Location based analysis of AODV performance in the presence of black hole nodes

Mobility and portability of wireless communication devices in Mobile Ad Hoc Networks have introduced data security threats. This is due to the utilization of multiple hops as a result of limited transmission ranges between source and destination nodes. The performance of MANETs under Black Hole attacks can be improved by accurately detecting and eliminating black hole nodes. That is, there are indications to suggest that inaccu-rate Black Hole attack detection and elimination in Mobile Ad Hoc Networks have led to a low network performance. This paper aims to prove the impact Black Hole attacks can have on Mobile Ad Hoc Networks implementing AODV as a routing protocol via simulation. The simulation is conducted using NS3 and NetAnim. This involves the use of a base implementation of AODV as a benchmark for the effects that black hole nodes introduce into a network. Similarly, the AODV implementation that has black Hole nodes present in the network is also performed, to measure the effects black hole nodes introduce. Results indicate that the encounter of a black hole node during transmissions has a devastating effect on the network functionality. The closer the black hole node is to the source node requesting the transmission, the worse the impact. Fortunately, there are few scenarios where the black hole nodes are in the network, but the routing protocol chooses a path that does not include the malicious node. The paper concludes that, even with the introduction of relatively few black hole nodes to the network, there still exist a potential to bring significant disruptions to communication.

[1]  Rajesh Yerneni,et al.  Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[2]  R. Parthasarathy,et al.  Performance analysis of DOA and AODV routing protocols with black hole attack in MANET , 2013, INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS - ICSSS'13.

[3]  S. J. Soni,et al.  Enhancing security features & performance of AODV protocol under attack for MANET , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[4]  Jianwei Liu,et al.  AODV routing protocol under several routing attacks in MANETs , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  S. Dokurer,et al.  Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.

[7]  S. Sharma,et al.  Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[8]  Nidhi Purohit,et al.  Simulation study of Black hole and Jellyfish attack on MANET using NS3 , 2011, 2011 Nirma University International Conference on Engineering.

[9]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[10]  Timothy W. Finin,et al.  SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[11]  Mehdi Medadian,et al.  Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[12]  Nik Bessis,et al.  Performance Evaluation of Security Algorithms for the AODV MANET Routing Protocol , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.

[13]  K. C. Shet,et al.  A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET , 2012, 2012 International Conference on Computing Sciences.

[14]  S. Sharma,et al.  Detection and Prevention of Flooding Attack Using SVM , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[15]  Farrukh Aslam Khan,et al.  Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[16]  R. S. Bhuvaneswaran,et al.  Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.

[17]  Prasenjit Choudhury,et al.  A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[18]  N. Gandhewar,et al.  Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[19]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[20]  Michael P. Howarth,et al.  A generalized intrusion detection & prevention mechanism for securing MANETs , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[21]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[22]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[23]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[24]  A.A. Pirzada,et al.  Secure Routing with the AODV Protocol , 2005, 2005 Asia-Pacific Conference on Communications.