Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor

Black hole attack targets the network layer of the protocol stack by disrupting the routing service. In this type of attack, an adversary aims to disrupt the packets destined to a target node in the network. It achieves this by claiming that it has the freshest and shortest path to a target node. It then redirects all packets destined to a target node to itself and drops them. Dynamic Source Routing (DSR) is a Mobile Ad hoc Network (MANET) reactive routing protocol which establishes routes on demand and therefore more susceptible to black hole attack. This paper analyses the black hole attack on DSR-based MANET. The analysis is performed by simulating DSR-based network in NS-2 and introducing the black hole attack to the network. The graphs obtained from simulations indicate that DSR-based MANETs' performance deteriorates when black hole attack is launched against them.

[1]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[2]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[3]  Kevin R. Fall,et al.  The NS Manual (Formerly NS Notes and Documentation , 2002 .

[4]  Ning Zhang,et al.  A countermeasure to black hole attacks in mobile ad hoc networks , 2011, 2011 International Conference on Networking, Sensing and Control.

[5]  Consolee Mbarushimana,et al.  Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[6]  Rutvij H. Jhaveri,et al.  MANET Routing Protocols and Wormhole Attack against AODV , 2010 .

[7]  Krupa A Talwar,et al.  A Survey: Routing Protocols in MANETs , 2014 .

[8]  N. Sharma,et al.  The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[9]  Mukesh Singhal,et al.  Secure Routing in Wireless Ad-Hoc Networks , 2007 .

[10]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.