Performance analysis of black hole attacks in geographical routing MANET

The MANET (Mobile Adhoc Network) is vulnerable to several types of attacks. The most commonly classified attack is black hole attack, which is carried by single or multiple attackers, advertising itself of having a short fresh route to transmit data. The aim is to ensure security against the black hole attack and analyze the performance in geographical routing. The simple method is to send data as small blocks instead of entire data. The traffic is monitored independently in its neighborhood. The mechanism uses geographic information to detect variance in neighbor relations and node movements. We analyze the black hole attack in two popular location based protocol LAR and DREAM. It provides the stimulation study of black hole attack with the minimum attacker and also provides analysis on the parameters such as throughput, packet delivery and delay done with OMNET++ simulator. The simulation results show that packet loss increases and throughput decreases in the network with a black hole node in geographical routing. The proposed mechanism can be combined with existent routing protocols to defend against black hole attacks.

[1]  Imrich Chlamtac,et al.  A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[4]  Srdjan Capkun,et al.  GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[5]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[8]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[9]  Bart Preneel,et al.  ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[10]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[11]  Sándor Molnár,et al.  Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops , 2008, Simutools 2008.

[12]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[13]  Antonio Liotta,et al.  Analysis of Pervasive Mobile Ad Hoc Routing Protocols , 2010, Pervasive Computing, Innovations in Intelligent Multimedia and Applications.

[14]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.

[15]  Haiying Shen,et al.  ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, IEEE Transactions on Mobile Computing.

[16]  Ramanpreet Kaur,et al.  Modeling and simulation of DDoS attack using Omnet++ , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).