Documente Academic
Documente Profesional
Documente Cultură
Original Article
gap assault utilizing Proactive and Reactive directing conventions and we think about the after-effects of both Proactive
Detection/counteractive action framework that really don't consider much basic parameters like childish hub,
questionable conduct of portable hubs, minor ID of parts of narrow minded hub, mistaken hub, or pernicious hubs.
Along these lines, the proposed work is finished by considering all the previously mentioned issues that has not been
tended to much viably in the earlier studies. The proposed concentrate mostly tended to the security dangers and issues in
portable Ad hoc system directing conventions and the prime objectives of the proposed research work is to play out an
exhaustive examination about the different types of assaults and their accessible countermeasures in versatile specially
appointed system. It likewise means to detail a successful basic leadership model where reproduction for narrow minded
hub and vindictive hub can be performed to unlawful the concealed qualities of hub mis-conduct bringing on the root
wellspring of greater part of steering assaults in MANET.
KEYWORDS: Network, Black Hole, MANET, RREP, RREQ, Protocol & AODV
Received: Jul 16, 2016; Accepted: Aug 29, 2016; Published: Sep 15, 2016; Paper Id.: IJCNWMCOCT20165
INTRODUCTION
In Mobile Ad-Hoc Network Security is the most important concern for the basic functionality of network
[3, 7]. The accessibility of system administrations, privacy and respectability of the information can be
accomplished by guaranteeing that security issues have been met. Because of its features like open medium,
changing its topology variably, lack of central monitoring and management, cooperative algorithms and no clear
www.tjprc.org
editor@tjprc.org
42
Najiya Sultana
defence mechanism MANETs often suffer from security attacks. These factors have changed the battle field situation for
the MANETs against the security threats [1, 2]. On the basis of mutual trust the MANETs work without an incorporated
organization where the hubs speak with each other. This trademark makes MANETs more helpless against be misused by
an assailant inside the system. Remote connections additionally make the MANETs more defenceless to assaults, which
make it simpler for the aggressor to go inside the system and access the continuous correspondence. Versatile hubs present
inside the scope of remote connection can catch and even take an interest in the system. These components have changed
the front line circumstance for MANETs against security dangers [2]. At long last, the proposed study focuses to plan a
probabilistic model where different issues of assault in lion's share of steering convention are tended to in portable
specially appointed system. The proposal work will present all the above talked about objectives alongside delineation of
the exploration strategies embraced to perform it.
WIRELESS NETWORKS
In Wireless systems, PC gadgets speak with each other with no wire. The correspondence medium between the
PC gadgets is remote. At the point when a PC gadget needs to speak with another gadget, the goal gadget must lays inside
the radio scope of each other. In remote systems Users transmit and receive data using electromagnetic waves. Due to its
mobility, simplicity and very affordable and cost saving installation, remote systems are more and more popular. (WWAN)
Wireless wide area network cover geographically bigger area than local area network. The wide area networks almost
consist of one or two local area networks. Satellite Systems, Paging Networks, 2G and 3G Mobile Cellular are the
Examples of WWAN [6, 4].
Versatile Ad-hoc system is an arrangement of remote gadgets named as hubs that powerfully interface and
exchange advanced message. The hubs are frequently PCs or desktop or portable workstations with remote LAN cards,
Personal Digital Assistants, or various types of remote or versatile correspondence types of gear [1]. It might be expected
as self designing system, with none framework, of versatile hubs associated by remote connections. Portable impromptu
system has a routable systems administration surroundings on top of a connection layer specially appointed system. Each
gadget in versatile specially appointed system is unengaged to move autonomously in any bearing and can consequently
adjust its connections to various gadgets intermittently. The premier key test in building a MANET [2] is preparing each
gadget to constantly safeguard the learning expected to precisely course activity. Such systems may work without anyone
else or is additionally associated with the bigger scale system.
Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol
43
www.tjprc.org
editor@tjprc.org
44
Najiya Sultana
Figure 2
Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol
45
foreswearing of administration assault. Near the sender and destination nodes, the impact of this assault is much helpless
when more than one pernicious hub is available The IEEE 802.11 Physical Layer uses Radio Frequency (RF) energy to
transmit or to receive data through the air. Spread-spectrum modulation is a physical layer function that spreads the digital
signal that a network interface card (NIC) transmits. This spreading process makes the data signal much less susceptible to
electrical noise. Two methods are used to spread the signal: frequency hopping or direct sequence. The hopping code
determines the order of frequencies over which the radio transmits. The time spent at a particular frequency during any
single hop is called the dwell time. According to the standard, seventy five or more frequency per transmission channels
with a maximum dwell time of 400ms should be used to implement FHSS systems.
