IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Black Hole Attack Detection on AODV in MANET Using Fuzzy Logic Mr. Roshan Helonde1, Prof. M.R. Joshi2 1

M.E. Student, Department of Computer Science and Information Technology, H.V.P.M’s College of Engineering & Technology, Amravati (M.H), India [email protected] 2 Assistant Professor, Department of Information Technology, H.V.P.M’s College of Engineering & Technology, Amravati (M.H), India [email protected]

Abstract There are several standard protocols for Mobile Ad hoc Networks (MANET) that have been developed for devices with higher computing features. The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc On-demand Distance Vector (AODV). In this paper we discuss that how the Black Hole Attack is occurred and how to remove that attack by using Fuzzy System. In this paper an intrusion detection system is introduced to detect Black Hole Attack on AODV in MANET using fuzzy logic. This Fuzzy System uses two factors that is forward packet ratio and destination sequence number. These factors are implemented using fuzzy logic in which fidelity level is checked and compared against threshold value and detected whether there is black hole attack or not. The proposed IDS have been tested using NS2 (Network Simulator 2).

Keywords: AODV, Black Hole Attack, Fuzzy Logic, MANET.

1. Introduction MANET is a mobile ad-hoc[1] network which dynamically set up temporary paths between mobile nodes which acts both as router and hosts to send and receive packets. As MANET [4] do not have a fixed topology, no base-station support and no fixed routers so at each step nodes have to adjust their transmission and reception parameters. All these characteristics of MANET make it more susceptible to the attacks. One of these attacks is the Black Hole attack. In the Black Hole attack, a malicious node intercepts all data packets across itself by making use of the vulnerabilities of the route discovery packets of the on demand protocols, such as AODV.

2. Aodv and Its Route Discovery Process AODV: Ad-hoc On Demand Distance Vector routing Protocol is designed to address routing problems in adhoc networks and provides communication between mobile nodes. AODV[4] initiates its route discovery process by sending a RREQ (Route Request) packet. After creating the RREQ packet the node sets timer and waits for RREP (Route Reply) message. An intermediate node upon the reception of a RREQ packet checks whether it has seen it before by examining the originator’s IP address and the RREQ broadcast ID pair. Each node maintains a list of the originator IP and RREQ broadcast ID pair for each route request that it receives. This information remains in this list for a finite period of time and it is used to avoid flooding attacks or anomalous node behavior [1,7,10].

Mr. Roshan Helonde, IJRIT

46

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

Fig 1: Route Discovery Process

3. Description of Black Hole Attack Attacks in the network layer have generally two purposes: not forwarding the packets or adding and changing some parameters of routing messages; such as sequence number and hop count. A basic attack that an adversary can execute is to stop forwarding the data packets. As a result, when the adversary is selected as a route, it denies the communication to take place. In black hole attack, the malicious node waits for the neighbors to initiate a RREQ packet. As the node receives the RREQ packet, it will immediately send a false RREP packet with a modified higher sequence number. So, that the source node assumes that node is having the fresh route towards the destination. The source node ignores the RREP packet received from other nodes and begins to send the data packets over malicious node. A malicious node takes all the routes towards itself. It does not allow forwarding any packet anywhere. This attack is called a black hole as it swallows all objects, data packets.

Fig 2: Black hole Attack in MANET In figure 2, source node S wants to send data packets to a destination node D in the network. Node M is a malicious node which acts as a black hole[8]. The attacker replies with false reply RREP having higher modified sequence number. So, data communication initiates from S towards M instead of D.

4. Black Hole Attack on AODV In AODV[1], Dst Seq is used to determine the freshness of routing information contained in the message from originating node. To succeed in the black hole attack[1] the attacker must generate its RREP with Dst Seq greater than the Dst Seq of the destination node.

