Investigating Varying Time Black Hole Attack on QoS over MANET
Mobile Ad hoc Networks are vulnerable to various attacks due to its nature, as it is a multihop process between sender and receiver. One of these attacks is black hole attack, which will simply delete any packet instead of forwarding it. Sometimes these k
- PDF / 497,414 Bytes
- 7 Pages / 439.37 x 666.142 pts Page_size
- 102 Downloads / 182 Views
Abstract Mobile Ad hoc Networks are vulnerable to various attacks due to its nature, as it is a multihop process between sender and receiver. One of these attacks is black hole attack, which will simply delete any packet instead of forwarding it. Sometimes these kinds of malicious nodes may behave as true node giving impression that it is not malicious, while rest of the time they are dropping all packets, so affecting the QoS. Discovering such kind of malicious nodes are very difficult as isolating them is not easy because their malicious behavior is in on and off fashion. In our paper, we had inspected such nodes which are behaving like a black hole for variable time intervals on different parameters. Further for deeper study, we have considered different number of such malicious nodes to give more insight on comparisons. Keywords Black hole attacks
QoS Varying time attack Malicious node AODV
1 Introduction Mobile Ad hoc Network is decentralized and infrastructure less network. It is ad hoc, which means it is a temporary network that does not require any centralized control, so it does not depend on any fixed infrastructure [1, 2]. Nodes in Manets S.S. Verma (&) S.K. Lenka CSE, IT Department, FET, Mody University of Science and Technology, Lachmangarh 332311, India e-mail: [email protected] S.K. Lenka e-mail: [email protected] R.B. Patel CSE Department, CCET, Chandigarh, Punjab, India e-mail: [email protected] © Springer Science+Business Media Singapore 2016 S.C. Satapathy et al. (eds.), Proceedings of International Conference on ICT for Sustainable Development, Advances in Intelligent Systems and Computing 408, DOI 10.1007/978-981-10-0129-1_19
177
178
S.S. Verma et al.
requires multihop transmission to send any data, which makes MANET vulnerable to many attacks such as black hole and flooding attack [3]. These attacks can be explained as: Flooding Attacks: Flooding nodes will flood Route Request (RREQ) packet to unknown destination that does not exist, all nodes on the way will broadcast this RREQ packet that results in flooding. The resources in the network is consumed by such packages which will ultimately result in denial of services [4–6]. Black Hole Attack: Black Hole [7, 8] nodes behaves as normal in route discovery process but after route is established through it, a black hole will drop all the packets it received by any other nodes. That means it transmits all the routing packet but drop all the data packet which makes it very complicated to handle. Many types of attacks can be encountered in MANET like sinkhole, wormhole, selfish nodes, etc. Any node with such a malicious behavior can cause various impairment to networks [9]. In this paper, we are evaluating black hole attack using AODV as routing protocol. The rest of the paper is organized as; Sect. 2 covers brief notes on background and literature survey. Section 3 contains performance evaluation of AODV routing protocol under black hole attack with variable malicious active percentage time and with diffe
Data Loading...