The solution can be briefly described as follows: once the normal path discovery procedure in the routing protocol is done, the source node sends a special control packet to request the destination to send its current neighbour set. By comparing the received neighbour sets, the source node can determine whether there is a black hole attack in the network. To mitigate the impact of the black hole attack, they designed a routing recovery protocol to establish the path to the correct destination.

3

0

1

2

(4)

H. –Y. Chang [11] Knowledge-based intrusion detection systems accumulate knowledge about attacks, examine traffic and try to identify patterns indicating that a suspicious activity is occurring. This approach can be applied against known attack patterns only and the utilized knowledge base needs to be updated frequently.

4. PROPSOED METHOD

In This Paper, RBS (Reference Broadcast Synchronization) is very famous technique for clock synchronization process in Mobile-ad hoc Network, now this paper used RBS technique for removal of cooperative black hole attack.

Black-Hole attacks generate two cases:

(1) The node exploit the ad hoc routing protocol such as AODV to advertise itself as having a valid route to a

destination even though the route is suspicious with the intention of intercepting packet.

(2) The node consumes the intercepted packet; a black hole node absorbs the network traffic and drops all

packets.

The First step of solution is compare the internal clock time with external clock time sequence. The time sequence of internal and external clock if compared with standard threshold time clock the clock time of normal mobile node is greater than the threshold time initialization time duration. The normal nodes just behave like a malicious node (Black hole node) and list all these nodes in black hole node.

Some standard notations are used for comparison of the time clock:

RREP Reply Packet RREQ Request Packet

PTs Packet time clock source

PTd Packet time clock destination

Tthreshold Standard threshold time for request & response

(1) Normal Case:- Destination

Source

Intermediate Node

Figure 4.1 RREQ Broadcast

B PTd = Tthreshold

Tthreshold = A PTs (1)

(2) Abnormal Case:-

Source Destination

Malicious node

Figure 4.2 RREQ Broadcast

If (B PTd = Tthreshold && A PTs> Tthreshold) A

B

C

A

B

C

(5)

Then these packets are added into malicious node.

Some time the clock synchronization is not work properly now the detection process of worms are failed. Now in this case this paper imposed another method for black hole detection using Relative Velocity distance.

Step 1: First find Relative average distance through reference point. This is called standard Threshold distance.

Step 2: Now compare distance of source node to destination node with threshold distance- O ab

R AB RBA

Figure 4.3 RREQ Broadcast

(a) R AB + RBA + O ab = 0

RAB + RBA = O ab (normal case) (3)

(b) O ab

RAB RBA

2 (RAB+RBA)

Figure 4.4 RREQ Broadcast

RAB + RBA –O ab + 2(RAB+RBA) = 0 (4)

3(RAB + RBA) = O ab (5)

The distance of M node is increase and the value of malicious node is greater than average threshold value.

5. CONCLUSION

In the process of finding a malicious node (Black hole attack) we have imposed two method packet time clock synchronization with the help of RBS method and second one is the relative velocity reference distance method for the finding of malicious node. These methods are very efficient for the process of finding a malicious node in a mobile ad hoc network. this proposed technique is simulated these approach in NS2 network simulator and getting very good results in compare of threading technique instead of these feature it has some limitation such as we have find a wrong reference distance of the reference node now all the node found as a malicious node . Now in future we have minimized the process of finding exact process for relative reference distance.

6. REFERENCE

[1] Deng, Hongmei, Li, Wei and Agrawal, Dhrama P, Routing security in wireless ad hoc networks, IEEE Communications magazine, Oct. 2002, pp.70-75.

[2] Junhai luo; Mingyu Fan,Research on trust model based on game theory in mobile ad-hoc networks, Journal of Computer Research and Development,Vol 45, No. 10 2008, pp 1704-1710.

[3] C. E. Perkins, S, R, Das, and E. Royer: “Ad-hoc on Demand Distance Vector (AODV)”, RFC 3561.

A B

A B

(6)

[4] Hongmei Deng, Wei Li and Dharma P. Agrawal, “Routing Security in wireless ad hoc network” IEEE Communications Magazine, vol 40 no 10, October 2002.

[5] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Network”, 2003 International Conference on Wireless Networks (ICWN’ 03), Las Begas, Nevada, USA.

[6] Yibeltal Fantahun Alem, Zhao Cheng Xaun: Preventing Black Hole Attack in Mobile Ad-Hoc Networks Using Anomaly Detection. Department of Computer Science Tianjin University of Technology and Education Tianjin 300222, China.

[7] Hesiri Weerasinghe and Huirong fu, Member of IEEE, Preventing Cooperative Black Hole Attacks in Mobile Adhoc Networks: Simulation implementation And Evaluation, IJSEA, Vol 2, No.3, July 2008.

[8] Chen Hongsong, Ji Zhenzhou and Hu Zhenzhou and Hu Mingzeng, “ A Novel Security Agent Scheme for AODV Routing Protocol based on Thread State Transition”, Asian Journal of Information Techonolgy, Vol. 5, No. 1, 2006, pp 54-60.

[9] Panagiotis Papadimitratos and Zygmunt J. Haas- “ Secure Routing for Mobile Ad Hoc Networks”, Proceedings of the SCS Communication Networks and Distributed System Modelling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.

[10] B. Sun, Y. Guan, J. Chen and U. W. Pooch, “ Detecting black- hole attack in mobile ad hoc networks”, in Proc. Of the 5th European

Personal Mobile Communications Conference, Glasgow, UK, April 2003.

Imagem

Figure 1. Diagram of a black hole attack .  2.     AD-HOC ROUTING PROTOCOLS AND BLACK HOLE ATTACK
Figure 2. RREQ Broadcast
Figure 4.1 RREQ Broadcast
Figure 4.3 RREQ Broadcast     (a) R  AB  + R BA  + O ab = 0     R AB  + R BA  = O ab   (normal case)                      (3)  (b)                                        O ab                    R AB

Referências

Documentos relacionados

Ad hoc On-demand Distance Vector Routing Protocol uses an on demand approach for finding routes, that is, a route is established only when it is required by a source node

The protocol performance evaluation for an ad-hoc network is necessary to be tested under realistic conditions, especially including the movement of the mobile nodes which

if timeout period of sender node is x then timeout period of receiver node will be (x-m), where m will be critical factor. This factor [16] helps us to control the

In this paper, we study the effect of Grey Hole attack on Dynamic Source Routing (DSR) protocol in Mobile Ad-Hoc Network.. Keywords —Ad-Hoc Networks, Grey Hole

The elected cluster head will perform signature detection on all the member nodes along with running anomaly detection only on the backup node.. Similarly the backup will be

The best possible outcomes obtained from the above proposed fuzzy logic based protocol helps a mobile Ad- Hoc network to choose an efficient edge on the basis of

Routing is the critical issue in the MANET and focus based on routing protocols such as Ad hoc On-demand Distance Routing Protocol (AODV), Dynamic Source Routing (DSR),

ADMR consists of 3 phases are Multicast State Setup, Multicast Packet Forwarding, Multicast State Maintenance .Like other tree based multicast routing protocols, it builds a