Fig 3: Black Hole Attack

Mr. Roshan Helonde, IJRIT

47

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

Here, we assume that the destination node D has no connections with other nodes. The source node S constructs a route in order to communicate with destination node D.Upon receiving RREQ (a1), node A forwards RREQ (b1) since it is not the destination node. To impersonate the destination node, the attacker M sends spoofed RREP(e1) shown in Table 1 with IPSec, AODV.Dst [11] the same with D and increased Dst Seq (in this case 65 as) to source node S.

Table 1: Values of RREQ and RREP

5. Problems In Black Hole Attack In Designing of intrusion detection system[10] to detect the black hole attack on AODV[1] in MANETs. This detection system is based on FUZZY LOGIC. We proposed a system in which the improvement is by making use of two factors i.e. destination sequence number and forward packet ratio for the detection system. Fuzzy Logic[10] provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, impressive, noisy or missing input information.

Fig 4: Heavy traffic load on Bad node The proposed algorithm to detect the black hole attack is given as under: Black Hole Detect(S,D) /* S is the source node and D represents the Destination Node over the network*/ { 1. As transmission begins it will search for all the intermediate nodes and send data on to it. 2. Tithe intermediate node failed forwarding the probe message to the next node. 3. Fuzzify the Communication Rate on each Neighbor Node it will check the RESPONSE time for the intermediate node If (Fuzzy Rule(Response Time)> HIGH) { The Attacker Node is detected. Update Neighbor Node Table & Routing Table for The Intermediate Nodes Mr. Roshan Helonde, IJRIT

48

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

} 4. 5.

The unresponsive node is incapable of responding to the probe message. The diagnosis algorithm will then be called to decide which one is the case.

}

6. Solution Against Black Hole Attack The proposed system[9] is based upon fuzzy logic[6]. Fuzzy logic is a form of multi valued logic derived from fuzzy set theory to deal with reasoning that is approximate rather than precise. The fuzzy model[9] is integrated with AODV routing protocol[13] as shown in fig 5. It consists of following four components i.e., 6.1 Fuzzy Parameter Extraction 6.2 Fuzzy Computation 6.3 Fuzzy Verification Module 6.4 Alarm Packet Generation Module.

Fig 5: The Purposed System

6.1 Fuzzy Parameter Extraction The input to the fuzzy system [9] in node “i “is extracted by listening to the traffic received and generated by its immediate neighbors and creates a fuzzy parameter list in new neighbor table for its every neighbor. Each node in the network works in the promiscuous mode (i.e. it can listen to the traffic of its neighbors) and listens to the routing and network traffic of their neighbors and collects the information for fuzzy system. The neighbor table of node “ i “ has the following fields for its neighbor node “ j “ : Forward Packet Ratio, Average Destination Sequence Number and Fidelity Level. Forward packet ratio: data packets forwarded / data packets received. The sequence number of a particular node depends upon the number of connections of respective node in the network. A node having high value of destination sequence number is assumed to be a reliable node in AODV.

6.2 Fuzzy Computation The proposed system[9] receives forward packet ratio and average destination sequence number as input from routing and network traffic and has one output, Fidelity Level. If forward packet ratio is LOW and sequence number ratio is LOW, then fidelity level is LOW”. The fidelity level lies between 0 and 10. The minimum value for fidelity can occur as a result of more malicious behavior than legitimate behavior of a neighboring node. Hence, a fidelity level of 0 represents complete malicious behavior and 10 represents legitimate behavior of a particular node.

Mr. Roshan Helonde, IJRIT

49

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

6.3 Fuzzy Verification Module In the verification module, the calculated fidelity level is compared with the threshold fidelity level. If the computed fidelity level is less than threshold level, the node is black hole node, otherwise node is legitimate node.

Table 2: Fuzzy Rule Base

6.4 Alarm Packet Generation Module On the basis of information passed by fuzzy verification module [9], if the fidelity level is less than the threshold fidelity level, this model generates an alarm packet with IP address of the node that is declared as black hole node.

