Technique for detection of cooperative black hole attack in MANET

Gayatri Wahane, Savita Lonare
2013 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)  
I. INTRODUCTION A mobile Ad hoc network (MANET) is a self -configuring network that does not require any fixed infrastructure, which minimizes their cost as well as deployment time. As each node in this network is free to move which makes the network to change its topology continuously. These infrastructure-less mobile nodes in ad hoc networks dynamically create routes among themselves to form own wireless network on the fly. Because of the dynamic nature, these networks are more vulnerable to
more » ... ttacks so security is an important as well as serious issue in mobile ad hoc network. One of the most critical problems in MANETs is the security vulnerabilities of the routing protocols. A set of nodes in a MANET may be compromised in such a way that it may not be possible to detect their malicious behavior easily. Such nodes can generate new routing messages to advertise nonexistent links, provide incorrect link state information, and flood other nodes with routing traffic. One of the most widely used routing protocols in MANETs is the adhoc on-demanddistance vector (AODV) routing protocol. AODV isvulnerable to the well known black hole attack. Most author has assumed that the black hole in the MANET do not work in a group and have proposed a solution to identify single black hole attack .However in their proposed solution many of them found multiple black hole malicious node. Some author has suggested solution for detecting cooperative attack but due to multipath routing it require more end to end delay and more routing overhead .The proposed technique works with modified AODV protocol and routing information table for searching trustful node. This paper is organized as follows. In Section II related work for detecting Black Hole attack has been discussed. Section III provides Programmer Design in which discuss Performance metrics and overview of AODV protocol with the description of black hole attack characteristics. Section IV describes the proposed solution for detecting cooperative Black hole attacks in mobile ad hoc networks and shows the working of the algorithm with the help of an example. We conclude plan for future work in section V. RELATED WORK In this section we will discuss some research work has been done by various author. Sukla Banerjee [1] proposed a mechanism capable of detecting and removing the malicious nodes launching these two types of attacks. Their approach consists of an algorithm which works as follows. Instead of sending the total data traffic at a time we divide the total traffic into some small sized blocks. So that ABSTRACT : Mobile Ad Hoc Network (MANET) is acollection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. Security is a major challenge for these networks due to their features of open medium, dynamically changing topologies. The black hole attack is a well known security threat in mobile ad hoc networks. However, it spuriously replies for any route request without having any active route to the specified destination. Sometimes the Black Hole Nodes cooperate with each other with the aim of dropping packets these are known as Cooperative Black Hole attack. This research work suggests the modification of Ad Hoc on Demand Distance Vector Routing Protocol. I am going to use a mechanism for detecting as well as defending against a cooperative black hole attack. This work suggest two new concepts, first one is Maintenance of Data Routing Information Table and second is cross checking of a node. This system also decreases the end to end delay and Routing overhead.
doi:10.1109/icccnt.2013.6726621 fatcat:ftc7ayz5qba3bf5mfuodm2kt34