www.tjprc.org
editor@tjprc.org
46
Najiya Sultana
Table 1
Simulation Parameters
Examined protocols
AODV and OLSR
Simulation time
1000 seconds
Simulation area (m x m)
1000 x 1000
Number of Nodes
16 and 30
Traffic Type
TCP
Performance Parameter
Throughput, delay, Network Load
Pause time
100 seconds
Mobility (m/s)
10 meter/second
Packet Inter-Arrival Time (s) exponential(1)
Packet size (bits)
exponential(1024)
Transmit Power(W)
0.005
Date Rate (Mbps)
11 Mbps
Mobility Model
Random waypoint
CONCLUSIONS
Black Hole attack is simulated and with three performing matrices i.e. End-to-End delay, Network Load and
Throughput, its impact on the MANETs is analyzed. In order to draw the final conclusion the results obtained from
simulation are analyzed deeply. We conclude that AODV protocol is more vulnerable to Black Hole attack than that of
OLSR protocol from our research. Many solutions have been studied through extensive literature review. Many of the
proposed solution claimed to be the best solution but still these solutions are not perfect in terms of effectiveness and
efficiency. On the off chance that any arrangement functions admirably within the sight of single malignant hub, it cannot
be applicable in case of multiple malicious nodes. The middle of the road answer messages if crippled prompts the
conveyance of message to the goal hub won't just enhance the execution of system, yet it will likewise secure the system
from Black Hole assault. From our research and analysis of simulation result we make the conclusion that AODV is more
vulnerable to Black Hole attack than OLSR.
FUTURE WORK
Due to their flexible nature i.e. easy to deploy regardless of geographic constraints Wireless Ad-Hoc networks are
widely used networks. In this area a lot of research work is still need. In MANETs using AODV and OLSR protocols we
tried to discover and analyze the impact of Black Hole attack. There is a need to dissect Black Hole assault in different
MANETs steering conventions, for example, DSR, TORA and GRP. Different sorts of assaults, for example, Wormhole,
Jellyfish and Sybil assaults are should have been concentrated on in examination with Black Hole assault. On the basis of
how much they affect the performance of the network they can be categorized. The location of this conduct of Black Hole
assault and also the end technique for such conduct must be completed for further research.
REFERENCES
1.
C.E. Perkins and E.M. Royer (1999). Ad-Hoc on Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop
on Mobile Computing Systems and Applications, pp.90-100.
2.
C.M barushimana, A .Shahrabi (2003). Comparative Study of Reactive and Proactive Routing Protocols Performance in
Mobile Ad-Hoc Networks, Workshop on Advance Information Networking and Application, Vol. 2, pp. 679-684.
Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol
3.
47
C.Jiwen, Y.Ping, C.Jialin, W.Zhiyang, L.Ning (2010). An Adaptive Approach to Detecting Black and Gray Hole Attacks in
Ad Hoc Network,24th IEEE International Conference on Advance Information Networking and Application (AINA 2010), pp.
775-780.
4.
Y.F.Alem, Z.C.Xuan (2010). Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection,2nd
International Conference on Future Computer and Communication (ICFCC 2010), Vol. 3, pp. 672-676.
5.
C.Parkins, E.B.Royer, S.Das, A hoc On-Demand Distance Vector (AODV) Routing. (2003). [Online]. Available:
http://www.faqs.org/rfcs/rfc3561.html. [Accessed: April. 10, 2010].
6.
M.Abolhasan, T.Wysocki, E.Dutkiewicz (2003). A Review of Routing Protocols for Mobile Ad-Hoc Networks,
Telecommunication and Information Research Institute University of Wollongong, Australia.
7.
T.Clausen, P.Jacquet (2003). Optimized Link State Routing Protocol (OLSR), RFC 3626.
8.
Z.J.Hass, M.R.Pearlman, P.Samar (2002). The Zone Routing Protocol (ZRP) for Ad Hoc Networks, 55th Proceeding of
International task force.
9.
P.V.Jani (2002). Security within Ad-Hoc Networks, Position Paper, PAMPAS Workshop.
10. M.Parsons, P.Ebinger (2003). Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks, [Online].
Available: www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].
11. D.B.Roy, R.Chaki and N.Chaki (2009). A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1.
12. H.L.Nguyen, U.T.Nguyen (2006). Study of Different Types of
International Conference on System and Networks and International Conference on Mobile Communications and Learning
Technologies (ICN/ICONS/MCL 2006), pp.149-149.
13. C.Wei, L.Xiang, B.yuebin and G.Xiaopeng (2007). A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc
Networks, Second International Conference on Communications and Networking in china, pp.366-370.
14. S.Marti, T.J.Giuli, K.Lai, M.Baker (2013). Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks, Proceedings of the
6th annual international conference on Mobile computing and networking, united states, pp. 255-265, Zhu, C. Lee,
M.J.Saadawi, T., RTT-Based Optimal Waiting time for Best Route Selection in Ad-Hoc Routing Protocols, IEEE Military
Communications Conference, Vol. 2, pp. 1054-1059.
www.tjprc.org
editor@tjprc.org