7. Conclusion And Future Work This work proposes fuzzy logic based a very simple and effective solution to detect and isolate the black hole node from AODV enabled MANET using proposed system. Major improvement of the system can be done in terms of detection rate. The packet delivery ratio of system can be improved up to required level. The Proposed system can be further extended to provide security from more active attacks that a malicious node can perform against the routing protocol. Fuzzy logic incorporates a simple, rule based approach to solving a problem. This system will not only detects the black hole attack in early stage of communication, but isolates it from the network. Thus improve the performance to great level.

References [1]

[2] [3] [4] [5] [6] [7]

[8] [9]

Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, issue 3, Nov 2007, pp 338–346. William Stallings “Wireless Communication & Networks” (Pearson Education). Rajkamal “Mobile Computing”Oxford Press. Agrawal D.P., Zeng Q, A, “Introduction to Wireless & Mobile Systems” (2/e) CENGAGE Learning. J.M.L. Manickam and S. Shanmugavel, "Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET", IEEE in Proc. WiMob, 2007. Fuzzy Logic with Engineering Applications by Timothy J. Ross Mcgraw Hill, Inc. Timothy J. Ross,(I2000) “Fuzzy Logic with Engineering Applications”,McGraw Hill International Editions. Payal N. Raj and Prashant B. Swadas, “DPRAODV: A dynamic learning system against black hole attack in AODV based MANET”, International Journal of Computer Science Issues (IJCSI), Volume 2, Numbe 3, 2009, pp 54-59. Kulbhushan and Jagpreet Singh , “Fuzzy Logic based Intrusion Detection Syste against Blackhole Attack on AODV in MANET”, IJCA Special Issue on “Network Security and Cryptography” NSC, 2011. Poonam Yadav, Rakesh Kumar Gill and Naveen Kumar, “A Fuzzy Based Approach to Detect Black hole Attack”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2, Issue -3, July 2012.

Mr. Roshan Helonde, IJRIT

50

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 46- 51

[10] [11] [12] [13]

Miss. Shweta Modi and Mr. Jitendra Prithviraj, “Performance Comparison of IACO, AODV Networking Routing Protocols”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), 2011. Zaiba Ishrat, “Security issues, challenges & Solution in MANET”, International Journal of Computer Sci ence & Technology (IJCST), Vol- 2, Iss ue- 4, Oct - Dec 2011. Arash Dana and Mohamad Hadi Babaei, “A Fuzzy Based Stable Routing Algorithm for MANET”, International Journal of Computer Science Issues (IJCSI), ISSN: 1694-0814, Vol 8, Issue-1, January 2011. Prof.S.P. Setti, Vijay Kumar D V, Nagendra Prasad G S M and Narasimha Raju K, “Implementation of Fuzzy Priority Scheduler for MANET and Performance Analysis with Reactive Protocols”, International Journal of Engineering Science and Technology, Vol. 2(8), 2010,pp 3635-3640.

Mr. Roshan Helonde, IJRIT

51

Black Hole Attack Detection on AODV in MANET Using ...

The Efficient routing protocols can provide significant benefits to mobile ad hoc .... William Stallings “Wireless Communication & Networks” (Pearson Education).

691KB Sizes 10 Downloads 266 Views

Recommend Documents

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
black hole attack, a malicious node impersonates a destination node by sending a ... writing a new AODV protocol using C++, to simulate the Black Hole attack.

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
Periodically updating route tables keeps the nodes awake and quickly exhausts their batteries,. • Many redundant route entries to the specific destination needlessly take place in .... discovery process and influence the network integrity in a wide

Host based Attack Detection using System Calls
Apr 3, 2012 - This calls for better host based intrusion detection[1]. ... Intrusion detection is the process of monitoring the events occurring in a ... System Call in Linux ... Rootkits[2] are a set of software tools used by an attacker to gain.

