Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering
MANET is a set of mobile nodes in which communication occurs between them using wireless links. Infrastructure less, dynamical topology and Lack of central communication of nodes makes it vulnerable to various kinds of attacks. One of the major security p
- PDF / 355,939 Bytes
- 8 Pages / 439.37 x 666.142 pts Page_size
- 17 Downloads / 143 Views
Abstract. MANET is a set of mobile nodes in which communication occurs between them using wireless links. Infrastructure less, dynamical topology and Lack of central communication of nodes makes it vulnerable to various kinds of attacks. One of the major security problems is Black Hole attack in which node silently drops the packets in the network. In this paper, we propose a solution to mitigate this attack in MANET using mobile trust points with clustering. The proposed method uses some mobile trust points which monitor the activities of cluster heads to detect the attack and then generate alert in the network if any black hole node detected. Keywords: MANET
Clustering Black hole Mobile trust points
1 Introduction MANET (Mobile Ad hoc Networks) contains self organized mobile nodes without any infrastructure having dynamic topology. In MANET, Nodes can join and leave network anytime [1]. Nodes in the network can act as host or router. Nodes can route packet to help other nodes, thereby forming a network. Due to its simplicity and flexibility, MANETs are suitable for various applications such as emergency rescue operations, battlefield communication and vehicular communication. Lack of centralized management, dynamic topology and limited resources, make MANETs more vulnerable to various security issues than wired networks. For routing in MANET various Protocols are used which control the way of packet transfer between source and destination [3]. Proactive, active and hybrid are three categories of protocol. In proactive, Routing tables are maintained for communication in the network. Continuously updating routing tables increases route availability but creates network overhead. Destination Sequenced Distance Vector (DSDV) is an example of Proactive Protocol [11]. Reactive protocol uses on demand route discovery process to calculate routes in the network which causes delays in the network. Dynamic Source Routing (DSR) and Ad hoc on demand Distance Vector (AODV) is an example of reactive protocol [10]. Hybrid protocol combines both reactive and proactive protocols to exploit efficient communication in the network. Zone Routing Protocol (ZRP) is an example of this routing protocol [12]. Passive and Active attacks are two categories of attacks in MANET. In Passive attacks, attacker gets the information from the network without doing any alteration [2]. Eaves © Springer Nature Singapore Pte Ltd. 2016 A. Unal et al. (Eds.): SmartCom 2016, CCIS 628, pp. 565–572, 2016. DOI: 10.1007/978-981-10-3433-6_68
566
M. Singh and P. Singh
dropping, traffic control and monitoring are examples of Passive attacks. Active attack disrupted normal functioning of network by altering or destroying data. Black hole and worm hole are active attacks. In this paper, we tackle black hole attacks in AODV routing protocol. In black hole attack, malicious node falsely claiming shortest path to destination by replying to every route request and then drops every packet coming to it [4].
Packet drop
B 2
1
S 3 RREQ
4
D 5
RREP Fake RREP B
Data Loading...