Effect of Black Hole Attack on AD HOC ON Demand ...
In this type of attack a malicious node falsely advertised itself have a short and a fresh route to a ... node participates in an ad hoc routing protocol that allows it to discover “multi-hop” paths through the network any ..... Security Protocol

Jacobson, Introductory Lectures on Black Hole Thermodynamics.pdf ...
1. Page 3 of 40. Jacobson, Introductory Lectures on Black Hole Thermodynamics.pdf. Jacobson, Introductory Lectures on Black Hole Thermodynamics.pdf. Open.

Detection of DOS attack and Sink hole In WSN
paper given a mechanism to launch sinkhole attack primarily based attacks like selective forwarding and region attack in wireless device networks. The projected work embrace detection and step rules to form the device network secure from these attack

Black Hole Information Revisited
Jun 22, 2017 - 4D: hard radiated quanta are always accompanied by an infinite cloud of tightly correlated soft quanta. In this note we conjecture that the full ...

Rogue Access Point Detection and Counter Attack Using Internet Proxy
www.ijrit.com. ISSN 2001-5569. Rogue Access Point Detection and Counter Attack. Using Internet Proxy. Miss. Gaikwad Jyoti, Miss. Mandhare Ashvini, Miss.

Rogue Access Point Detection and Counter Attack Using Internet Proxy
3. Host policies and rules are stored in the MYSQL database on proxy server. 4. Proxy will check the host policy and process the request accordingly. 5. User gets the internet access if he is an authorized user otherwise gets the error message. 6. Pr

Poster: Detection of Wormhole Attack on Wireless Sensor ... - EWSN
Poster: Detection of Wormhole Attack on Wireless Sensor ... wireless sensor nodes are duty-cycling, i.e. they will period- .... Cambridge Unversity Press, 2009.

Entropy Based QoS Routing Algorithm in MANET Using ...
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need of any pre-existing infrastructure in which each node can ...

Entropy Based QoS Routing Algorithm in MANET Using ...
1Department of Information Technology, ABES Engineering College, Ghaziabad, .... 2.1.2 Divisive: This is a "top down" approach: all observations start in one ..... Conference on Nctworking , Sensing and Control (ICNSC06), Florida, USA, 23-.

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... topology. 2. Congestion Control in MANET. To maintain and allocate network .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with honours fro

Enhanced Dynamic Detection of Code Injection Attack in OS ... - IJRIT
At runtime, a monitor compares the behavior of the variants at certain ... The global decision is made by a data fusion center, ... complete solution. Modern static ...

Profile Injection Attack Detection for Securing ... - CiteSeerX
6.4.2 Robustness Comparison Against Nuke Attacks . . . . . . . . . . . . . . 34. 7 Defense ..... As a result, we have focused on profile analytics data and attribute ...... Data Mining: Practical machine learning tools and techniques, 2nd. Edition. M

Enhanced Dynamic Detection of Code Injection Attack in OS ... - IJRIT
Security vulnerabilities in software have been a significant problem for the computer industry for decades. ... The malware detection system monitors data from a suite of .... us to detect and prevent a wide range of threats, including “zero-day”

Profile Injection Attack Detection for Securing ... - CiteSeerX
to Bamshad Mobasher for inspiring and encouraging me to pursue an academic career in computer science. His thoroughness and promptness in reviewing my ...

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with ...

Enhanced TCP SYN Attack Detection
prevalent in the Internet, with attacks targeting banking and financial companies, online gambling firms, web retailers and governments. The 2007 Symantec Threat Report [2] indicates that over 5000 DoS attacks were observed worldwide on a daily basis

Ahmad, Fermion Quantum Field Theory in Black Hole Spacetimes.pdf
Ahmad, Fermion Quantum Field Theory in Black Hole Spacetimes.pdf. Ahmad, Fermion Quantum Field Theory in Black Hole Spacetimes.pdf. Open. Extract.

The nonlinear gravitational-wave memory in binary black hole mergers
Kavli Institute for Theoretical Physics. University of California, Santa Barbara ... The memory is hereditary: it depends on the entire past-history of the source ...